Endpoint Protection
By LaibaWaseem
CyberSecurityIntern
SecureBeans
Symantec
•Symantec is a CyberSecuritycompany
•Offers a range of security product and services of
•Endpoint security , Network Security, DLP and Enterprise Cloud
•Broadcom acquired the rights of Symantec in 2019
Symantec Endpoint Protection(SEP)
•A client server solution
•Protects laptop, desktop and
server against malware, risk and
vulnerabilities
•Proactively secure clients any
known and unknown
vulnerabilities
•Offer complete endpoint security
Symantec
Endpoint
Protection
Anti
Malware
Advance
Malware
Protection
Endpoint
Detection
and
Response
Application
Isolation
and Control
Exploit
Prevention
Deception
Symantec Endpoint Protection Features
Symantec Endpoint Protection uses the following holistic security approach to protect your environment across
the entire attack chain, using the following stages: incursion, infection, infestation and exfiltration, and
remediation and inoculation.
Incrusion
Firewall/
Intrusion
Preventi
on
Application
and Device
Control
Memory
Explore
Mitigatio
n
Infection
Memory
Exploit
Mitigatio
n
File
reputation
analysis
(Insight)
Advanced
machine
learning
Malware
Protection
Behavioral
Analysis
Infestation
and
Exfiltration
Intrusion
Prevention
/Firewall
Behavioral
Analysis
Remediation
and
Inoculation
Host
Integrity
System
Lockdown
Symantec Firewall:
•The firewall allows the incoming network
traffic and outgoing network traffic that
you specify in the firewall policy
•TheSymantec Endpoint Protection
firewall policy contains rules and
protection settings, most of which you
can enable or disable and configure.
•Determine the level of interaction that you
want users to have with the client by
permitting or blocking their ability to
configure firewall rules and firewall settings
Monitors
communication
Shield that
allows or
blocks attempt
Warns of connect
between any
computer or
application
ReviewsPackets
Intrusion Prevention System
•Blocks over 70% of attacks before they break
into your organization’s network. Even
aftermalwarebreaks into your
organization,IPSdetectsmalwarein the
infestation andexfiltrationphase. During this
phase,IPSblocks threats as they travel
through the network.
•IPS blocks malware at the network layer
before the payload arrives on the endpoint, as
it scans both inbound and outbound network
traffic
Network
Intrusion
Prevention
URL reputation
Browser
protection
Application and Device Control
Application
control
•Prevent malware from taking over applications.
•Restrict the applications that can run.
System
lockdown
•Control the applications on your client computers.
Device
control
•Block or allow different types of devices that attach to client
computers, such as USB, infrared, and FireWire devices.
Memory Exploit Mitigation
•Multiple mitigation techniques to
stopexploit attempts against both
known and unknown vulnerabilities
in the software.
•Memory Exploit Mitigation detects
the exploit attempt, it either blocks
the exploit or terminates the
application that the exploit
threatens.Symantec Endpoint
Protection displays a notification to
the user on the client computer
about the detection, and logs the
event in the client's Security log.
Detects and
Block
Identify
Suspicious
Manipulation
Activity
Prevent
Execution of
Malicious
Payload
Update
Threat
Signatures
Symantec Online Network for
Advanced Response (SONAR)
•real-time behavioral detection
system.
•Uses artificial intelligence (AI)and
machine learning (ML)to monitor
running processes.
•Protect against zero day attack
•Identifies abnormal behaviors
•Works alongside endpoint
protectionto provide a multi-
layered security approach.
Detects
Behaviour
Identifies
abnormality
Threat
Evaluation
Real time
Blocking
Quarantine and
Remediation