SBN

Symantec: Endpoint Protection [product review]

Introduction

Symantec Endpoint Protection is an award-winning platform that allows organizations to lock down the security of their networks on user-based equipment such as laptops and desktop systems. These endpoints are the most vulnerable section of a network, so having a security solution that protects both users and infrastructure is critical.

At this point you are probably wondering how Symantec Endpoint Protection helps to protect you from malware and virus attacks, so we’ll look at some features and give you a quick overview.

Symantec Endpoint Protection helps to defend against ransomware and other up-and-coming threats by providing a multilayered protection system. It integrates machine learning, behavior analysis and intrusion detection to create a well-rounded endpoint protection system. These combined elements give you increased vision on your network, especially where suspicious files are concerned.

A tunable protection slider helps you to make policy changes on the fly from one control point, which speeds up threat response times for you and your users. Symantec Endpoint Protection also uses advanced deception techniques to help fool hidden attackers into revealing themselves, allowing you to take immediate action to mitigate the damage that they could potentially cause.

Other features that are available include vulnerability protection for commonly exploited applications, an integrated EDR for incident investigation, as well as a response leveraging system. All of this is capped off with open APIs that allows you to integrate Symantec Endpoint Protection with your pre-existing IT infrastructure, which enables automation processes and wider system orchestration.

All of this is accomplished via Symantec Endpoint’s Multi-layered Prevention System, which includes:

  • Network and Firewall Prevention
  • Memory Exploit Mitigation
  • Reputation Analysis
  • Advanced Machine Learning
  • Emulator
  • Antivirus
  • Behavior Monitoring
  • Application and Device Control.

Key Features

Let’s take a few moments to elaborate a little on each of the above points and explore what (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Chris Sienko. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/DgceHHjqDzQ/