Symantec Endpoint Security Complete (Includes New SES/SEP Subscription), Hybrid Subscription License with Support, Per Device, 3Y Mã sản phẩm: SESC-SES-SUB-3Y

    6,720,000 vnđ

    (Giá chưa VAT)

Industry-Leading Protection for All Your Endpoints

Symantec Endpoint Security (SES) Complete delivers comprehensive protection for all your traditional and mobile devices across the entire attack chain. Symantec endpoint innovations include behavioral isolation, Active Directory security, and Threat Hunter technologies to protect your endpoints against sophisticated threats and targeted attacks. For higher return-on-investment and lower total cost of ownership, this single-agent solution supports on-premises, hybrid, and cloud-based deployments.

 
Why SES Complete
SED_Endpoint_Security

Best Protection

Industry-leading solution that addresses threats across the entire attack chain.

SED_On_Premise

Broadest Infrastructure Support

Protection for corporate and remote employees by supporting all devices and operating systems with on-premises, cloud, or hybrid management.

Icon_SED_Value

Best Value

Highest ROI with easy deployment and management as a single-agent/single console architecture combining many innovative security layers all in one.

Use Cases

Explore the many ways you can use SES Complete to solve your toughest security challenges.

Defend against attacks at all stages

When an attacker strikes, you need multiple defenses for whatever comes your way. SES Complete’s multi-layered protections are ready should you face a real-world attack.

 

Build a strong foundation, based on prevention

Endpoint security starts with prevention—stopping threats and attacks before they strike. Besides a safer, more compliant environment, your security team will have fewer alerts to investigate and endpoints to remediate.

 

Protect all endpoint devices and operating systems

Attacks are rapidly accelerating, and the attack surface has grown with the increase in remote workers and proliferation of macOS and mobile devices.

  • Protect all endpoint: laptops, desktops, mobile phones, tablets, and servers
  • Defend all key operating systems: Windows, macOS, Linux iOS, and Android
 

Defend against living-off-the-land attacks

Highly sophisticated attackers leverage “living-off-the-land” techniques to blend in with normal activity and fly under the radar. While you can’t turn off legitimate applications and dual-use tools, you can protect your endpoints from these threats with Adaptive Protection:

  • Customize security to your environment automatically, and make it harder for attackers to plan and execute attacks
  • Maximize productivity by hardening your devices without fear of false positives and the disruptions they cause
  • Automate policy updates with AI to reduce expensive configuration overhead and lower incidents that SOC analysts must investigate
 

Stop Active Directory attacks from gaining total domain dominance

Nearly every organization uses Active Directory, which is why nearly every advanced persistent threat targets it. Active Directory is accessible from every domain-connected endpoint and attackers can use it for lateral movement, so you must protect your organization with Active Directory security.

  • Use AI-driven obfuscation for Active Directory query results.
  • Prevent attackers from stealing AD information and credentials.
  • Block lateral movement at the point of breach.
 

Expose attacks and stop them fast

Security teams face many challenges when attempting to fully expose the extent of advanced attacks, especially when attackers use stealthy techniques to evade detection. Security teams need powerful endpoint detection and response (EDR) capabilities in their endpoint solution.

  • Discover and resolve threats with deep endpoint visibility and superior detection analytics.
  • Reduce time to remediation.
  • Streamline SOC operations with pre-built apps for SIEM, orchestration, and ticketing systems.
 

Leverage Symantec threat hunting expertise

Massive amounts of alert data can overwhelm your security team, especially when they have no global context to uncover targeted attacks. That’s why Symantec created Threat Hunter, a service that combines both local and global telemetry, machine learning analytics, and manually reviewed/validated analysis from Symantec’s expert threat hunters to expose attacks in your organization that would otherwise evade detection.

  • Gathers global threat intelligence from organizations of all sizes
  • Identifies earliest signs of hidden attacks in your organization
  • Notifies your SOC through the SES Complete console
 

Add real-time threat enrichment

Symantec opens the breadth of its Global Intelligence Network (GIN), one of the world’s largest civilian threat collection networks in the world, to customers with a new feature embedded in SES Complete. Through API integration with partners whose tools are part of a daily workflow, SOC teams can easily identify the scope of an attack and streamline their threat investigations.

threat quotient

Siemplify

Anomali