Feeds

Symantec's 'Hamlet' becomes 'Endpoint Protection'

Corporate antivirus no longer a tragedy?

Beginner's guide to SSL certificates

Vision 2007 Symantec is cracking open the lid today on a gumbo of acquired security technologies which will replace its current business security software, Symantec AntiVirus.

Endpoint Protection 11.0, formally code-named Hamlet, has entered public beta for users curious to get a whiff of Symantec's latest concoction, expected to be ready for public consumption in September.

The software bundles antivirus, antispyware, firewall, network and host intrusion prevention systems, application and device control, and rootkit detection into a single agent. The technology behind Endpoint Protection is a conglomeration of Symantec corporate purchases, such as Sygate, Veritas and Whole Security.

"Today's anti-virus software isn't enough for the current landscape," director of the Endpoint Security group, George Myers said.

Symantec aims to clobber the modern digital bogeyman with an application suite that isn't solely focused on devices, but rather how applications behave and interact.

Endpoint Protection 11.0 introduces a "proactive" threat detection to stave off zero-day threats by scanning the behavior of programs. Proactive Threat Scan detects and blocks programs without a signature. Symantec has also added device control which allows users to block access to memory keys, USB devices and back-up drives to prevent data theft.

The suite also incorporates Generic Exploit Blocking, which has the ability to, er, block new exploits on a networking level. This allows users to plug up vulnerabilities on a network using a single signature. Symantec's firewall protection now dynamically adjusts port settings to block threats from spreading, and inspects regular and encrypted network traffic.

While increasing what goes on behind the curtain, Symantec, of course, said the suite is relatively easy on resources. Myers claims the idle memory footprint of Endpoint Protection 11.0 is at about 21MB. The program can also scale resources eaten by a scan based on the activity of the system.

Symantec isn't ready to talk pricing, but said the cost will be in line with its current antivirus offering. The actual figure will be ready when EndPoint Protection 11.0 gets closer to release. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
SMASH the Bash bug! Red Hat, Apple scramble for patch batches
'Applying multiple security updates is extremely difficult'
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Desperate VXers enslave FREEZERS in DDoS bot
Updated Spike malware targets Asia
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.