Symantec

The Cloud Generation is everyone who lives and works in this unique era—as computing breaks the boundaries of desktops and data centers
to embrace the mobile, social, global, crowd-sourced, always-on realities of modern life.

Data Loss Prevention

Extend Data Loss Prevention to the Cloud

Discover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access security broker (CASB) capabilities from Symantec CloudSOC.

  • Extend your DLP coverage and get direct visibility of content in over sixty cloud apps - including Office 365, Box, Dropbox, Google Apps or Salesforce
  • Leverage full CASB capabilities so you can continuously monitor content additions, changes, and access rights in cloud apps
  • Leverage existing DLP policies and workflows for cloud apps so you don't have to rewrite your finely-tuned rule sets

Advanced Threat Protection

Uncover Advanced Threats Across Endpoint, Network, Email, and Web Traffic

Uncover the stealthiest threats that would otherwise evade detection by using global intelligence from one of the world’s largest cyber intelligence networks combined with local customer context

  • Best detection and accuracy in protecting against advanced persistent threats*
  • Identify whether your organization is under targeted attacks and automatically search for Indicators-of-Compromise with Dynamic Adversary Intelligence
  • Detect and investigate suspicious events via unique sandboxing and payload detonation capability

Internet of Things

As IoT transforms entire industries, creating tremendous benefits and new risks, Symantec already helps protect over a billion IoT devices. From smart televisions to critical infrastructure, we help securely protect and manage devices and communications, and deliver analytics to detect stealthy, sophisticated advanced threats to IoT systems.

Data Encryption

Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). For maximum flexibility, Symantec Endpoint Encryption also manages BitLocker and File Vault-protected devices.

  • Launch and manage encryption from a single console
  • Facilitate user access with single sign-on support
  • Minimize risks associated with devices and removable media
  • Supports Symantec, BitLocker and File Vault encryption

Endpoint Protection

Maximize Information Protection

Endpoint Encryption: Drive and Removable Media Encryption

Laptops, Windows tablets and removable media devices have provided today’s mobile workforce the freedom to work anywhere. With this freedom comes a greater risk of a data breach through lost or stolen devices. Symantec Endpoint Encryption combines strong full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance, including devices encrypted with BitLocker, FileVault 2 or OPAL compliant self-encrypting drives.

Symantec provides maximum protection by encrypting each drive, sector-by-sector, ensuring that all files are encrypted. In addition to protecting laptops, desktops and Windows tablets, Endpoint Encryption supports various types of removable media including USB drives, external hard drives, and CD/DVD/Blu-ray media. With Symantec, removable media users can access their data on any Windows or Mac system, even if encryption isn’t installed on the machine.

  • Maximum protection including support for virtual machines, native OS encryption such as BitLocker, FileVault 2 and OPAL compliant self-encrypting drives
  • Ease of use with single sign on support
  • Multiple recovery options including self-recovery and web console for Helpdesk staff
  • Flexible removable media support

Datacenter Security

Data Center Security: Server Advanced

Security hardening and monitoring for private cloud and physical data centers with support for Docker containers.
  • Agentless Docker container protection with full application control and integrated management
  • Block zero-day exploits with application whitelisting, granular intrusion prevention, and real-time file integrity monitoring (RT-FIM)
  • Secure OpenStack deployments with full hardening of Keystone identity service module
  • Protect end-of-life Windows Server 2003 systems and other legacy platforms