sb-eu logo
Story image

Symantec updates endpoint security offering

16 Oct 2019

Cybersecurity company Symantec has announced a revamp to its endpoint portfolio with Symantec Endpoint Security (SES), which now delivers protection, detection and response, as well as new attack surface reduction, threat hunting, and breach assessment and prevention capabilities.

To safeguard their organisations from modern and sophisticated attacks, security teams need simple, comprehensive and flexible solutions.

They also need automated assistance with security management to evaluate risks and take action to secure their organisation.

SES solves for these needs, finding and stopping attacks with analytics honed by Symantec’s world-renowned security experts.

Customers can deploy and manage SES via the cloud or on-premises, or a hybrid of both, for all operating systems including mobile devices, with single-agent installation.

“Leveraging a single agent, the new Symantec Endpoint Security platform adds new breach assessment and prevention capabilities, support for in-house threat hunting activities with analytics and managed threat hunting services where organisations lack resources or skills,” says Enterprise Strategy Group’s Dave Gruber.

Symantec Endpoint Security is designed to meet the needs of every type of organisation, with Symantec experts providing proactive managed threat hunting, remote investigations, and pre-authorised remediation for organisations that can’t or don’t want to manage these key capabilities themselves.

Enterprise customers with in-house investigation resources can opt for the brand new Threat Hunting Centre add-on, which automates threat hunting across all security devices present in an organisation’s Security Operations Centre (SOC), enabling rapid response across billions of events.

Threat Hunting Centre customers will experience prioritised key alerts, reduced false positives, and faster investigations and incident remediation.

The Threat Hunting Centre integrates threat intelligence from a variety of sources and will provide retrospective analysis and proactive searches for unknown Indicators of Compromise (IOC’s) in the environment to pinpoint threats and in-process attacks that might not otherwise have been detected.

“Symantec Endpoint Security is equipped to actively reduce the attack surface, eliminating the threat of serious attacks like targeted ransomware. And SES gives customers visibility into attacker activity on the device, leveraging cloud analytics that can spot the most hidden targeted activity,” says Symantec endpoint solutions SVP and GM Adam Bromwich.

Story image
Zero trust is the way to secure the distributed workforce - Empired
Existing security solutions need to evolve to accommodate the new remote workforce.More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More
Story image
Radware issues security alert, warning of global rise of DDoS-for-hire
Efforts from corporations, law enforcement and independent researchers around the world have attempted in the last two years to curb this growth – but the industry keeps growing says Radware information security researcher Daniel Smith.More
Story image
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option.More
Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
Phishing scam imitates SharePoint & OneNote for nefarious clicks
Sophos researchers say that the attackers take a slightly different approach to the standard ‘fake login’ phishing email.More