Symantec Endpoint Protection 11 Business Pack - 10 User
- Platform: Windows
- Manufacturer: Symantec
- Type: Retail Boxed, Full Edition
- MPN: 12098243
- Stock Code: 024313
- More: Endpoint Protection 11
- Availability: SOLD OUT
Symantec Endpoint Protection 11.0 combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops, and servers. It provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and mutating spyware.
Symantec Endpoint Protection delivers more than world-class, industry-leading antivirus and antispyware signature-based protection. It also provides advanced threat prevention that protects endpoints from targeted attacks and attacks not seen before. It includes turnkey, proactive technologies that automatically analyze application behaviors and network communications to detect and block suspicious activities, as well as administrative control features that allow you to deny specific device and application activities deemed as high risk for your organization. You can even block specific actions based on the location of the user.
This multilayered approach significantly lowers risks and gives you the confidence that your business assets are protected. It is a comprehensive product that gives you the capabilities you need now, along with the ability to enable the pieces you need, as you need them. Whether the attack is coming from a malicious insider or is externally motivated, endpoints will be protected.
Symantec Endpoint Protection increases protection and helps lower your total cost of ownership by reducing administrative overhead as well as the costs associated with managing multiple endpoint security products. It provides a single agent that is administered by a single management console. This simplifies endpoint security administration and provides operational efficiencies such as single software updates and policy updates, unified and central reporting, and a single licensing and maintenance program.
Comprehensive protection--Symantec Endpoint Protection integrates best-of-breed technologies to stop security threats--even from the most devious new and unknown attackers--before they penetrate the network. It detects and blocks malicious software in real time, including viruses, worms, Trojan horses, spyware, adware, and rootkits.
Proactive protection--New Proactive Threat Scan uses a unique Symantec technology to score both good and bad behaviors of unknown applications, enhancing detection and reducing false positives without the need to create rulebased configurations.
Industry-best threat landscape intelligence--Symantec protection mechanisms leverage the industry-leading Global Intelligence Network to deliver an unparalleled view of the entire Internet threat landscape. This intelligence results in actionable protection and peace of mind against evolving attacks.
Single agent, single console--A full range of security technologies are integrated into a single agent and a centralized management console, with an intuitive user interface and Web-based graphical reporting. You are able to set and enforce security policies across the enterprise to protect your critical assets. Symantec Endpoint Protection simplifies management, reduces system resource usage, and requires no additional agents when adding Symantec Network Access Control support. Symantec Network Access Control features are automatically enabled on the agent and management console with the purchase of a license.
Easy to deploy--Because it requires only a single agent and management console and it operates with an organization's existing security and IT investments, Symantec Endpoint
Protection is easy to implement and deploy. For organizations that want to outsource security monitoring and management, Symantec offers Managed Security Services to deliver real-time security protection.
Lower cost of ownership--Symantec Endpoint Protection delivers a lower total cost of ownership by reducing administrative overhead as well as the costs associated with managing multiple endpoint security products. This unified approach to endpoint security simplifies administration and provides operational efficiencies such as single software updates and policy updates, unified and central reporting, and a single licensing and maintenance program.
Easy to install, configure, and manage--Symantec Endpoint Protection makes it easy to enable/disable and configure desired technologies to fit into your environment.
Symantec Network Access Control ready--Each endpoint becomes "Symantec Network Access Control ready," eliminating the need to deploy additional network access control endpoint agent software.
Leverages existing security technologies and IT investments -- Symantec Endpoint Protection works with other leading antivirus products, firewalls, IPS technologies, and network access control infrastructures. It also works with leading software deployment tools, patch
management tools, and security information management tools.
Integration with Altiris endpoint management solutions--Distributing software packages, migrating older Symantec AntiVirus or other antivirus deployments, and viewing new agent rollout status and activity is easier.
- More than antivirus
Antivirus and antispyware--Provides unmatched, best of-breed malware protection, including market-leading antivirus protection, enhanced spyware protection, new rootkit protection, reduced memory footprint, and new dynamic performance adjustments to keep users productive.
Network threat protection--A rules-based firewall engine and Generic Exploit Blocking (GEB) block malware before it can enter a system.
