Menu

Download

Dziś nas odwiedzili:
Archiwum:
Grudzień 2016 (381)
Listopad 2016 (2437)
Październik 2016 (1965)
Wrzesień 2016 (1859)
Sierpień 2016 (2523)
Lipiec 2016 (2609)


Pokaż wszystkie tagi:
Wejścia na Vorek.pl z:
{referer}



NABÓR NA STANOWISKO


MODERATOR        UPLOADER



Symantec Endpoint Protection 11.0.6300.803 MP3 Xplat (x86/x64/2010/ENG)

Symantec Endpoint Protection 11.0.6300.803 MP3 Xplat (x86/x64/2010/ENG) | 1.46 GB

Symantec Endpoint Protection combines Symantec AntiVirus with advanced threat prevention, providing unsurpassed protection of laptops and desktops, and servers from malicious programs. In addition, protected from even the most complex, elusive to traditional means of security attacks, such as a rootkit, exploit "zero day" and changing spyware
Symantec Endpoint Protection provides not only the industry-leading antivirus protection, but also based on the signatures protect against spyware. This solution also ensures the prevention of threats, which helps protect endpoints from targeted attacks and unknown. It includes ready-intensive technologies that automatically analyze application behaviors and network connections to detect and block suspicious activities, as well as administration capabilities that allow certain actions to ban devices and applications that are considered extremely dangerous for the organization.
Key features:
Comprehensive Protection - integrating the best technologies to prevent security threats from even the most remote of new and unknown attackers from penetrating into their network
Proactive protection - a new module, Proactive Threat Scan Proactive Threat Scan uses a unique Symantec technology to assess right and wrong actions of unknown applications, which improves detection and reduces the number of false positives without the need to create a configuration based on the rules.
Best in the industry identify threats - Symantec protection mechanisms develop industry-leading network of Global Intelligence Network to provide an unprecedented opportunity to view all Internet gateway.
Simplicity - Single agent, single console - combines the full range of security technologies in a single agent and a centralized management console with intuitive user interface, as well as the means to create graphical web-based reporting.
Ease of deployment - since it requires only one agent and one management console, and the work is carried out with existing investments in IT and the organization security, Symantec Endpoint Protection solution delivers ease of implementation and deployment.
Low cost of ownership, Symantec Endpoint Protection solution delivers a lower cost of ownership by reducing administrative costs. As well as costs associated with managing multiple endpoint security products.
Fairness
Easy installation
Support for Symantec Network Access Control
Improving the effectiveness of existing security technologies and IT investments
and more.
Key features:
Enhanced protection from viruses and spyware. Integrated protection against viruses and spyware technology-based Symantec Antivirus with complete real-time protection and automatic means of containment and decontamination of threats
rules based traffic filtering. Lead (according to Gartner) technology Sygate filtering both open and encrypted network traffic
Technology Generic Exploit Blocking. Based on IPS technology allows you to block the penetration of threats that exploit application vulnerabilities
Advanced technology - to detect and remove rootkits. Provides advanced mechanisms to detect and remove rootkits, using the tool VxMS (Veritas Mapping Service, Technology Veritas). This allows access to lower level operating system to enable in-depth analysis of processes.
Deep inspection of network packets. Enables administrators to create their own rules of IPS, and analyze application-level network traffic using HIPS-analysis system
Proactive protection. Behavioral analysis technology from WholeSecurity, allowing on the basis of ballroom behavior analysis applications, refer them to a category of safety and security
Application Control. Allows administrators to control access to such elements as processes, files and folders by users and applications, as well as to analyze and control the registry, modules and components of the operating system and applications. Allows you to block various applications to ensure data integrity, as well as possible damage to the system and applications

Aby zobaczyć ukryty tekst musisz być zalogowany, jeżeli nie masz konta zarejestruj się!



Podziel się !

Delicious'da Share  Share on Facebook  Friendfeed Share  Google Shared  StubmleUpon'da Share  Digg'de Share  Netvibes'de Share  Reddit'de Share RSS Feeds Subscribe!

Powrót
Przeglądasz witrynę jako gość.
Dlatego zachęcamy do rejestracji lub do zalogowania się.

Informacja
Użytkownicy z rangą Gość nie mogą dodawać komentarzy.