Magazine article Internet@Schools

Symantec Endpoint Protection

Magazine article Internet@Schools

Symantec Endpoint Protection

Article excerpt

Company: Symantec Corp., 350 Ellis St., Mountain View, CA 94043, (650) 527-8000, www.symantec.com

Price: Symantec sponsors a program called SAMI, which offers a discount to help educational institutions manage IT security. Pricing is available online or by calling (800) 721-3934.

Audience: Symantec is geared toward IT managers and system administrators in a K-12 environment.

System Requirements: IGB RAM or higher, 900MB of free space on hard disk, web browser Microsoft Internet Explorer 7, 8, or 9 or Mozilla Firefox 3.6 or 4.0. Specific requirements are provided online for supported processors, Windows operating systems, Mac OS, and Linux operating systems.

Description: Symantec Endpoint Protection combines Symantec AntiVirus with advanced threat prevention. It integrates security technologies in a single agent and management console.

Reviewer Comments:

Installation/Access: Installation will need to be completed by an IT technician or a system administrator. Installation Rating: A

Content/Features: Symantec Endpoint Protection includes antivirus, anti-spyware, desktop firewall, intrusion prevention, and devices application control. Protection is available for Windows, Novell NetWare, Mac, or Linux environments.

It requires only a single agent managed by a single management console. This single integrated interface allows for a single communication method and content delivery system across all technologies.

It enables instant Network Access Control (NAC) upgrade without additional software deployment for each endpoint and provides operational efficiencies such as single software updates and single policy updates.

Unified and central reporting and unified licensing and maintenance are key features. There is no change to the client when adding NAC enforcement.

Symantec Endpoint provides Proactive Threat Scanning, which scores both the good and bad behavior of unknown applications, providing more accurate detection without the need to set up rulebased configurations.

An Advanced Rootkit Detection and Removal tool is provided by integrating Veritas Mapping Service, which provides access below the operating system.

Application Control allows administrators to control access to specific processes, files, and folders by users and other applications. It provides application analysis, process control, file and registry access control, and module and DLL control. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.