sb-nz logo
Story image

Symantec updates endpoint security offering

16 Oct 2019

Cybersecurity company Symantec has announced a revamp to its endpoint portfolio with Symantec Endpoint Security (SES), which now delivers protection, detection and response, as well as new attack surface reduction, threat hunting, and breach assessment and prevention capabilities.

To safeguard their organisations from modern and sophisticated attacks, security teams need simple, comprehensive and flexible solutions.

They also need automated assistance with security management to evaluate risks and take action to secure their organisation.

SES solves for these needs, finding and stopping attacks with analytics honed by Symantec’s world-renowned security experts.

Customers can deploy and manage SES via the cloud or on-premises, or a hybrid of both, for all operating systems including mobile devices, with single-agent installation.

“Leveraging a single agent, the new Symantec Endpoint Security platform adds new breach assessment and prevention capabilities, support for in-house threat hunting activities with analytics and managed threat hunting services where organisations lack resources or skills,” says Enterprise Strategy Group’s Dave Gruber.

Symantec Endpoint Security is designed to meet the needs of every type of organisation, with Symantec experts providing proactive managed threat hunting, remote investigations, and pre-authorised remediation for organisations that can’t or don’t want to manage these key capabilities themselves.

Enterprise customers with in-house investigation resources can opt for the brand new Threat Hunting Centre add-on, which automates threat hunting across all security devices present in an organisation’s Security Operations Centre (SOC), enabling rapid response across billions of events.

Threat Hunting Centre customers will experience prioritised key alerts, reduced false positives, and faster investigations and incident remediation.

The Threat Hunting Centre integrates threat intelligence from a variety of sources and will provide retrospective analysis and proactive searches for unknown Indicators of Compromise (IOC’s) in the environment to pinpoint threats and in-process attacks that might not otherwise have been detected.

“Symantec Endpoint Security is equipped to actively reduce the attack surface, eliminating the threat of serious attacks like targeted ransomware. And SES gives customers visibility into attacker activity on the device, leveraging cloud analytics that can spot the most hidden targeted activity,” says Symantec endpoint solutions SVP and GM Adam Bromwich.

Story image
Zero trust security gaining momentum as a cybersecurity model
The model is centred on the belief that organisations should not automatically trust anything inside or outside its perimeters and instead must verify anything trying to connect to its systems before granting access, according to CSO.More
Story image
Interview: RSA explains security in the epoch of IT disruption
We discussed cybersecurity in terms of how it fits into business continuity, as well as the threat landscape, and what RSA is currently doing to assist businesses that need protection.More
Story image
Email attacks up 667% following rise of COVID-19 worldwide
Of the COVID-19 related attacks detected by Barracuda Sentinel through March 23, 54% were scams, 34% were brand impersonation attacks, 11% were blackmail, and 1% are business email compromise.More
Story image
Organisations take cloud-first approach to security, though concerns remain
"While the results of this survey show that some security professionals still have concerns, having visibility into cloud services is vital and many organisations are now taking a cloud-first approach to security.”More
Story image
Acronis appoints new APAC General Manager and launches Partners Programme
One of Morarji’s first objectives has been to launch the new Acronis Partner Programmes in APAC, in which the Acronis team will help channel partners and managed service providers (MSPs) expand their portfolios and deliver fast ROI.More
Story image
Guardicore Labs exposes brute force MS-SQL attack campaign
The cyber attack campaign uses password brute force to breach victim machines, deploys multiple backdoors and executes numerous malicious modules, such as multifunctional remote access tools (RATs) and cryptominers. More