Symantec Endpoint Protection 15: at A Glance
Symantec Endpoint Protection 15: at A Glance
At a Glance
Enhanced security efficacy                                               •	 Use AI-guided security management to drive more accurate
                                                                            policy updates, fewer misconfigurations, and greater
•	 Unmatched efficacy via interlocking prevention technologies
                                                                            administrative productivity to improve overall security hygiene
   using artificial intelligence (AI) techniques (advanced machine
   learning and behavior analysis) coupled with time-tested              Broadest integrations
   prevention technologies
                                                                         •	 Orchestrated defense and response at the endpoint quickly stop the
•	 Strengthened security posture with intelligence gathered                 attack’s spread via integrations across Symantec portfolio
   by deception technology when attackers trigger easy-to-
   implement deceptors                                                   •	 Deeper visibility and reduced complexity using shared
                                                                            intelligence across Symantec Integrated Cyber Defense Platform
•	 Unparalleled endpoint visibility and protection with telemetry           and extensive integrations across Symantec and
   from the world’s largest civilian threat intelligence network            third-party products
Simplified management                                                    •	 Strong security posture via open APIs to coordinate with third-
                                                                            party IT security solutions (e.g., orchestration, automation,
•	 Manage complete endpoint security from single cloud console
                                                                            ticketing, and SIEM)
•	 Reduce update fatigue with minimal footprint of Symantec single
   agent stack
Introduction
                                                                                                            Anti malware
Attackers are using more sophisticated attacks to infiltrate networks, and the
endpoint represents the last line of defense. Ransomware attacks are trending
upward as evidenced by the WannaCry and Petya outbreaks. In addition,                                                           Advanced
attackers’ expanding use of fileless and stealthy attacks combined with ‘living           Deception                              Malware
off the land’ (using common IT tools for attacks) techniques threatens the                                                      Protection
confidentiality, integrity, and availability of endpoint assets.
                                                                                                            Symantec
So, what can security teams do to address cyber attacks? Managing multiple                                   Endpoint
point products and technologies is overwhelming, and challenges mount when                                  Protection
managing security across multiple geographies with diverse operation systems
                                                                                           Exploit                               Endpoint
and platforms. With limited resources and limited budgets, security teams want
                                                                                         Prevention                            Detection and
easy-to-manage technologies that integrate with each other to improve overall                                                   Response
security. They do not need just another point product. See Figure 1.
                                                                                                             Application
                                                                                                            Isolation and
                                                                                                               Control
                                                                                                                                         EN
compromising productivity, so that you can focus on your business. SEP enables
EV
                                                                                                                                           ING
                                                                                                PR
security personnel to execute on many security use cases as outlined in Figure 2.
                                                                                              D E T EC
Prevention
TI O
                                                                                                                                          ON
SEP protects endpoints regardless of where attackers strike on the attack chain
                                                                                                     N
as shown in Figure 3. SEP security efficacy leads the industry as validated by third
                                                                                                                                         TI
                                                                                                         RE                              EP
                                                                                                         &
parties. This level of prevention is only possible with a combination of proven, core                         SP                     C
technologies and new, innovative technologies.                                                                     ONS            DE
                                                                                                                         E
Advanced capabilities
•	 Global Intelligence Network (GIN)—The world’s largest civilian threat intelligence network collects data from millions of attack sensors;
   that data is analyzed by more than a thousand highly skilled threat researchers to provide unique visibility into threats.
•	 Reputation Analysis—Determines safety of files and websites using artificial intelligence techniques in the cloud and powered by the GIN.
•	 Emulator—Uses a lightweight sandbox to detect polymorphic malware hidden by custom packers.
     IT deploys               Adversary                Attacker moves laterally             SEPM alerts SOC                 SOC staff uses
     deceptors                 launches                for reconnaissnace and               staff (or MSS) to             learned adversary
                             multi-phased                     trips decoy                      investigate                   behavior to
                            stealthy attack                                                                              strengthen defenses
SEP includes the capability to plant deceptors (i.e., bait) for exposing    Using TAA, Endpoint Detection and Response (ATP: Endpoint)
hidden adversaries and revealing attacker intent and tactics via early      customers benefit from ongoing delivery of new attack analytics
visibility, so that the information can be used to enhance your security    and generation of custom incidents, covering detailed analysis of
posture. It features accurate and insightful detection while delivering     attacker methods, impacted machines, and remediation guidance—
fast time to value. Joint SEP and Symantec Managed Security Services        all at no additional cost.
customers benefit from 24x7 real-time deception monitoring and
response by a global team of experts. Symantec is the only endpoint         Symantec Endpoint Detection and Response:
protection platform vendor offering deception.                              •	 Detects and exposes—Reduces time to breach discovery and
                                                                               quickly exposes scope.
SEP:
                                                                            •	 Investigates and contains—Increases incident responder
•	 Uses lures and baits for active security to expose and                      productivity and ensures threat containment.
   delay attackers.
                                                                            •	 Resolves—Rapidly fixes endpoints and ensures threat does
•	 Determines attacker intent to improve security posture.                     not return.
•	 Delivers deception at scale to simplify rollout                          •	 Enhances Security Investments—Takes advantage of prebuilt
   and management.                                                             integrations and public APIs.
                                                                         High-performance,
options, SEP can accommodate that too.
Symantec Endpoint Protection client must run one of the following Windows desktop operating systems to run Symantec Endpoint Protection Hardening:
 • Windows 7 (RTM and SP1), Professional, Enterprise                                                    • Windows 10 Anniversary Update (version 1607), Professional, Enterprise
 • Windows 8, Professional, Enterprise                                                                  • Windows 10 Creators Update (version 1703), Professional, Enterprise
 • Windows 8.1 (update for April 2014 and August 2014; Windows To Go), Professional,                    • Windows 10 Fall Creators Update (version 1709), Professional, Enterprise
   Enterprise                                                                                           • Windows 10 April 2018 Update (version 1803), Professional, Enterprise
 • Windows 10 (RTM), Professional, Enterprise                                                           • Windows 10 October 2018 Update (version 1809), Professional, Enterprise
 • Windows 10 November Update (version 1511), Professional, Enterprise                                    (32-bit, 64-bit)
* System requirements are for SEP 15. For a complete list of system requirements visit our support page.
    About Symantec
    Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments, and people secure their most important data
    wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud, and
    infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital
    lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most
    advanced threats. For additional information, please visit www.symantec.com, subscribe to our blogs, or connect with us on Facebook, Twitter, and LinkedIn.
350 Ellis St., Mountain View, CA 94043 USA | +1 (650) 527 8000 | 1 (800) 721 3934 | www.symantec.com
Copyright ©2019 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered                            19C199762_ds_SEP15_EN
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.