Top Banner
Cart
0

This item has been added to your cart.

Bag
x View Cart

Symantec Endpoint Protection 12.1 - 25 User (Instant Download)

Works On:

* The installation requires a minimum installation configuration. See System Requirements Icons
Symantec Endpoint Protection 12.1 - 25 User (Instant Download)

Details

MPN: 21182577

Lifetime
1
Icons

Digital download, no hard copy will be shipped.

$ 899 .99
Add To Cart
Symantec Endpoint Protection 12.1 - 25 User (Instant Download)

Symantec Endpoint Protection 12.1 - 25 User (Instant Download)

Brand: Symantec

Works On:

* The installation requires a minimum installation configuration. See System Requirements Icons

$ 899 .99
Add To Cart

Details

MPN: 21182577

Lifetime
1
Icons

Digital download, no hard copy will be shipped.

Symantec Endpoint Protection 12.1 - 25 User (Instant Download)

USD$899.99
Add To Cart

What people say about us

See what our customers have to say about us

  • Symantec Endpoint Protection 12.1 - 25 User (Instant Download)

    Symantec Endpoint Protection 12.1 - 25 User (Instant Download)

    Why Symantec?

    Try to think of a time when Norton Antivirus hasn’t been a staple in cyber security. Since 1991, Symantec has been providing users with superior anti-virus and other cyber-security products. Personally, every family computer I had growing up was installed with Symantec Norton Antivirus. Symantec has been an industry leader, constantly on the cutting edge of stopping cyber security attacks and education the general public on new and emerging threats. As the banner on their website states, they are the “Global Leader in Next Gen Cyber Security.” Proof of this lies in their yearly threat reports and numerous ties to large corporations who depend on their products. Award winning and industry recognized, you’ll be able to protect your data from a multitude of cyber-attacks.

  • Symantec Endpoint Protection 12.1 Package Features

    Symantec Endpoint protection keeps ransomware and unknown attacks by taking advantage of high end machine analysis and by minimizing false positives to give you super endpoint protection and network security. Designed for enterprise use, Symantec Endpoint Protection locks down security from every access point, making sure you’re safe on every entry point to your network. Gartner, one of the world’s top IT research and advisory firms, lauds the Endpoint Protection program as the premier protection product. This package is perfect for the small business owner that needs a secure and safe network that’s protected from outside cyber security threats. Supporting up to 25 users, this is perfect for a small business.

    Security Features:

    • Unrivaled endpoint protection with the world’s largest civilian threat network spanning data from 175 million endpoints and 54 million attack sensors in 175 countries

    • Hi-tech IT solutions such as active scanning identifies and resolves only potentially harmful files rather than scanning the entire system. These scans are less taxing on your machine, giving you more computing power to continue working.

    • Preventative malware technology with Insight™ that logs files based on metrics such as number of downloads, sources of files, where the files are downloaded, and the types of files included. This data is used to predict how future malware will operate so you and your devices are in safe hands when the next threat arrives.

    • With optional Symantec Advanced Threat Protection (ATP), which sources, defines, and blocks targeted cyber-attacks faster you’ll be able to track malware behaviors and tactics. As always, if you do not want to share your data, it can be turned off.

    • Application protection for all of your devices. Application Control allows you the option to only run whitelisted applications, or run all except blacklisted applications, depending on your security needs.

    • External Media Control gives you the options to block access to hardware or restrict usage on devices. You can control the amount uploaded or downloaded per device, or if a problem device shows up, you can block access to that machine.

    • Symantec’s Five Layers of Protection, included on every Symantec Endpoint Protection Package:

      • Network: Analysis of incoming data that blocks threats as they’re travelling through network endpoints paired with boosted firewall protection

      • File: The same proven antivirus software in Norton that protects against common threats such as trojans, malware, spyware, bots, and adware

      • Reputation: Scans website files and cookies to correlate data between users, files, and websites to find and prevent potential security threats when connected to the internet

      • Behavior: Usage of patented Artificial Intelligence to combat zero-day threats, so you’ll be protected from new threats immediately. When malware is released, SONAR™ knows all of its behaviors from day one

      • Power Eraser™: Scans endpoints and locates threats, while treating malware or other issues by deleting harmful files. Administrators can remotely access Power Eraser™ to resolve any security issue from a connected device on their network   

    • Administrative control across multiple platforms including Windows, Mac, and Linux with a single management system

    • Customizable controls that allow changes to policy settings for each individual user and device, maximizing customization to meet your network needs

    • Mac and Windows administrators can remotely access devices to monitor and keep devices, end-points, and networks protected and up-to-date

  • Client Workstations and Server System Requirements for with following operating systems separated by family:

    • Windows: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2003, Windows Server 2008, Windows Server 2012, Windows Small Business Server 2011, Windows Essential Business Server 2008
    • Macintosh: Mac OS X 10.8 and higher
    • Linux: Red Hat Enterprise Linux, SUSE Linux Enterprise, Novell Open Enterprise Server, Oracle Linux, CentOS, Ubuntu, Debain, Fedora
    • Virtual Environments: Microsoft Azure, Amazon WorkSpace, VMWare WS 5.0, VMWare ESXi, Microsoft Virtual Server 2005, Microsoft Enterprise Desktop Virtualization,  Microsoft Windows Server 2008, 2012, and 2012 R2 Hyper-V, Citrix XenServer 5.6 or later, Virtualbox by Oracle

    Client Workstations and Server System Hardware Requirements: 1GHz CPU or higher, 512 MB of RAM (1GB preferred), 1.5 GB available hard drive space

    Management System Compatibility Requirements:

    • Windows: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows Server/Small Business Server 2003, Windows Server/Small Business Server 2008, Windows Small Business Server 2011, Windows Essential Business Server 2008, Windows Server 2012
    • Management System Hardware Requirements: Intel Pentium Duo-Core or equivalent minimum, 2GB of RAM (4GB recommended), 16 GB of hard drive space  

    • Management System Browser Compatibility: Microsoft Internet Explorer, Mozilla Firefox, Google Chrome

    • Management System Database Requirements: SQL Server 2005 (SP4), SQL Server 2008 (RTM-SP4), SQL Server 2008 R2 (RTM-SP3), SQL Server 2012 (RTM SP1, SP2), SQL Server 2014

  • 4.5 / 5.0

FAQ

Be Part of Save On It Family and get 10% Off