{"id":4076,"date":"2019-07-10T10:57:04","date_gmt":"2019-07-10T09:57:04","guid":{"rendered":"https:\/\/10.0.10.213\/?page_id=4076"},"modified":"2019-07-10T10:57:06","modified_gmt":"2019-07-10T09:57:06","slug":"symantec-endpoint-protection-family","status":"publish","type":"page","link":"https:\/\/sertalink.com\/nl\/symantec-endpoint-protection-family\/","title":{"rendered":"Symantec Endpoint Protection Family"},"content":{"rendered":"\n\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/epf-banner.png&#8221; _builder_version=&#8221;3.24&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/epf-2.png&#8221; align=&#8221;center&#8221; _builder_version=&#8221;3.24&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h3 class=\" textproofleft\">Simplify Your Path to a Complete Endpoint Defense<\/h3>\n<p>The most complete endpoint defense on the planet is now easy to buy. Whatever level you need, choose multilayered suites including prevention, hardening, and detection and response: Maximal protection with operational simplicity and efficiency.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Reduced Complexity with a single agent and console<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Interlocking defenses at the device, the app, and the network level<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Effective protection at a low total cost of ownership<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_blurb header_level=&#8221;h3&#8243; text_orientation=&#8221;center&#8221; title=&#8221;Your Complete Endpoint Defense&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/epf-3.png&#8221; _builder_version=&#8221;3.24&#8243; header_font=&#8221;||||||||&#8221;]<h3 style=\"text-align: center;\"><\/h3>\n[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<div class=\"content-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\">\n<h3 class=\" textproofleft\">How do I stop fileless attacks, ransomware, and other emerging threats?<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"media-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\"><\/div>\n<\/div>\n<\/div>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecRed textproofleft\">With Symantec Endpoint Protection.<\/h4>\n<p>The world&#8217;s most advanced, best integrated, cloud-delivered or on-premises endpoint protection runs on a single agent and is managed from a single console.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Defeat ransomware and unknown attacks with multilayered protection that combines signatureless and other critical endpoint technologies.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Get to full value faster with artificial intelligence (AI)-guided security management that quickly updates policies and enhances your endpoint security posture.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Detect threats more accurately with the Symantec Global Intelligence Network (GIN), the world&#8217;s largest civilian database.<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\" textproofleft\">How do I expose and quickly resolve stealthy attacks?<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecRed textproofleft\">With Symantec Endpoint Detection and Response.<\/h4>\n<p>Symantec \u00a0Endpoint Detection and Response provides powerful cloud-delivered analytics, threat intelligence, and round-the-clock managed services.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Discover and resolve threats much faster, supported by superior visibility and detection analytics.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Solve for cyber security skills shortages and streamline SOC functions with extensive automation and built-in integrations for sandboxing, SIEM, and orchestration.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Fortify your security team with the unmatched expertise and global scale of Symantec Managed Endpoint Detection and Response Service.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Roll out EDR across Windows, macOS, and Linux devices (via SEP-integrated EDR or a dissolvable agent).<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\" textproofleft\">How do I protect against mobile threats and risks?<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecRed textproofleft\">With Symantec Endpoint Protection Mobile.<\/h4>\n<p>Risk-based Symantec Endpoint Protection Mobile defends against all threats that put business data at risk of exposure, theft, and manipulation\u2013while respecting user privacy and facilitating productivity.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Actively protect corporate resources with immediate protection from risky devices.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Block malicious apps and terminate malicious processes before they expose sensitive data.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Protect corporate infrastructure by blocking compromised devices from accessing corporate Wi-Fi.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Prevent data exfiltration by blocking access to known malicious command and control servers.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Predict attacks and detect zero-day exploits using machine learning and the massive Symantec GIN.<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\" textproofleft\">How do I defend Active Directory Environment to keep invaders out?<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecRed textproofleft\">With Symantec Endpoint Threat Defense for Active Directory.<\/h4>\n<p>Symantec Endpoint Threat Defense for Active Directory restricts post-exploit incursions by preventing credential theft and lateral movement by combining AI, obfuscation and advanced forensics methodologies at the endpoint to contain attacks in real-time.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Harden Active Directory environment against malicious use by attackers.