Symantec End Point Security Data Sheet
Symantec End Point Security Data Sheet
1: The 2017 State of Endpoint Security Risk, Ponemon Institute LLC, November 2017.
2: You’re Just 7 Minutes Away from an Infinite Toxic Loop in Your Network, Symantec Blog, April 2019.
Solution Overview
Symantec Endpoint Security Complete delivers the most comprehensive
Enterprise Version and integrated endpoint security platform on the planet. As an on-
premises, hybrid, or cloud-based solution, the single-agent Symantec
Key Features platform protects all traditional and mobile endpoints, providing
• Protects laptops, desktops, mobile interlocking defenses at the device, application, and network level, and uses
phones and tablets artificial intelligence (AI) to optimize security decisions. A unified cloud-
• Single agent for endpoint security based management system simplifies protecting, detecting, and responding
to all the advanced threats targeting your endpoints.
• Single console with real-time threat
visibility Unmatched Endpoint Safety for Your Organization
• Flexible deployment: on-premises, Symantec Endpoint Security provides your organization with the best
cloud-managed and hybrid models security at the endpoint for both traditional and mobile devices across
• Artificial Intelligence (AI) guided the three attack phases—Pre-Attack, Attack, and Post Attack—with an
security management emphasis on prevention across the attack chain for rapid containment.
Proactive attack surface reduction and innovative attack prevention
• Global Intelligence Network, one of
technologies provide the strongest defense against the hardest-to-
the largest, delivers real-time threat
detect threats that rely on stealthy malware, credential theft, fileless, and
information
“living off the land” attack methods. Symantec also prevents full-blown
• Integration with third-party breaches before exfiltration can occur. Sophisticated attack analytics,
applications like Microsoft Graph, behavior forensics, automated investigation playbooks, and industry-first
Open C2, and other Symantec lateral movement and credential theft prevention provide precise attack
solutions through Symantec detections and proactive threat hunting to contain the attacker and resolve
Integrated Cyber Defense Exchange persistent threats in real time.
(ICDx)
3: Supported on Win 10, Win 10 in S Mode, iOS, and Android devices only.
Attack Prevention
Symantec multilayer attack prevention immediately and effectively protects against file-based and fileless attack
vectors and methods. Its machine learning and artificial intelligence uses advanced device and cloud-based
detection schemes to identify evolving threats across device types, operating systems, and applications. Attacks
are blocked in real-time, so endpoints maintain integrity and negative impacts are avoided.
• Malware Prevention combines pre-execution detection and blocking of new and evolving threats (advanced
machine learning, sandboxing to detect malware hidden in custom packers, and suspicious file behavioral
monitoring and blocking), and signature-based methods (file and website reputation analysis and malware
scanning).
• Exploit Prevention blocks memory-based zero-day exploits of vulnerabilities in popular software.
• Intensive Protection separately enables fine-grained tuning of the level of detection and blocking to optimize
protection and gain enhanced visibility into suspicious files.
• Network Connection Security identifies rogue Wi-Fi networks, utilizes hotspot reputation technology, and
delivers a policy-driven VPN to protect network connections and support compliance.
Breach Prevention
The Symantec prevention approach entails containing attackers as early as possible—at the endpoint—before they
have any opportunity to persist on the network. Various AI-driven deception and intrusion prevention technologies
work together to thwart network persistence before and immediately following endpoint compromise—before a
full-blown breach can occur.
• Intrusion Prevention and Firewall blocks known network and browser-based malware attacks using rules and
policies and prevents command and control setup with automated domain IP address blacklisting.
• Deception uses lures and baits (fake files, credentials, network shares, cache entries, web requests, and
endpoints) to expose, determine attacker intent and tactics, and delay attackers through early visibility.
• Active Directory Security defends the primary attack surface for lateral movement and domain admin credential
theft by controlling the attacker’s perception of an organization’s Active Directory resources from the endpoint
using unlimited obfuscation (meaning fake asset and credential creation). With obfuscation, the attacker gives
themselves away while interacting with fake assets or attempting the use of domain admin credentials on Active
Directory’s perception.
• Auto-managed Policies, based on advanced AI and ML, uniquely combines indicators of compromise and
historical anomalies to continuously adapt endpoint policy thresholds or rules and keep them up-to-date and
aligned with the current risk profile of your organization.
• Behavior Forensics provides the ability to record and analyze endpoint behavior to identify Advanced Attack
Techniques that may be using legitimate applications for malicious purposes. This data is enriched with the
MITRE ATT&CK framework to help guide incidents responders during investigations.
• Advanced Threat Hunting tools are provided in Symantec EDR including built-in playbooks that encapsulate the
best practices of skilled threat hunters and anomalous behavior detection. Incident responders can hunt across
the enterprise for IOCs to include directly querying the endpoint.
• Integrated Response takes direct action on the endpoint to remediate by retrieving files, deleting files, isolating
endpoints, and blacklisting. Symantec EDR supports automatic submission of identified suspicious files to
sandboxing for complete malware analysis including exposing malware that is VM-aware.
Web Sandbox
Endpoint
+
Network
Telemetry Automation
Symantec
Analytics Endpoint Public APIs/
SIEM and Orchestrated Ticketing
Visibility Response
Threat Security
Analytics Orchestration
Features
Industry standard in Endpoint Extends SEP to all OSs and Adds advanced protection, EDR,
Protection. 5 years running all devices including mobile. threat hunting, and other
as #1 Protection and now also Offers cloud management. technologies for complete
#1 Performance by AV Test. protection.
MANAGEMENT
OPTIONS
On-Premises On-Premises Cloud Hybrid
DEVICE COVERAGE
Corporate Owned, BYOD, UYOD
Laptop Desktop Server Mobile Tablet Laptop Desktop Server
Protection Technologies
INDUSTRY-BEST
ATTACK DECEPTION
PREVENTION
ACTIVE
MOBILE THREAT
DIRECTORY
DEFENSE
SECURITY
SECURE
RESPONSE AND REMEDIATION
NETWORK
CONNECTION ENDPOINT
DETECTION
AND RESPONSE
ATTACK SURFACE REDUCTION
TARGETED
BREACH
ATTACK CLOUD
ASSESSMENT
ANALYTICS
BEHAVIORAL BEHAVIORAL
ISOLATION FORENSICS
APPLICATION THREAT
CONTROL HUNTER
DEVICE RAPID
CONTROL RESPONSE
INTRUSION DISCOVER
PREVENTION & DEPLOY
HOST INTEGRITY
FIREWALL CHECKS