Proactive threat protection--Providing protection against unseen threats (i.e., zero-day threats), it includes Proactive Threat Scan, which does not rely on a signature.
Single agent and single management console--Antivirus, antispyware, desktop firewall, IPS, device control, and network access control (with the purchase of a Symantec Network Access Control license) are provided on a single agent--all managed by a single console.
Single Agent and Single Console
Delivers a single agent for all Symantec Endpoint Protection technologies and Symantec Network Access Control. Delivers a single integrated interface for managing all Symantec Endpoint Protection technologies and Symantec Network Access Control. All allow for a single communication method and content delivery system across all technologies.
- Provides operational efficiencies such as single software updates, single policy updates.
- Provides unified and central reporting.
- Provides unified licensing and maintenance.
- Requires no change to the client when adding Symantec Network Access Control enforcement.
- Lowers Total Cost of Ownership for endpoint security.
- Reduces administrative effort.
Proactive Threat Scanning
Behavioral-based protection that protects against zero-day threats and threats not seen before. Unlike other heuristic-based technologies, TruScanTM Proactive Threat Scan scores both the good and bad behavior of unknown applications, providing a more accurate malware detection.
- Accurately detects malware without the need to set up rule-based configurations.
- Helps lower the number of false positives.
Advanced Rootkit Detection and Removal
Provides superior rootkit detection and removal by integrating VxMS (Veritas Mapping Service--a Veritas technology), thereby providing access below the operating system to allow thorough analysis and repair.
- Detects and removes the most difficult rootkits.
- Saves time and money and productivity lossses associated with re-imaging infected machines.
Allows administrators to control access to specific processes, files, and folders by users and other applications. It provides application analysis, process control, file and registry access control, and module and DLL control. It enables administrators to restrict certain activities deemed as suspicious or high risk.
- Prevents malware from spreading or harming endpoints.
- Locks down endpoints to prevent data leakage.
Controls which peripherals can be connected to a machine and how the peripherals are used. It locks down an endpoints to prevent connections from thumb drives, CD burners, printers, and other USB devices.
- Prevents sensitive and confidential data from being extracted or stolen from endpoints (data leakage).
- Prevents endpoints from being infected by viruses spread from peripheral devices.
Optimal Client and Server Performance
Optimized client boot times and application load times enables comprehensive protection and better performance for all customer sizes and environments.
Specifications / System Requirements
|Package Type||Retail Boxed Package|
|License Type||Complete Package|
|License Quantity||10 Users|
|Operating System||See Extra Details|
|Min CPU||Pentium III 300 MHz (1GHz for Windows Vista)|
|Min HDD||180 MB|
|Min RAM||256 MB|
|Peripheral Devices||CD-ROM drive; mouse & keyboard|
System Requirements:Symantec Endpoint Protection Client (32-bit)
- Windows 2000 SP3+, Windows XP, Windows Server 2003, Windows Vista (x86)
- Pentium III 300 MHz (1GHz for Windows Vista)
- 256MB RAM
- 180 MB disk (plus an additional 440 MB during installation)
- Windows XP Professional (x64) SP1+, Windows Server 2003 (x64), Windows Vista (x64)
- 1 GHz with one of the following processors: Intel Xeon with Intel EM64T support, Intel Pentium IV with EM64T support, AMD 64-bit Opteron, AMD 64-bit Athlon (Note: Itanium is not supported)
- 256MB RAM
- 180 MB disk (plus an additional 440 MB during installation)
Central Administration Server
- Windows XP Professional SP2; Windows Server 2003 Standard/Enterprise
- Microsoft Internet Information Services (web server)
- Microsoft SQL Server 2000 SP3 or SQL Server 2005 (optional)
- 2GB RAM
- 1GB free disk space
Symantec Endpoint Protection Console
Remote administration console (optional)
- Windows XP Professional; Windows Server 2003 Standard or Enterprise; Windows 2000 Professional/Server/Advanced Server
- Sun Java Runtime Environment (JRE) 1.5
- Microsoft Internet Explorer 6.0 SP2
- 512MB RAM
Product information, specifications, and compatibility are for advisory purposes only, and is the buyers full responsibility to verify with the manufacturer prior to ordering.