View
Sorting
From A to Z
Products found: 3
Symantec Data Loss Prevention
Extend Data Loss Prevention to the Cloud
Discover sensitive data in cloud apps with Symantec Data Loss Prevention (DLP), now integrated with full cloud access security broker (CASB) capabilities from Symantec CloudSOC.
Extend your DLP coverage and get direct visibility of content in over sixty cloud apps - including Office 365, Box, Dropbox, Google Apps or Salesforce
Leverage full CASB capabilities so you can continuously monitor content additions, changes, and access rights in cloud apps
Leverage existing DLP policies and workflows for cloud apps so you don’t have to rewrite your finely-tuned rule sets
Discover Where Sensitive Data Is Stored Across Your Infrastructure
Described Content Matching looks for matches on regular expressions or patterns, e.g., “block if we see a credit card pattern”
Exact Data Matching identifies sensitive data directly in your database, e.g., “block exfiltration of any customer name and their associated bank account number”
Indexed Document Matching applies a “full file fingerprint” to identify confidential information in unstructured data including Microsoft Office documents; PDF files; as well as binary files such as JPEGs, CAD designs, and multimedia files
Vector Machine Learning automatically learns and identifies the layout of sensitive document types such as financial documents, source code, etc.
File Type Detection recognizes more than 330 different file types including email, graphics and encapsulated formats, and can also recognize virtually any custom file type
Monitor and Protect Sensitive Data On Mobile Devices, On-Premise, and In the Cloud
Keep data safe on Windows and Mac endpoints by performing local scanning and real-time monitoring
Monitor confidential data that is being downloaded, copied or transmitted to or from laptops and desktops, including through email or cloud storage
Extend data loss prevention monitoring and protection to iOS and Android devices, whether corporate-owned or user-owned
Find and protect confidential unstructured data by scanning network file shares, databases, and other enterprise data repositories
Monitor and protect data in motion, including sensitive data sent via email, web and a wide range of network protocols
Define and Enforce Policies Consistently Across Your Environment
Use a single web-based console to define data loss policies, review and remediate incidents, and perform system administration across all of your endpoints, mobile devices, cloud-based services, and on-premise network and storage systems
Take advantage of more than 60 pre-built policy templates and a convenient policy builder to get your Symantec Data Loss Prevention solution up and running quickly
Use robust workflow and remediation capabilities to streamline and automate incident response processes
Apply business intelligence to your Symantec Data Loss Prevention efforts with a sophisticated analytics tool that provides advanced reporting and ad-hoc analysis capabilities
Symantec Email Security.cloud
Stop Spear Phishing, Credential Theft, and Ransomware with Isolation
Insulate users from spear phishing, ransomware, and other advanced attacks, and foil credential theft with strong email threat isolation.
- Isolate suspicious email links and execute them in a remote environment to shut down spear phishing and other advanced email threats.
- Stop credential theft by rendering suspicious websites in read-only mode, preventing users from submitting sensitive data.
- Protect against advanced email attacks such as ransomware by isolating weaponized attachments.
- Stop spear phishing emails with multiple layers of email protection, threat isolation, advanced email security analytics for deep visibility into attacks, built-in user awareness and education tools, and more.
- Block the latest ransomware with content defense, sandboxing, and link protection technologies that detect emerging, stealthy, and zero-day attacks.
- Defeat business email compromise with impersonation protection, sender authentication methods, and brand protection controls.
- Apply insights gathered from the world’s largest global intelligence network—distilling telemetry from over 175 million endpoints and 57 million attack sensors in 157 countries—to expose and stop the stealthiest threats.
- Defend against targeted campaigns with multilayered technologies and deep threat analytics.
- Protect your business from email threats with sophisticated defenses including advanced machine learning, cloud sandboxing, and time-of-click link protection.
- Gain the deepest visibility into targeted and advanced attack campaigns with email security analytics that include 60+ data points on every clean and malicious email.
- Hunt threats and prioritize the most important email security incidents across your environment through seamless integration with the Security Operations Center.
- Quickly remediate attacks and orchestrate your response across emails and endpoints by blacklisting and quarantining threats.
- Prepare users to avert attacks and prioritize email protection for vulnerable users.
- Evaluate employee readiness by simulating real-world email attacks that imitate the latest email threats.
- Benchmark and improve user readiness over time with detailed reporting and repeat assessments.
- Teach users to recognize email attacks through training notifications that raise security awareness.
- Discover, monitor, and protect sensitive data wherever it's used—in email, on endpoints, in your network, in storage, and even in cloud apps.
- Accurately identify confidential data with advanced detection technologies including vector machine learning, exact data matching, and indexed document matching.
- Migrate to cloud-based email securely by extending content-aware DLP capabilities to Microsoft Office 365, Google G Suite, and more.
- Automatically encrypt sensitive emails with a secure PDF or web pickup portal, which provide both push- and pull-based encryption.
- Gain granular control over encrypted emails through policy-driven enforcement that includes the ability to expire and recall messages.
- Increase trust in encrypted messages by customizing emails, notifications, and the web portal with your company brand.
Symantec Endpoint Protection
Stop advanced threats with intelligent security
Last year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an all-time high. Organizations are struggling to keep up with the rapidly evolving threats. Symantec Endpoint Protection is designed to protect against advanced threats with powerful, layered protection backed by industry leading security intelligence.
Network Threat Protection stops most threats before they can take up residence on the machine
Insight reputation scoring accurately detects rapidly mutating malware and zero-day threats
SONAR™ behavioral analysis stops malicious files designed to appear legitimate
Strong antivirus, antispyware and firewall protection eradicate known mass malware
14 Years a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.