Symantec unifies protection, detection and response with SES

Symantec experts can provide proactive managed threat hunting, remote investigations and pre-authorised remediation

The Symantec platform now offers a new level of simplification through the use of a single agent.
The Symantec platform now offers a new level of simplification through the use of a single agent.

Symantec has revamped to its endpoint portfolio with the launch of Symantec Endpoint Security (SES), which now delivers protection, detection and response in a single platform.

Customers can deploy and manage SES via the cloud or on-premises, or a hybrid of both, for all operating systems including mobile devices, with single agent installation.

“The Symantec platform now offers tremendous breadth and depth, with a new level of simplification that many security teams will be surprised to see,” said Dave Gruber, enterprise strategy group. “Leveraging a single agent, the new Symantec Endpoint Security platform brings this vision to life, while adding compelling new breach assessment and prevention capabilities, support for in-house threat hunting activities with analytics and managed threat hunting services where organizations lack resources or skills.”

Symantec Endpoint Security is designed to meet the needs of a wide range of organisations, with Symantec experts providing proactive managed threat hunting, remote investigations, and pre-authorised remediation for organisations that can’t or don’t want to manage these key capabilities themselves.

Enterprise customers with in-house investigation resources can opt for the new Threat Hunting Centre add-on, which automates threat hunting across all security devices present in an organisation’s security operations centre (SOC), enabling rapid response across billions of events. Threat Hunting Centre customers will experience prioritised key alerts, reduced false positives, and faster investigations and incident remediation. The Threat Hunting Centre integrates threat intelligence from a variety of sources and will provide retrospective analysis and proactive searches for unknown indicators of compromise (IOC’s) in the environment to pinpoint threats and in-process attacks that might not otherwise have been detected.

Most Popular

Digital Edition

Subscribe today and get your copy of the magazine for free