{"id":22556,"date":"2024-05-31T10:56:04","date_gmt":"2024-05-31T09:56:04","guid":{"rendered":"https:\/\/www.qbssoftware.com\/fr\/product\/symantec-endpoint-security\/"},"modified":"2025-03-27T11:56:20","modified_gmt":"2025-03-27T11:56:20","slug":"symantec-endpoint-security","status":"publish","type":"product","link":"https:\/\/www.qbssoftware.com\/fr\/product\/symantec-endpoint-security\/","title":{"rendered":"Symantec Endpoint Security"},"content":{"rendered":"
Symantec Endpoint Protection leverages the largest endpoint work together with advanced machine learning algorithms to protect you and your data.<\/p>\n
Symantec Endpoint Protection is designed to address todays threat landscape with a comprehensive approach that spans the attack chain and provides defense in depth. By utilising one of the worlds largest civilian threat intelligence network, Symantec Endpoint Protection 14 can effectively stop advanced threats with next generation technologies that apply advanced machine-learning, file reputation analysis and real-time behavioral monitoring. In addition to essential prevention technologies that are equally important to an organisations overall protection. With a single management console and lightweight agent that can integrate with other products in the security infrastructure to quickly respond to threats, Symantec Endpoint Protection 14 provides protection at the endpoint without compromising performance.<\/p>\n
It includes the following editions:<\/strong><\/p>\n <\/p>\n Superior Protection:<\/strong><\/p>\n High Performance:<\/strong><\/p>\n Orchestrated Response:<\/strong><\/p>\n <\/p>\n Embedded database included or choose from the following:<\/p>\n ** Support added in 12.1.6 MP1a.<\/p>\n","protected":false},"excerpt":{"rendered":" Symantec Endpoint Protection leverages the largest endpoint work together with advanced machine learning algorithms to protect you and your data. Symantec Endpoint Protection is designed to address todays threat landscape with a comprehensive approach that spans the attack chain and provides defense in depth. By utilising one of the worlds largest civilian threat intelligence network, […]<\/p>\n","protected":false},"featured_media":84108,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false},"product_brand":[7652],"product_cat":[9044,9008],"product_tag":[],"class_list":{"0":"post-22556","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_brand-symantec","7":"product_cat-anti-virus","8":"product_cat-security","10":"first","11":"outofstock","12":"shipping-taxable","13":"product-type-simple"},"acf":[],"yoast_head":"\n\n
Symantec Endpoint Security – Features<\/h2>\n
Key Features:<\/h2>\n
\n
\n
\n
\n
Symantec Endpoint Security – System Requirements<\/h2>\n
Client Workstation and Server System Requirements<\/H3>
Windows Operating Systems<\/H3>
Macintosh Operating Systems<\/H3>
Linux Operating Systems (32-bit and 64-bit versions)<\/H3>
Virtual Environments<\/H3>
Hardware Requirements<\/H3>
Mac Hardware Requirements<\/H3>
Linux Hardware Requirements<\/H3>
Manager System Requirements<\/H3>
Windows Operating Systems<\/H3>
Hardware<\/H3>
Web browser<\/H3>
Database<\/H3> <\/p>\n