Feeds

Symantec's 'Hamlet' becomes 'Endpoint Protection'

Corporate antivirus no longer a tragedy?

Providing a secure and efficient Helpdesk

Vision 2007 Symantec is cracking open the lid today on a gumbo of acquired security technologies which will replace its current business security software, Symantec AntiVirus.

Endpoint Protection 11.0, formally code-named Hamlet, has entered public beta for users curious to get a whiff of Symantec's latest concoction, expected to be ready for public consumption in September.

The software bundles antivirus, antispyware, firewall, network and host intrusion prevention systems, application and device control, and rootkit detection into a single agent. The technology behind Endpoint Protection is a conglomeration of Symantec corporate purchases, such as Sygate, Veritas and Whole Security.

"Today's anti-virus software isn't enough for the current landscape," director of the Endpoint Security group, George Myers said.

Symantec aims to clobber the modern digital bogeyman with an application suite that isn't solely focused on devices, but rather how applications behave and interact.

Endpoint Protection 11.0 introduces a "proactive" threat detection to stave off zero-day threats by scanning the behavior of programs. Proactive Threat Scan detects and blocks programs without a signature. Symantec has also added device control which allows users to block access to memory keys, USB devices and back-up drives to prevent data theft.

The suite also incorporates Generic Exploit Blocking, which has the ability to, er, block new exploits on a networking level. This allows users to plug up vulnerabilities on a network using a single signature. Symantec's firewall protection now dynamically adjusts port settings to block threats from spreading, and inspects regular and encrypted network traffic.

While increasing what goes on behind the curtain, Symantec, of course, said the suite is relatively easy on resources. Myers claims the idle memory footprint of Endpoint Protection 11.0 is at about 21MB. The program can also scale resources eaten by a scan based on the activity of the system.

Symantec isn't ready to talk pricing, but said the cost will be in line with its current antivirus offering. The actual figure will be ready when EndPoint Protection 11.0 gets closer to release. ®

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.