1. /
  2. Products & Solutions/
  3. Products/
  4. Symantec Endpoint Protection Family/
  5. Endpoint Protection

Symantec Endpoint Protection

The growth in targeted attacks and advanced persistent threats require layered protection and intelligent security at the endpoint. Symantec Endpoint Protection 12.1 brings unrivaled security, blazing performance, and smarter management across both physical and virtual environments. By leveraging the world’s largest civilian threat intelligence network, Symantec can proactively identify at-risk files and stop zero-day threats without slowing down your performance. Only Symantec Endpoint Protection 12.1 provides the security you need through a single, high-powered agent, for the fastest, most-effective protection available.

White Papers

Show MoreShow Fewer

Gartner 2015 Magic Quadrant for Endpoint Protection Platforms

Symantec is once again a Leader in Gartner MQ. Read the leader’s report and get in-depth expertise on the endpoint protection market.

Internet Security Threat Report

The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the world’s largest civilian threat intelligence network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

SANS - Layered Security: Why It Works

Attackers are leaving no stone unturned, prying into web applications, operating systems and even deeper in the hardware. Read this whitepaper from SANS institute to find out more about Symantec’s layered security solution. Download now.

Protecting PoS Environments Against Multi-Stage Attacks

Supporting credit card transaction processes within PoS environments requires a technology infrastructure made up of more than just endpoint PoS devices.

ESG Brief- It's Time for Enterprises to Secure Mac Computers

Last year, Mac malware increased by 66% with a single, high-profile attack infecting over 600,000 machines. Malware authors are targeting unsuspecting Mac users and gaining access to organization's data. Still wondering whether Macs need protection? See what advice a senior strategic analyst at ESG has to share.

Strong Cyber Protection: Keeping Bad Stuff Out and Good Stuff In

It's not enough to just keep the bad stuff out (threat protection) or just keep the good stuff in (information protection). Organizations must employ a combination of approaches to build a comprehensive threat protection program to mitigate data breach.