Servers Direct
Appliances Direct
Laptops Direct
Drones Direct
Better Bathrooms
Furniture 123
Dehumidifiers
Outdoor Living
Aircon
My AccountMy Account

Track my orderTrack Order Business AccountsBusiness Accounts Public Sector EnquiriesPublic Sector Enquiries
Inc. VAT vat switch show inc Ex. VAT Inc. VAT vat switch show ex Ex. VAT
£ currency switch £ currency switch
Basket

Symantec Endpoint Security Enterprise Hybrid Subscription License with Support 1-99 Devices 1Y

SKU: SES-SUB-1-99 Quickfind Code: 1503502
£20.81
inc. VAT :£24.97
Collect Plus Available from 5,000 collection points
Why buy me
  • Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated risk
  • Exploit Prevention blocks memory-based zero-day exploits of vulnerabilities in popular software
  • Integrated Response takes direct action on the endpoint to remediate - retrieving files, deleting files, isolating endpoints and blacklisting

Need Help? Been quoted elsewhere? Take advantage of our Price Promise. Call our Server Team on 0871 984 4418 or...

Request a callback »

click

Symantec Endpoint Security provides your organization with ultimate security at the endpoint. It stops endpoint compromise with superior next-gen protection technologies that span the attack chain. Innovative prevention and proactive attack surface reduction technologies provide the strongest defense against the hardest-to-detect threats that rely on stealthy malware, credential theft, fileless, and "living off the land" attack methods. Symantec also prevents full-blown breaches before exfiltration can occur. Sophisticated attack analytics, automated investigation playbooks, and lateral movement and credential theft prevention provide precise attack detections and proactive threat hunting to contain the attacker and resolve persistent threats in real time.

Key Product Info

  • Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated risk
  • Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks
  • Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices
  • App Isolation & App Control allows only known good applications to run, shields known-good applications to prevent attackers from exploiting application vulnerabilities, and isolates unknown apps
  • Malware Prevention combines signature-based methods (file and website reputation analysis and antivirus scanning) and pre-execution detection and blocking of new and evolving threats (advanced machine learning, sandboxing to detect malware hidden in custom packers, and suspicious file behavioral monitoring and blocking)
  • Exploit Prevention blocks memory-based zero-day exploits of vulnerabilities in popular software
  • Intensive Protection enables fine-grained tuning of the level of detection and blocking separately to optimize protection and gain enhanced visibility into suspicious files
  • Network Connection Security identifies rogue Wi-Fi networks and utilizes hotspot reputation technology and delivers a policy-driven VPN to protect network connections and support compliance
  • Intrusion prevention and firewall blocks known network and browser-based malware attacks using rules and policies and prevents command and control setup with automated domain IP address blacklisting
  • Integrated Response takes direct action on the endpoint to remediate - retrieving files, deleting files, isolating endpoints and blacklisting

 

Back to top