0% found this document useful (0 votes)
53 views3 pages

Solution Brief - Endpoint Security

Endpoints are a primary target of cyber attackers.

Uploaded by

dviktor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views3 pages

Solution Brief - Endpoint Security

Endpoints are a primary target of cyber attackers.

Uploaded by

dviktor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Solution Brief

Symantec Endpoint Security


Solutions Overview
Endpoints are a primary target of cyber attackers.
Why is Endpoint Symantec Endpoint Security prevents, hardens,
Security Important? detects, and responds to emerging threats across
Endpoint security is moving quickly laptops, desktops, tablets, mobile phones, servers,
beyond malware:
and cloud workloads.
• 33% increase in mobile ransomware
• 600% increase in IoT attacks
• 80% Increase in iOS and Android
vulnerabilities
Key Capabilities
• 56% Increase in risky Wi-Fi networks
The Most Comprehensive Protection
Symantec’s Industry-leading endpoint solutions secure all endpoints,
• 54% increase in mobile malware including laptops, desktops, iOS phone and tablets, Android phones
variants
and tablets, servers, storage human-machine interface and operational
• 70+ million records stolen or leaked technology, cloud workloads, containers, and cloud storage.
due to poor AWS configuration
Get the industry-leading endpoint Cloud and Hybrid Options
security solution to help protect your While on-premises solutions remain the primary defense mechanisms for
business. many organizations’ data centers, the disappearance of the traditional
network security perimeter, the need for cost reduction, and support for
mobile and remote users has driven the need to move to security in the
cloud. By offering endpoint solutions in the cloud, Symantec offers options
for any deployment, on-premises, cloud, or a hybrid solution of both.

A Single Agent
Ponemon Institute found organizations install, on average, seven different
endpoint agents to support IT management and security. Each agent
operates independently with its own console and set of rules and policies—
all of which need to be configured, rolled out, managed, and maintained.
In addition to creating more IT overhead and costs, multiple products
introduce defense gaps and errors, increasing the chances you’ll miss a
threat.

Symantec Endpoint Security deploys a single agent for protection,


Endpoint Detection and Response (EDR), and Application Control &
Isolation.

A Single Console
Symantec Endpoint Security allows an administrator to deploy and manage
all endpoints through a single console with real-time threat visibility across
laptops, desktops, mobile devices, servers, and cloud workloads.

The Only Solution with Integrated Breakthrough Security Technologies


Symantec Endpoint Security is the only solution with full Endpoint Detect
and Response (EDR), Breach Prevention, App Isolation, and App Control
capabilities integrated with Endpoint Protection.
Symantec Endpoint Security Solutions
Solution Brief

Autonomous Security Management


Symantec Endpoint Security delivers autonomous security management that learns from admins, organization or
community to continuously assess and strengthen your security posture. It also leverages Artificial intelligence (AI)
guided management for establishing strong security policies with fewer misconfigurations to help improve overall
security hygiene and posture.

Real-Time Threat Information


Symantec Endpoint Security leverages real-time threat information, threat analytics, content classification, and
comprehensive threat blocking data from the Symantec Global Intelligence Network.

Extensible and Integrated


Symantec Endpoint Security allows you to integrate third party applications like Microsoft Graph, Open C2, and
other Symantec solutions through Symantec ICDx, an open API.

Easy Endpoint Security Management


Symantec’s Endpoint Security portfolio includes tools that help you manage your endpoint security deployments
and workflows.

The Most Award-Winning Solution on the Market


Symantec’s Endpoint Security Portfolio continues to get rave reviews and multiple awards for industry leadership,
performance, efficacy.

“After implementing Symantec Endpoint Security, we achieved some stunning


results. We have seen a 60 percent drop in malware events.”
− Vicki Gavin, Compliance Director | The Economist

“We feel Symantec Endpoint Security provides an effective and business-friendly


approach that within hours of deploying, was able to identify a threat that would
have previously gone undetected.”
− Brian Jacome, Senior Product Manager | ROYAL BANK OF CANADA

Awards
• Radicati APT Market Quadrant Top Player 2019
• Radicati Endpoint Security Market Quadrant Top Player 2018
• Leader Forrester Wave Endpoint Security Suites 2019
• 2018 Endpoint Security Vendor of the Year
• SEP Mobile leader in IDC MarketScape: WW Mobile Threat Management Security Software 2018 Vendor
Assessment
• AV-Test Best Protection Winner (four times consecutively)
• 2019 Best Enterprise Endpoint; Highest AAA ranking for past 25 consecutive quarters
• SC Magazine Recommended “We love this product.” Award
• CRN’s Product of the Year
• Cloud Workload Protection Suite
Symantec Endpoint Security Solutions
Solution Brief

A Look at the Portfolio


Symantec’s Endpoint Security Portfolio helps you prevent, harden, detect, and respond to emerging threats across
laptops, desktops, tablets, mobile phones, servers, and cloud workloads. It protects your business across the entire
attack chain.

Pre-Attack Attack Breach Post Breach

ATTACK SURFACE ATTACK BREACH DETECTION &


REDUCTION PREVENTION PREVENTION RESPONSE
• Breach Assessment • Malware Prevention • Deception • Targeted Attack Analytics
• Vulnerability Remediation • Exploit Protection • Active Directory Defense • Behavioral Forensics
• Device Control • Behavior based Prevention • Auto-managed Policies • Expert SOC Investigator
• Application Control and • Secure Connection: Wi-Fi, • Network Firewall and • Threat Hunting and Rapid
Isolation Network Integrity and Smart Intrusion Prevention Response
VPN
• Endpoint Security Deployment
and Workflow Management
• Storage Protection
• Human-machine interface and
• Cloud Workloads and Container Protection
operational technology

To learn more about these solutions and the Endpoint Security portfolio, go to Symantec.com or reach out to
your Broadcom Sales Representative.

For product information and a complete list of distributors, visit our website at: broadcom.com
Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom.
SED-ES-SB100 March 6, 2020

You might also like