Symantec 20016664 Hoja De Datos

Descargar
Página de 8
Data Sheet: Endpoint Security
Symantec™ Protection Suite Enterprise Edition
Confidence in a connected world.
Page 3 of 8
Flexible and scalable configuration — Meet IT policy
requirements with granular control over policies and
features which are easily configurable and selectively
deployable
Eliminate environment complexity — Deploy
integrated essential endpoint and messaging security
technologies as unified solutions with coordinated
management
Streamline processes — Eliminate additional steps and
costs with one decision, one purchase, and one vendor
for complete protection
Reduce Operational Costs — Reduce the time, cost,
and expertise needed to manage multiple technologies
Control Automatically
Automatic backup & recovery, monitoring, updating,
and enforcement
Ensure Compliance — Achieve, prove, and enforce
adherence to IT policy and regulatory objectives with
ease
Regulate sensitive information — Identify and control
the flow of sensitive information via email and IM, as
well as on to and off of endpoints
Effortlessly update — Adapt to risks faster and take
action within minutes with the Symantec Global
Intelligence Network, one of the largest security
research networks in the world
Gain increased visibility into your environment —
Provide increased visibility into actions, events, and
status from endpoints and messaging infrastructure
with insightful reporting
Minimize Downtime — Get your business systems back
up and running quickly by restoring from both
event–driven and scheduled recovery points
Key features
Antivirus and antispyware—Provides unmatched,
best-of-breed malware protection, including
market-leading antivirus protection, enhanced spyware
protection, new rootkit protection, reduced memory
footprint, and new dynamic performance adjustments to
keep users productive.
Network threat protection—A rules-based firewall
engine and Generic Exploit Blocking (GEB) block
malware before it can enter a system.
Proactive threat protection—Protecting against
unseen threats (i.e. zero-day threats), it includes
TruScan Proactive Threat Scan, which does not rely on
threat signatures.
Single agent and single management
console—Antivirus, antispyware, desktop firewall,
intrusion prevention, device and application control, and
network access control are all in a single agent —
managed by a single management console.
Antivirus for Linux, Mac, and Windows
Mobile—Remove viruses from email attachments,
Internet downloads, and other sources to safeguard the
enterprise network. Enables secure mobile computing by
providing comprehensive virus protection against
malicious threats that target Windows Mobile operating
systems.