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Disrupt reconnaissance activity and contain the attack at the point of compromise (endpoint).<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Prevent attackers from using Active Directory to steal credentials and move laterally.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Reduce the attack surface with continuous Active Directory and assessment reporting.<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\" textproofleft\">How do I minimize the endpoint attack surface by allowing only authorized applications to run?<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecRed textproofleft\">With Symantec Endpoint Application Control.<\/h4>\n<p>Symantec Endpoint Application Control strengthens defense against advanced attacks by minimizing the attack surface and allowing only known good applications to run.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Auto-classify risk levels for all endpoint applications\u2014whether or not they&#8217;re in use.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Generate smart &#8216;allow&#8217; and &#8216;block&#8217; lists that operate without impacting user productivity.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Simplify policy updates by auto-managing drift with smart recommendations for handling new applications.<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\" textproofleft\">How do I ensure every application is restricted to safe and authorized behavior?<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecRed textproofleft\">With Symantec Endpoint Application Isolation.<\/h4>\n<p>Symantec Endpoint Application Isolation shields known good applications from tampering by stopping attackers from exploiting application vulnerabilities. It also isolates malicious and suspicious applications to prevent any privileged operations that can harm the endpoint.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Auto-classify risk levels for all endpoint applications\u2014whether or not they&#8217;re in use.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Isolate applications to prevent unauthorized operations.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Shield applications to prevent attackers from exploiting vulnerabilities.<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\" textproofleft\">How do I complement Symantec Endpoint Protection (SEP) with advanced defenses that address mobile user behaviors and modern attack vectors?<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecRed textproofleft\">With Symantec Endpoint Complete Cloud Connect Defense.<\/h4>\n<p>Symantec Endpoint Cloud Connect Defense provides dynamic protection that is complementary to endpoint security to address modern device attack vectors that target cloud connected users.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Manage Windows 10 protections using the common Symantec endpoint security console.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Validate network integrity to protect users against rogue Wi-Fi networks and spoofed carrier networks.<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Use policy-driven VPNs to protect systems from accessing suspicious or malicious networks.<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n\n","protected":false},"excerpt":{"rendered":"<p>Simplify Your Path to a Complete Endpoint Defense The most complete endpoint defense on the planet is now easy to buy. Whatever level you need, choose multilayered suites including prevention, hardening, and detection and response: Maximal protection with operational simplicity and efficiency. Reduced Complexity with a single agent and console Interlocking defenses at the device, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-4076","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Symantec Endpoint Protection Family | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/nl\/symantec-endpoint-protection-family\/\" \/>\n<meta property=\"og:locale\" content=\"nl_BE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Symantec Endpoint Protection Family | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/nl\/symantec-endpoint-protection-family\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-10T09:57:06+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\",\"inLanguage\":\"nl-BE\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/nl\/symantec-endpoint-protection-family\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/nl\/symantec-endpoint-protection-family\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/nl\/#website\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/nl\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"nl-BE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/nl\/symantec-endpoint-protection-family\/#webpage\",\"url\":\"https:\/\/sertalink.com\/nl\/symantec-endpoint-protection-family\/\",\"name\":\"Symantec Endpoint Protection Family | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#website\"},\"datePublished\":\"2019-07-10T09:57:04+00:00\",\"dateModified\":\"2019-07-10T09:57:06+00:00\",\"inLanguage\":\"nl-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/nl\/symantec-endpoint-protection-family\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/nl\/symantec-endpoint-protection-family\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/nl\/symantec-endpoint-protection-family\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgium\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/4076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/comments?post=4076"}],"version-history":[{"count":0,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/4076\/revisions"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/media?parent=4076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}