Symantec Endpoint Protection, Subscription License with Support, 1-99 Devices, 3Y Mã sản phẩm: SEP-SUB-1-99-3Y

    2,490,000 vnđ

    (Giá chưa VAT)
    •  Cho máy chủ (servers) hoặc máy trạm (Clients)
    •  Phiên bản bán luôn mới nhất
    •  Phù hợp cho doanh nghiệp sử dụng từ 1 - 999 thiết bị
Symantec Endpoint Protection (SEP) uses the following core features to protect against known and unknown threats.
Symantec Endpoint Protection
 uses a layered approach to defense. The comprehensive approach protects the network before, during, and after an attack. 
Symantec Endpoint Protection
 reduces your risk of exposure by providing tools to increase your security posture ahead of any attack.
For the datasheet on Symantec Endpoint Protection, see: Symantec Endpoint Protection 14
To get complete protection for the computers in your network, enable all protections at all times.
For more information, see:
Symantec Endpoint Protection
 uses the following holistic security approach to protect your environment across the entire attack chain, using the following stages: incursion, infection, infestation and exfiltration, and remediation and inoculation.
Phase 1: Incursion
During the incursion phase, hackers typically break into the organization's network using target attacks such as social engineering, zero-day vulnerabilities, SQL injection, targeted malware, or other methods.
Symantec Endpoint Protection
 protects against attacks before they enter your system using the following technologies:
Phase 2: Infection
In targeted attacks, hackers typically break into the organization's network using social engineering, zero-day vulnerabilities, SQL injection, targeted malware, or other methods.
Symantec Endpoint Protection
 uses the following technologies to detect and prevent these attacks before they infect your system:
  • Memory Exploit Mitigation
    : Detects malware.
  • File reputation analysis (Insight)
    : Based on the artificial intelligence that uses Symantec's global intelligence network. This advanced analysis examines billions of correlated linkages from users, websites, and files to identify and defend against rapidly-mutating malware. By analyzing key attributes (such as the origin point of a file download) , Symantec can accurately identify whether a file is good or bad and assign a reputation score all before the file arrives on the client computer. See:
  • Advanced machine learning
    : Analyzes the trillions of examples of the good files and bad files that are contained in a global intelligence network. Advanced machine learning is a signatureless technology that can block new malware variants at the pre-execution. See:
    How does 
    Symantec Endpoint Protection
     use advanced machine learning?
  • High-speed emulation
    : Detects hidden malware using polymorphic custom packers. A scanner runs each file in milliseconds in a lightweight virtual machine that causes threats to reveal themselves, improving both the detection rates and performance. See:
  • Antivirus file protection (Virus and Spyware Protection)
    : Uses signature-based antivirus and file heuristics to look for and eradicate malware on a system to protect against viruses, worms, Trojans, spyware, bots, adware, and rootkits. See:
     
  •  
  • Behavioral analysis (SONAR)
    : Leverages machine learning to provide zero-day protection, stopping new and unknown threats by monitoring nearly 1,400 file behaviors while they execute in real time to determine file risk. See:
Phase 3: Infestation and Exfiltration
Data exfiltration is the unauthorized transfer of data from a computer. Once the intruders control these target systems, they may steal intellectual property or other confidential data. Attackers use captured information for analysis and further exploitation or fraud.
  • Intrusion Prevention/Firewall
    : Block threats as they travel through the network.
  • Behavioral analysis
    : Helps stop the spread of infection.
Phase 4: Remediation and Inoculation
Symantec Endpoint Protection
 includes a single console and agent that offers protection across operating systems, platforms, and businesses of any size.
  • Power Eraser
    : An aggressive tool, which can be triggered remotely, to address advanced persistent threats and remedy tenacious malware. See:
  • Host Integrity
    : Ensures that endpoints are protected and compliant by enforcing policies, detecting unauthorized changes, and conducting damage assessments. Host Integrity then isolates a managed system that does not meet your requirements. See:
  • System Lockdown
    : Allows applications (that are known to be good) to run, or blocks the applications (known to be bad) from running. In either mode, System Lockdown uses checksum and file location parameters to verify whether an application is approved or unapproved. System Lockdown is useful for kiosks where you want to run a single application only. See:
  • Secure Web Gateway Integration
    : Uses programmable REST APIs to make integration possible with Secure Web Gateway, to help quickly stop the spread of infection at the client computer.
  • EDR Console Integration
    Symantec Endpoint Protection
     is integrated with 
    Symantec EDR
     and is designed to detect, respond, and block targeted attacks and advanced persistent threats faster by prioritizing attacks. EDR (Endpoint Detection and Response) capability is built into 
    Symantec Endpoint Protection
    , which makes it unnecessary to deploy additional agents. See:
 
 
 
 
 
 
Liên hệ Bộ phận Kinh doanh để nhận được giá tốt nhất:
✓ TP HCM: (028) 7307 3776 
✓ Hà Nội: (024) 7307 3776
Siêu Thị Máy Chủ - Sự lựa chọn tốt nhất về Server với chi phí hợp lý, sản phẩm đáng tin cậy, phục vụ chuyên nghiệp!