Top Banner
Cart
0

This item has been added to your cart.

Bag
x View Cart

Symantec Endpoint Protection 12. 1 – 10 User (Instant Download)

Works On:

* The installation requires a minimum installation configuration. See System Requirements Icons
Symantec Endpoint Protection 12. 1 – 10 User (Instant Download)

Details

MPN: 21182454

Lifetime
1
Icons

Digital download, no hard copy will be shipped.

$ 429 .99
Add To Cart
Symantec Endpoint Protection 12. 1 – 10 User (Instant Download)

Symantec Endpoint Protection 12. 1 – 10 User (Instant Download)

Brand: Symantec

Works On:

* The installation requires a minimum installation configuration. See System Requirements Icons

$ 429 .99
Add To Cart

Details

MPN: 21182454

Lifetime
1
Icons

Digital download, no hard copy will be shipped.

Symantec Endpoint Protection 12. 1 – 10 User (Instant Download)

USD$429.99
Add To Cart

What people say about us

See what our customers have to say about us

  • Symantec Endpoint Protection 12. 1 – 10 User (Instant Download)


    Symantec Endpoint Protection 12. 1 – 10 User (Instant Download)

    Why Symantec?

    In recent years, cyber-security awareness has been on the rise, and Symantec has been there since the beginning with Norton Antivirus. However, the brand behind Norton is even more impressive. Symantec has been an industry leader in not only stopping cyber security threats but being front and center in educating the public (and you, the consumer) in future cyber security trends and threats. As their web-page banner states, they are the “Global Leader in Next-Gen Cyber Security.” Proof of this lies in their yearly threat reports, numerous ties to large corporations who depend on their products, and overall prestige when mentioning security products for PCs. Award winning and industry recognized, you’ll be able to protect your data from a multitude of cyber-attacks.

    Symantec Endpoint Protection 12.1 Package Features

    In nutshell, Symantec Endpoint Protection safeguards you from ransomware and unknown attacks by using superior machine analysis and minimizing false positives to give you the most accurate endpoint protection. Designed with business in mind, Symantec Endpoint Protection sequesters the safety of your data from every access point, assuring you safety on all fronts. With praises from Gartner, one of the world’s foremost IT research and advisory firms, Symantec’s Endpoint Protection stands as the premier endpoint protection suite. This package is perfect for the very small business owner with 10 users or less wanting to keep their network safe and secure from cyber security threats.

  • Symantec Endpoint Protection 12.1 Package Features

    In nutshell, Symantec Endpoint Protection safeguards you from ransomware and unknown attacks by using superior machine analysis and minimizing false positives to give you the most accurate endpoint protection. Designed with business in mind, Symantec Endpoint Protection sequesters the safety of your data from every access point, assuring you safety on all fronts. With praises from Gartner, one of the world’s foremost IT research and advisory firms, Symantec’s Endpoint Protection stands as the premier endpoint protection suite. This package is perfect for the very small business owner with 10 users or less wanting to keep their network safe and secure from cyber security threats.

    Security Features:

    • Symantec has the world’s largest civilian threat network spanning data from 175 million endpoints and 54 million attack sensors in 175 countries

    • Active scanning identifies and resolves only potentially harmful files, using less computing power and giving you the ability to multitask during scans.

    • Insight™ technology sorts and identifies files based on number of downloads, duration of the file, and where the file is being downloaded from. This data is crucial in locating new malware and preventing zero-day attacks

    • User option to integrate data into Symantec Advanced Threat Protection (ATP), which sources, defines, and blocks targeted cyber-attacks faster. It uses user data to track behaviors of malware

    • Application Control that gives you the option to only run whitelisted (good reputation) applications or run all except blacklisted (bad reputation) applications. Also, this gives you control of registry access and leverages options in how application processes are run

    • External Media Control: You can block access to certain hardware or restrict usage in uploading or downloading information.   

    • Five Layers of Protection:

      • Network: Firewall and Intrusion Prevention included alongside analysis of incoming data that blocks threats as they’re travelling through network endpoints

      • File: Proven antivirus software that protects against trojans, malware, spyware, bots, and adware

      • Reputation: Website monitoring that correlates data between users, files, and websites to find and prevent potential security threats

      • Behavior: Symantec’s SONAR™ uses AI to combat zero-day threats. It uses behavior analysis to stop new and unknown threats before they can do any harm

      • Power Eraser™: Preemptively scans endpoints and locates threats, then removes the malware or other issues by erasing the harmful files. Allows administrators to remotely access this feature to resolve any security issue from a connected device.   

    • A single management console that allows control across multiple platforms including Windows, Mac, and Linux.

    • Customizable controls that allow granular policy settings for each individual user and device

    • Remote access allows Windows and Mac clients to remotely keep endpoints up-to-date and safe

    • Client Workstations and Server System Requirements for with following operating systems separated by family:

      • Windows: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2003, Windows Server 2008, Windows Server 2012, Windows Small Business Server 2011, Windows Essential Business Server 2008

      • Macintosh: Mac OS X 10.8 and higher

      • Linux: Red Hat Enterprise Linux, SUSE Linux Enterprise, Novell Open Enterprise Server, Oracle Linux, CentOS, Ubuntu, Debain, Fedora

      • Virtual Environments: Microsoft Azure, Amazon WorkSpace, VMWare WS 5.0, VMWare ESXi, MIcrosoft Virtual Server 2005, Microsoft Enterprise Desktop Virtualization,  Microsoft Windows Server 2008, 2012, and 2012 R2 Hyper-V, Citrix XenServer 5.6 or later, Virtualbox by Oracle

    • Client Workstations and Server System Hardware Requirements: 1GHz CPU or higher, 512 MB of RAM (1GB preferred), 1.5 GB available hard drive space

    • Management System Compatibility Requirements:

      • Windows: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows Server/Small Business Server 2003, Windows Server/Small Business Server 2008, Windows Small Business Server 2011, Windows Essential Business Server 2008, Windows Server 2012

    • Management System Hardware Requirements: Intel Pentium Duo-Core or equivalent minimum, 2GB of RAM (4GB recommended), 16 GB of hard drive space  

    • Management System Browser Compatibility: Microsoft Internet Explorer, Mozilla Firefox, Google Chrome

    • Management System Database Requirements: SQL Server 2005 (SP4), SQL Server 2008 (RTM-SP4), SQL Server 2008 R2 (RTM-SP3), SQL Server 2012 (RTM SP1, SP2), SQL Server 2014

  • 4.5 / 5.0

FAQ

Be Part of Save On It Family and get 10% Off