Feeds

Symantec's 'Hamlet' becomes 'Endpoint Protection'

Corporate antivirus no longer a tragedy?

High performance access to file storage

Vision 2007 Symantec is cracking open the lid today on a gumbo of acquired security technologies which will replace its current business security software, Symantec AntiVirus.

Endpoint Protection 11.0, formally code-named Hamlet, has entered public beta for users curious to get a whiff of Symantec's latest concoction, expected to be ready for public consumption in September.

The software bundles antivirus, antispyware, firewall, network and host intrusion prevention systems, application and device control, and rootkit detection into a single agent. The technology behind Endpoint Protection is a conglomeration of Symantec corporate purchases, such as Sygate, Veritas and Whole Security.

"Today's anti-virus software isn't enough for the current landscape," director of the Endpoint Security group, George Myers said.

Symantec aims to clobber the modern digital bogeyman with an application suite that isn't solely focused on devices, but rather how applications behave and interact.

Endpoint Protection 11.0 introduces a "proactive" threat detection to stave off zero-day threats by scanning the behavior of programs. Proactive Threat Scan detects and blocks programs without a signature. Symantec has also added device control which allows users to block access to memory keys, USB devices and back-up drives to prevent data theft.

The suite also incorporates Generic Exploit Blocking, which has the ability to, er, block new exploits on a networking level. This allows users to plug up vulnerabilities on a network using a single signature. Symantec's firewall protection now dynamically adjusts port settings to block threats from spreading, and inspects regular and encrypted network traffic.

While increasing what goes on behind the curtain, Symantec, of course, said the suite is relatively easy on resources. Myers claims the idle memory footprint of Endpoint Protection 11.0 is at about 21MB. The program can also scale resources eaten by a scan based on the activity of the system.

Symantec isn't ready to talk pricing, but said the cost will be in line with its current antivirus offering. The actual figure will be ready when EndPoint Protection 11.0 gets closer to release. ®

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.