HackDig : Dig high-quality web security articles for hacker

Symantec Again a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms

2015-01-09 05:15

Gartner Inc. has again positioned Symantec as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms (EPP); the report published December 22, 2014. On companies positioned in the Leaders Quadrant, the report states: “Leaders demonstrate balanced progress and effort in all execution and vision categories.” The report positions vendors based on their ability to execute and completeness of vision, and finds that “to be successful going forward, EPP solutions must be more proactive and focus on the entire security life cycle,” which is defined as having four stages: setting policy, prevention, detection and remediation.

At Symantec, we believe that many companies have the ability to improve their endpoint protection by taking advantage of more built-in features they may just not be aware of. For instance, Symantec™ Endpoint Protection (SEP) leverages a wide breadth of proprietary technologies, including Insight™, which identifies a file’s reputation by analyzing its key attributes, and SONAR™, which monitors a file’s behavior in real time, along with Network Threat Protection, Application and Device Control, and traditional antivirus technologies. Earlier this year, we also integrated an advanced repair tool called Power Eraser into SEP.

In today’s digital age, antivirus technology alone will not be enough protection. Companies will need comprehensive attack prevention that integrates the full range of security technologies. Symantec led the first era of security with antivirus, and it continues to be an important part of our portfolio. Yet combined with intelligent security and other technologies we are pioneering, such as Symantec™ Endpoint Protection, we can solve larger customer problems.

Effective products must also be married with a solid security strategy. In our latest Internet Security Threat Report, we emphasized Cyber Resiliency:

  • Know your data: Protection must focus on the information – not the device or data center. Understand where your sensitive data resides and where it is flowing to help identify the best policies and procedures to protect it.
  • Educate employees: Provide guidance on information protection, including company policies and procedures for protecting sensitive data on personal and corporate devices.
  • Implement a strong security posture: Strengthen your security infrastructure with data loss prevention, network security, endpoint security, encryption, strong authentication and defensive measures, including reputation-based technologies.

We continue to develop security intelligence, and evolve our Global Intelligence Network (GIN), the world’s largest. We are focused and moving swiftly to deliver solutions that are designed to address today’s advanced attacks and leverage the vast amount of threat data we collect every day.

While Symantec™ Endpoint Protection was one of our offerings considered while Gartner researched the report, our leadership position is reflective of our ability to execute and completeness of vision. We encourage our customers, prospects and partners to review the latest research from Gartner and learn more about the best ways they can protect their environments and information from attacks.

Disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Source: itcetorp-tniopdne-tnardauq-cigam-rentrag-redael-niaga-cetnamys/sgolb/tcennoc/moc.cetnamys.www

“Symantec Again a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms”0 Comments

Submit A Comment



Blog :

Verification Code:


Share high-quality web security related articles with you:)


Tag Cloud