IT Security

End Point Security

Client security applications, often referred to as "endpoint protection clients," are a crucial part of the defense of your computer system from malicious attacks and other security risks. Endpoint protection consists of anti-virus, anti-spyware, intrusion prevention, and client firewall. These components are the most important things to have installed in order to keep your computer safe.

Network Security

Enterprise Security for Gateways consolidates your web and email security into a single virtualized solution that delivers a unified, multi-threat defense at your network perimeter—keeping malware, malicious links, and unwanted content out. Deployed as hardware or software virtual appliances, this gateway suite supports data center consolidation, streamlines administration, and consumes fewer resources. Learn how Enterprise Security for Gateways unifies multilayered, multi-threat protection to provide you with superior gateway protection while saving your time and money. Web Security Gateway provides the defenses you need to defend against advanced attacks: real-time threat analysis at web gateways, plus forensic reporting

Information Right Management

Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management. This can cause confusion, because digital rights management (DRM) technologies are typically associated with business-to-consumer systems designed to protect rich media such as music and video. IRM is a technology which allows for information (mostly in the form of documents) to be ‘remote controlled’.

This means that information and its control can now be separately created, viewed, edited and distributed. A true IRM system is typically used to protect information in a business-to- business model, such as financial data, intellectual property and executive communications. IRM currently applies mainly to documents and emails

Virtualisation Security

Driving the high levels of protection and compliance you need. Mitigate the risks introduced by virtualization and achieve even greater protection than you thought possible in a purely physical environment. Whether you are trying to prevent unauthorized access, maintaining isolation and separation of systems, discovering and monitoring sensitive data, or consolidating log monitoring across virtual and physical infrastructure, with Symantec you can confidently accelerate your virtualization initiatives to include even the most critical of applications and services. The Virtualisation security supports the exact same next-generation firewall and advanced threat prevention features available in our physical form factor appliances, allowing you to safely enable applications flowing into, and across your private, public and hybrid cloud computing environments. Automation features and an API enable you to dynamically update security policies as your VM environment changes, eliminating potential security lag.