Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:04 PM
Dark Reading
Dark Reading
Products and Releases

Managing Your Company's Cyber Risk: Antivirus Software And Endpoint Protection

Symantec Endpoint Protection 12.1 is designed to stop mutating threats without slowing you down

MOUNTAIN VIEW, Calif., April 25, 2011 /PRNewswire/ -- Nine new threats every second, every day - that's 286 million distinct malicious programs lurking about last year alone. Yet it only takes just one trojan, one virus, one malicious little program to compromise a company's entire system. While signature-based security solutions may have once halted the risk, today's threats have metamorphosed into sophisticated, rapidly mutating attacks that can evade reactive security solutions. The advent of easy-to-use attack toolkits (responsible for at least 61 percent of threat activity), not to mention drive-by downloads, zero-day attacks and mutating spyware, means that antivirus software alone is no longer enough.

Cyber attacks are growing - growing in cost, growing in scope and growing in sophistication - putting companies of all sizes at risk. In fact, Symantec's Managed Security in the Enterprisereport found that 88 percent of the 1,000 enterprise security practitioners surveyed experienced cyber attacks in the past two years, with 30 percent rating these attacks as somewhat or highly effective. Ninety-seven percent experienced some sort of loss, including:

-- Downtime - 46% -- Theft of customer or employee personally identifiable information - 31% -- Theft of corporate data - 25%

Companies looking for antivirus software with advanced threat prevention that protects endpoints from targeted attacks need to consider comprehensive endpoint security solutions that ward off high-impact risks, while improving efficiencies and lowering costs in this new threat landscape. Powered by Insight, Symantec Endpoint Protection 12.1 is designed to stop new and rapidly mutating threats without slowing you down. Symantec Endpoint Protection delivers an unmatched defense against malware for laptops, desktops and servers. Key features include:

-- Seamless integration of antivirus, antispyware, firewall, intrusion prevention, device and application control -- A single agent that is administered by a single management console -- Powerful central management of security on Windows and Macintosh endpoints -- Enabling of instant NAC upgrade without additional software deployment -- Antivirus and antispyware for Macintosh and Linux clients -- Physical and virtual environment security

Symantec Endpoint Protection is the flagship of Symantec's growing family of endpoint protection solutions including, Symantec Endpoint Protection Small Business Edition and Symantec Endpoint Protection.cloud.

As the number and sophistication of web-based viruses and malicious code increases, Symantec Endpoint Protection offers organizations an advanced antivirus solution with threat protection, while helping to reduce administrative overhead and lower total cost of ownership for endpoint security. Visit http://www.symantec.com/business/endpoint-protection to learn more.

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.