Web Design Atlanta Georgia Web Site Design Company - Mayasoft Georgia Web Site Design Services

Symantec Endpoint Protection

Symantec Endpoint Protection Symantec Endpoint Protection 11.0 combines Symantec AntiVirus with advanced threat prevention to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.
Contact your Account Executive for more info.

Key Features

  • Seamlessly integrates essential technologies such as antivirus, antispyware, firewall, intrusion prevention, device control.
  • Requires only a single agent that is managed by a single management console.
  • Provides unmatched endpoint protection from the market leader in endpoint security.
  • Enables instant NAC upgrade without additional software deployment for each endpoint.

Key Benefits

  • Stops malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits.
  • Prevents security outbreaks thus reducing administrative overhead.
  • Lowers total cost of ownership for endpoint security.

New Features

Single Agent and Single Console

Delivers a single agent for all Symantec Endpoint Protection technologies and Symantec Network Access Control. Delivers a single integrated interface for managing all Symantec Endpoint Protection technologies and Symantec Network Access Control. All allow for a single communication method and content delivery system across all technologies.
  • Provides operational efficiencies such as single software updates, single policy updates.
  • Provides unified and central reporting.
  • Provides unified licensing and maintenance.
  • Requires no change to the client when adding Symantec Network Access Control enforcement.
  • Lowers Total Cost of Ownership for endpoint security.
  • Reduces administrative effort.

Proactive Threat Scanning

Behavioral-based protection that protects against zero-day threats and threats not seen before. Unlike other heuristic-based technologies, Proactive Threat Scan scores both the good and bad behavior of unknown applications, providing a more accurate malware detection.
  • Accurately detects malware without the need to set up rule-based configurations.
  • Helps lower the number of false positives.

Advanced Rootkit Detection and Removal

Provides superior rootkit detection and removal by integrating VxMS (Veritas Mapping Serviceā€”a Veritas technology), thereby providing access below the operating system to allow thorough analysis and repair.
  • Detects and removes the most difficult rootkits.
  • Saves time and money and productivity lossses associated with re-imaging infected machines.

Application Control

Allows administrators to control access to specific processes, files, and folders by users and other applications. It provides application analysis, process control, file and registry access control, and module and DLL control. It enables administrators to restrict certain activities deemed as suspicious or high risk.
  • Prevents malware from spreading or harming endpoints.
  • Locks down endpoints to prevent data leakage.

Device Control

Controls which peripherals can be connected to a machine and how the peripherals are used. It locks down an endpoints to prevent connections from thumb drives, CD burners, printers, and other USB devices.
  • Prevents sensitive and confidential data from being extracted or stolen from endpoints (data leakage).
  • Prevents endpoints from being infected by viruses spread from peripheral devices.
How We Can Help
From software development, business analysis, to network equipment, mp3 players, and from a domain name to a 1,000-page web site, we provide solid solutions with winning results. Here is our menu of key services.
Interactive Media
Web site Design
User-Centered Design
   Application Design
Database Development
Proof of Concept
Project Solutions
IT Management
Business Analysis
Quality Assurance
   Network Solutions
Enterprise Servers
VOIP, Security
Storage Management
IT Staffing
Technical Consulting
Contract Staffing
Project Management
   Workflow Solutions
Process Automation
Process Integration
Document Management
We Know Technology
Our profound knowledge of technology will translate into a smooth project from design to deployment.
Programming Cold Fusion, Active Server Pages, UNIX, HTML, Flash, JavaScript, UML, DHTML, HTML, CSS, COBOL, VISUAL BASIC, C++, JAVA
Databases MS Access, MS SQL Server, Oracle, Sybase
    Copyright © 1998 - 2010 Mayasoft, LLC