
Endpoint Security Complete, Hybrid Subscription License with Support (Per Device) - 1 year











Advanced endpoint protection technology tailored to the needs of your organization
Symantec Endpoint solutions are designed for a variety of deployment models and security maturity levels
Platform |
Description |
---|---|
Symantec Endpoint Protection |
SEP is an on-premises solution, suitable for organizations that prefer full local control, but with limited protection features against modern threats. SEP can be extended with EDR in an on-premise environment |
Symantec Endpoint Security Enterprise |
offers a more flexible hybrid approach with the ability to be deployed on mobile devices, as well as cloud integration. Additionally, it includes basic EDR functions |
Symantec Endpoint Security Complete |
is the most advanced version that offers hybrid implementation and the latest tools such as EDR, Threat Hunter, Threat Intelligence and Target Attack Analytics, which makes it a solution for organizations requiring comprehensive protection and advanced threat analytics |
The highest standard in endpoint security, providing complete protection with EDR, Threat Hunting and advanced threat analytics.
Symantec Endpoint Security Complete (SES Complete) is an advanced endpoint protection solution that integrates all Symantec security technologies, offering comprehensive threat protection at every stage of attack. SES Complete combines, among others: Symantec Endpoint Protection (SEP), Endpoint Detection and Response (EDR), Mobile Threat Defense, Active Directory Defense, Adaptive Protection, App Control and Threat Hunting, all in one package.
The product offers threat protection using a single agent on all operating systems, which greatly simplifies implementation and management. SES Complete provides protection for traditional, mobile devices and servers, supporting Windows, macOS, Linux, Android, iOS, as well as various management models (on-premises, cloud, hybrid).
By integrating with a global threat intelligence network and using machine learning, SES Complete offers the best detection and prevention of attacks, minimizing the number of false positives. The product also offers a number of innovations, such as Adaptive Protection, Threat Hunter, and Active Directory Defense, which increase the effectiveness of protection against threats.
SES Complete is also a solution with a high ROI (437% according to Forrester research), ensuring operational savings, quick implementation and easy operation thanks to one management console.
Functionality |
Description |
---|---|
Breach Assessment |
Threat assessment in Active Directory, risk identification and remediation recommendations after attack simulations. |
Device Control |
Manage peripheral devices (USB, FireWire, etc.), block unauthorized devices. |
Application Control |
Application Control, allows you to run only applications deemed safe. |
Exploit Prevention |
Blocking memory exploits, protecting against unknown vulnerabilities in popular software. |
Malware Prevention |
Detect and block malware using machine learning and reputation analysis. |
Deception |
Use of decoys (e.g. fake files, login credentials) to detect attackers and delay their actions. |
Active Directory Defense |
Protection against credential theft and Active Directory attacks using fake resources. |
Threat Hunter |
Advanced threat hunting tools using machine learning and expert analysis. |
Behavioral Forensics |
Analysis of endpoint behavior to identify attack techniques using MITER ATT&CK. |
Network Firewall and Intrusion Prevention |
Block network attacks and prevent communication with unauthorized sources. |
Context-aware recommendations |
Context-based recommendations help you achieve optimal performance by eliminating routine tasks and making better decisions. |