sb-au logo
Story image

Symantec updates endpoint security offering

16 Oct 2019

Cybersecurity company Symantec has announced a revamp to its endpoint portfolio with Symantec Endpoint Security (SES), which now delivers protection, detection and response, as well as new attack surface reduction, threat hunting, and breach assessment and prevention capabilities.

To safeguard their organisations from modern and sophisticated attacks, security teams need simple, comprehensive and flexible solutions.

They also need automated assistance with security management to evaluate risks and take action to secure their organisation.

SES solves for these needs, finding and stopping attacks with analytics honed by Symantec’s world-renowned security experts.

Customers can deploy and manage SES via the cloud or on-premises, or a hybrid of both, for all operating systems including mobile devices, with single-agent installation.

“Leveraging a single agent, the new Symantec Endpoint Security platform adds new breach assessment and prevention capabilities, support for in-house threat hunting activities with analytics and managed threat hunting services where organisations lack resources or skills,” says Enterprise Strategy Group’s Dave Gruber.

Symantec Endpoint Security is designed to meet the needs of every type of organisation, with Symantec experts providing proactive managed threat hunting, remote investigations, and pre-authorised remediation for organisations that can’t or don’t want to manage these key capabilities themselves.

Enterprise customers with in-house investigation resources can opt for the brand new Threat Hunting Centre add-on, which automates threat hunting across all security devices present in an organisation’s Security Operations Centre (SOC), enabling rapid response across billions of events.

Threat Hunting Centre customers will experience prioritised key alerts, reduced false positives, and faster investigations and incident remediation.

The Threat Hunting Centre integrates threat intelligence from a variety of sources and will provide retrospective analysis and proactive searches for unknown Indicators of Compromise (IOC’s) in the environment to pinpoint threats and in-process attacks that might not otherwise have been detected.

“Symantec Endpoint Security is equipped to actively reduce the attack surface, eliminating the threat of serious attacks like targeted ransomware. And SES gives customers visibility into attacker activity on the device, leveraging cloud analytics that can spot the most hidden targeted activity,” says Symantec endpoint solutions SVP and GM Adam Bromwich.

Story image
NVIDIA backs the future of hardware-based zero trust security
Check Point’s Infinity NEXT architecture will support NVIDIA DPUs by providing zero trust security. More
Story image
IBM Security completes industry first with updates to Cloud Pak for Security solution
"With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity."More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Lumen launches managed security services for APAC market
The new service is designed to provide enterprise businesses with a proactive, connected security strategy to enhance threat detection and protection across endpoints. More
Story image
Zoom to begin rolling out end-to-end encryption
Available starting from next week, it represents the first phase out of four of the company’s greater E2EE offering, which was announced in May following backlash that the company was lax on its security and privacy.More
Story image
Network visibility is the crux of security in 2020
Resilience sits at the heart of security, and there is a need for organisations’ architecture, processes and strategies to be more impervious in order to continue to ensure protection, writes Gigamon A/NZ manager George Tsoukas.More