Feeds

Symantec's 'Hamlet' becomes 'Endpoint Protection'

Corporate antivirus no longer a tragedy?

Reducing security risks from open source software

Vision 2007 Symantec is cracking open the lid today on a gumbo of acquired security technologies which will replace its current business security software, Symantec AntiVirus.

Endpoint Protection 11.0, formally code-named Hamlet, has entered public beta for users curious to get a whiff of Symantec's latest concoction, expected to be ready for public consumption in September.

The software bundles antivirus, antispyware, firewall, network and host intrusion prevention systems, application and device control, and rootkit detection into a single agent. The technology behind Endpoint Protection is a conglomeration of Symantec corporate purchases, such as Sygate, Veritas and Whole Security.

"Today's anti-virus software isn't enough for the current landscape," director of the Endpoint Security group, George Myers said.

Symantec aims to clobber the modern digital bogeyman with an application suite that isn't solely focused on devices, but rather how applications behave and interact.

Endpoint Protection 11.0 introduces a "proactive" threat detection to stave off zero-day threats by scanning the behavior of programs. Proactive Threat Scan detects and blocks programs without a signature. Symantec has also added device control which allows users to block access to memory keys, USB devices and back-up drives to prevent data theft.

The suite also incorporates Generic Exploit Blocking, which has the ability to, er, block new exploits on a networking level. This allows users to plug up vulnerabilities on a network using a single signature. Symantec's firewall protection now dynamically adjusts port settings to block threats from spreading, and inspects regular and encrypted network traffic.

While increasing what goes on behind the curtain, Symantec, of course, said the suite is relatively easy on resources. Myers claims the idle memory footprint of Endpoint Protection 11.0 is at about 21MB. The program can also scale resources eaten by a scan based on the activity of the system.

Symantec isn't ready to talk pricing, but said the cost will be in line with its current antivirus offering. The actual figure will be ready when EndPoint Protection 11.0 gets closer to release. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.