-

Saturday, January 12, 2013

Norton 360 Symantec Full 2013

Symantec Endpoint Protection - combines Symantec AntiVirus ™ with advanced threat prevention to deliver unmatched defense for laptops, desktops and servers against malware. In addition, protected from even the most complex, elusive to traditional means of security attacks, such as a rootkit, exploit "zero day" and changing spyware.
DownLoad Norton 360 Symantec Endpoint Protection v11 Full 2013 
 Symantec Endpoint Protection v11.0.7 RU7 MP3 11.0.7300.1294 (x86/x64) | 3.7 GB
Symantec Endpoint Protection provides not only an industry-leading antivirus protection, but also based on the signatures protect against spyware. This solution also provides 
threat prevention that protects endpoints from targeted attacks and unknown. It includes ready-intensive technologies that automatically analyze application behaviors and network 
connections to detect and block suspicious activities, as well as administration capabilities that allow certain actions to prohibit devices and applications that are considered 
extremely dangerous for the organization.

Key features include:
• Comprehensive protection - integrating the best technologies to prevent security threats from even the most remote of new and unknown attackers on their entry into the network
• Proactive protection - a new module Proactive threat Proactive Threat Scan uses a unique Symantec technology to assess the correct and incorrect actions of unknown 
applications, which improves detection and reduces the number of false positives without the need to create a configuration based on the rules.
• Industry-leading threat detection - Symantec protection mechanisms develop industry-leading network of Global Intelligence Network to provide an unprecedented opportunity to 
view all Internet gateway.
• Simplicity - Single agent, single console - combines the full range of security technologies in a single agent and a centralized management console with an intuitive user interface, 
as well as a means to create graphical web-based reporting.
• Ease of deployment - because it requires only one agent and one management console, and the work is carried out with existing investments in IT and security, Symantec 
Endpoint Protection solution delivers ease of implementation and deployment.
• Low cost of ownership Symantec Endpoint Protection solution delivers a lower cost of ownership by reducing administrative costs. Well as costs associated with managing 
multiple endpoint security products.
• Perfection
• Easy to install
• Support for Symantec Network Access Control
• Improve the effectiveness of existing security technologies and IT investments
• and more.

Main functions:
• Enhanced protection from viruses and spyware. Integrated protection against viruses and spyware technology-based Symantec Antivirus with full real-time protection and 
automatic means of containment and decontamination of threats
• rule-based filtering mechanism traffic. The leading (according to Gartner) Sygate technology for filtering both open and encrypted network traffic
• Technology Generic Exploit Blocking. Based on IPS technology allows you to block the penetration of threats that exploit application vulnerabilities
• Advanced Technology - detecting and removing rootkits. Provides advanced mechanisms to detect and remove rootkits using tools VxMS (Veritas Mapping Service, 
Technology Veritas). This allows access to a lower level operating system to enable in-depth analysis of processes.
• Deep inspection of network packets. Enables administrators to create their own rules of IPS, and analyze application-level network traffic using HIPS-analysis system
• Proactive protection. Behavioral analysis technology from WholeSecurity, allowing on the basis of ballroom behavior analysis applications relate them to one or another category 
of reliability and safety
• Control Applications. Allows administrators to control access to such elements as processes, files, and folders by users and applications, as well as to analyze and control the 
registry, modules and components of the operating system and applications. Allows you to block various applications to ensure data integrity, as well as possible damage to the 
system and applications

System requirements:

Windows operating systems

32-bit systems:
• Windows 2000 Professional, Server, Advanced Server, Datacenter Server, Small Business Server with Service Pack 3 or later
• Windows XP Professional Edition with Service Pack 1 or later
• Windows Server 2003 Standard Edition, Enterprise Edition, Datacenter Edition, Storage Edition, Web Edition, Small Business Server
• Windows Vista (all versions x86 and service packs)
• Windows 7 (all versions x86)
• Windows Server 2008 Standard, Enterprise, Windows Server 2008 Datacenter, Windows Web Server 2008 (R2 is supported and all service packs)

64-bit systems:
• Windows XP Professional Edition with Service Pack 1 or later
• Windows Server 2003 Standard Edition, Enterprise Edition, Datacenter Edition, Storage Edition, Small Business Server
• Windows Vista (all versions x64 and service packs)
• Windows 7 (all versions x64).
• Windows Server 2008 Standard, Windows Server 2008 Enterprise, Windows Server 2008 Datacenter, Windows Web Server 2008 (R2 is supported and all service packs).
• Windows Essential Business Server 2008 Standard Edition and Premium Edition (R2 is supported and all service packs).
• Windows Small Business Server 2008 Standard Edition and Premium Edition (R2 is supported and all service packs).

Hardware

32-bit systems:
• 256 MB of RAM (1 GB recommended) for Windows XP, Windows XP Embedded and Windows Fundamentals for older computers
• 1 GB RAM minimum (2-4 GB recommended) for Windows Vista, Windows 7, Windows Server 2003 (all versions) and Windows Server 2008 (all versions)
• 600 MB of hard disk space

Mac OS X
• Mac OS X 10.4-10.6 (Only 32-bit versions)
• 256 MB of RAM (512 MB recommended) for Mac OS X 10.4
• 512 MB RAM for Mac OS X 10.5
• 1 GB of RAM for Mac OS X 10.6
• 300 MB of disk space for Mac

Operating system Linux (32 - and 64-bit)
• Red Hat Enterprise Linux 3.x, 4.x, 5.x
• SuSE Linux Enterprise (server / desktop) 9.x, 10.x
• Novell Open Enterprise Server (OES/OES2)
• VMWare ESX 2.5, 3.x
• Ubuntu 7.x, 8.x
• Debian 4.x

The management server

Processor
• Note: Itanium is not supported
• Intel Pentium processor or compatible architecture (32 - or 64-bit)
Windows operating systems
Download









 

0 Comments:

Post a Comment