Symantec Endpoint Protection-logo

Symantec Endpoint Protection - Security

(28)
  • Deployment:
  • Company Size:SML
  • Features:
  • Platforms:
  • Pricing:

Details

Symantec Endpoint Protection defends businesses from both malware and targeted attacks—protecting against new and unknown threats.

Symantec Endpoint Protection uses Symantec’s Insight platform to collect and collate data from over 200 million systems in 200-plus countries. It uses this data to identify and create a security rating for every file accessed through the Internet. As a result, it stops targeted attacks and advanced, persistent threats with a degree of protection that far exceeds the capacities of traditional anti-virus.

Symantec Endpoint Protection Small Business Edition is a cybersecurity defense suite specifically designed for needs of the small business.Core features include antivirus, antispyware and a firewall to protect laptops, desktops and file servers from online threats and hackers. The solution also analyzes downloaded files and applications for potential threats, which prevent employees from triggering attacks.

Features

Pricing Model
  • Monthly subscription per user
  • Yearly subscription per user
  • Metered per minute
  • Monthly site license
  • Yearly site license
  • Flat fee
  • Monthly subscription
  • Percentage-based (% of collections or claims)
  • Fee-based (fixed $/claim)
  • Hybrid (combination of % and fixed amount/claim)
Target Company Size
  • Startup
  • Small-to-Medium Business
  • Enterprise
Service Terms Offered
  • Commitment Free
  • Free Setup
  • Free Cancellation
  • Money Back Guarantee
  • Month-to-Month Option
  • Keep Original Number
  • Customizable Plans
  • Free In-Network Calls
  • Unlimited Minutes
  • International Calls
  • Reduced Price for Multiple Users
  • Account Manager
Support Features
  • FAQs Section
  • Tutorials
  • Telephone Support
  • Email Support
  • 24/7 Support
  • Online Chat
  • Forum
  • In-Person Training
  • Social Media
  • Knowledge Base
  • Webinars
Compatible Operating System(s)
  • Windows
  • iOS
  • Linux
  • Mac
  • Android
Deployment
  • Hosted/Cloud
  • On-Premise
  • Mobile
Mobile friendly?
  • Yes
  • No
Price
  • 1 - Inexpensive
  • 2
  • 3 - Moderate
  • 4
  • 5 - Expensive
Features
  • 1 - Limited features
  • 2
  • 3 - Moderate
  • 4
  • 5 - Full featured
Security Features
  • Multi-Factor Authentication
  • Endpoint Security
  • Anti-Virus Protection
  • Malware Protection
  • Single Login
  • App Catalog
  • Unified Directory
  • Adaptive Authentication
  • Mobile Identity
  • Compliance
  • User Provisioning
  • Virtual LDAP
  • Remote Wipe
  • Content Encryption
  • Digital Rights Management
  • Analytics and Reporting
  • Secure Content Storage and Sharing
  • e-Signature
  • Inbound and Outbound Traffic Filtering
  • Data Loss Prevention
  • Device Control
  • eDiscovery
  • Enterprise Mobility Management
  • Whitelists and Blacklists
  • File Tracing and Shadowing
  • Content Filtering
  • Static and Dynamic Attack Protection
  • Dashboards
  • Application Hardening
  • Application Behavior
  • Web Protection
  • Exploit Mitigation
  • Ransomware Mitigation
  • Payload Analysis
  • Policy Management
  • Cloud Protection
  • Network Security
  • Security Management
  • Server Security
  • Data Backup and Recovery
  • Gateway Security
  • Visualization
  • Firewall
  • Sandboxing
  • Spam Blocker
  • Email Protection
  • Security Trend Reporting
  • Password Security Enforcement

Pricing

Request a custom quote for your business

Get Pricing

Recommended Articles

4 Tips for Choosing Security Software Systems That Scale Along with Your Company Growth

Along with business innovation and growth comes the complexity of securing data, systems, and operations. With each i...

3 Reasons Cloud Security is More Important than Ever

Thanks to the availability and affordability of cloud-based infrastructure and business software solutions, the trend...

The Top 3 Companies Pioneering the IaaS Market

Cloud services and infrastructure companies such as AWS, Google Cloud, and Microsoft Azure give you all the tools and...

Anti-Virus Software Won't Protect Your Business

In today’s era of sophisticated hacks and with unprecedented levels of cybercrime and data breaches occurring, ...

4 Ways AI is Redefining Enterprise Security

Artificial Intelligence (AI) isn’t necessarily a new technology, but it’s been perceived more as a work o...

The Most Notorious Cyber Attacks Of the Past Decade

From Yahoo! to NotPetya - so much happened in the cyberspace during the course of these 10 years. Here's a flashback.

How to Protect Your Business from Known Cyber Security Risks

Maintaining tight cybersecurity within your business has some standard protocols - and the right security software is one of them.

Let's Make a Deal: Basic Steps for Switching to Cloud Computing

Moving your business data online doesn't have to be a scary proposition.

5 Steps Toward PCI DSS Compliance

The latest in credit-card protection requires a new approach.

Identity Theft: OpenID and What It Means for Web Security

The new open-source identity initiative is finally kick-starting online-identity standards.

Colocation-Center Security Trends

What are colocation datacenters doing to protect your company's assets?
Loading Reviews..