OverviewSymantec Endpoint Protection is fast, powerful security for endpoints Symantec Endpoint Protection offers comprehensive defense against all types of attacks for both physical and virtual systems Symantec Endpoint Protection provides control over your endpoint security with built in network access control, device management and application management State-of-the-art protection from the world leader in security Integrates antivirus, antispyware, firewall, and intrusion prevention as well as network access, device and application control Requires only a single agent Powerful central management of security for physical and virtual Windows and Mac endpoints Enables instant NAC upgrade without additional software deployment Seamless migration from previous versions of Symantec Endpoint Protection Built to secure your virtual infrastructure Significantly improved performance powered by Insight Real-time behavioral analysis for advanced detection of new and of highly targeted threats Built for virtual environments for powerful protection of your virtual infrastructure
Integrates best-of-breed technologies to stop security threats - even from the most devious new and unknown attackers - before they penetrate the network. Detects and blocks malicious software in real time, including viruses, worms, Trojan horses, spyware, adware, and rootkits.
Proactive Threat Scan uses a unique Symantec technology to score both good and bad behaviors of unknown applications, enhancing detection and reducing false positives without the need to create rule-based configurations.
Industry-best threat landscape intelligence
Symantec's protection mechanisms leverage the industry-leading Global Intelligence Network to deliver an unparalleled view of the entire Internet threat landscape. This intelligence results in actionable protection and peace of mind against evolving attacks
Single agent, single console
Integrates a full range of security technologies into a single agent and a centralized management console, with an intuitive user interface and Web-based graphical reporting. Enables you to set and enforce security policies across the enterprise to protect your critical assets. Simplifies management, reduces system resource usage, and requires no additional agents when adding Symantec Network Access Control support.
Easy to deploy
Because it requires only a single agent and management console and operates with an organization's existing security and IT investments, Symantec Endpoint Protection is easy to implement and deploy. For organizations that want to outsource security monitoring and management, Symantec offers Managed Security Services to deliver real-time security protection.
Lower cost of ownership
Symantec Endpoint Protection delivers a lower total cost of ownership by reducing administrative overhead as well as the costs associated with managing multiple endpoint security products. This unified approach to endpoint security simplifies administration and provides operational efficiencies such as single software updates and policy updates, unified and central reporting, and a single licensing and maintenance program.
Easy to install, configure, and manage
Symantec Endpoint Protection makes it easy to enable/disable and configure desired technologies to fit into your environment.
Symantec Network Access Control ready
Each endpoint becomes "Symantec Network Access Control ready," eliminating the need to deploy additional network access control endpoint agent software.
Leverages existing security technologies and IT investments
Works with other leading antivirus vendors, firewalls, IPS technologies, and network access control infrastructures. Also works with leading software deployment tools, patch management tools, and security information management tools.
Antivirus and antispyware
Provides unmatched, best-of-breed malware protection, including market-leading antivirus protection, enhanced spyware protection, rootkit protection, reduced memory footprint, and dynamic performance adjustments to keep users productive.
Network threat protection
Offers a rules-based firewall engine and Generic Exploit Blocking (GEB) that blocks malware before it can enter a system.
Symantec Endpoint Protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops, and servers. It provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and mutating spyware.
Symantec Endpoint Protection delivers more than world-class, industry-leading antivirus and antispyware signature-based protection. It also provides advanced threat prevention that protects endpoints from targeted attacks and attacks not seen before. It includes turnkey, proactive technologies that automatically analyze application behaviors and network communications to detect and block suspicious activities, as well as administrative control features that allow you to deny specific device and application activities deemed as high risk for your organization. You can even block specific actions based on the location of the user.
This multilayered approach significantly lowers risks and gives you the confidence that your business assets are protected. It is a comprehensive product gives you all the capabilities you need, now with the ability to enable the pieces you need, as you need them. Whether the attack is coming from a malicious insider or is externally motivated, endpoints will be protected.
Symantec Endpoint Protection increases protection and helps lower your total cost of ownership by reducing administrative overhead as well as the costs associated with managing multiple endpoint security products. It provides a single agent that is administered via a single management console. This simplifies endpoint security administration and provides operational efficiencies such as single software updates and policy updates, unified and central reporting, and a single licensing and maintenance program.
Symantec Endpoint Protection is easy to implement and deploy. Symantec provides a range of consulting, technical education, and support services that guide organizations through the migration, deployment, and management of the solution and help them realize the full value of their investment. For organizations that want to outsource security monitoring and management, Symantec also offers Managed Security Services to deliver real-time security protection.
- Delivery Method
- Physical Shipment
Shipping & Order Delivery
Once your purchase is completed and has been verified by our team, we will email you all details pertaining to your order. Please allow up to 2-3 hours for processing of your order during regular business hours. Note that in certain cases processing can take up to 12 hours. For orders placed outside our business hours, you will receive your order details on the following business day. Please note that there will be no physical items shipped for all products marked Download.
UK ECONOMY SHIPPING
3-5 Business days
Available to UK residents only
EU ECONOMY SHIPPING
4-7 Business days
Available to EU residents
INTERNATIONAL (NON-EU) SHIPPING
5-10 Business days
- If your order is placed after 3PM or over the weekend, then it will be processed the following business day.
- Out of stock items: Please contact us for delivery times.
- Delivery time may vary in rural areas. If you are uncertain about your area, please contact us.
- The Delivery times noted above are estimates. UKTechStore.com cannot guarantee the delivery date or time on any shipments under any circumstances, However, we will do our very best to get your order to you as soon as we can.
All software products delivered electronically (downloads) are final sale once the product activation key has been sent, except in the case of defective items. For more information please contact us at firstname.lastname@example.org
Once you purchase a software download and we (or the Publisher) have sent you the product activation code, you are responsible for downloading (if applicable) and confirming your ability to access the software, and bear all risk of loss after downloading the application or receiving the license key, including any loss due to a computer or hard drive malfunction. If you are unable to complete a download or access an application, please contact UKTechStore customer service for assistance. We will do everything in our power to troubleshoot with you in order to help you get started. If necessary, we will put you directly in contact with the manufacturer for further support.
**We do not offer exchanges or give refunds for wrongful purchases once the Product Activation Key is sent, as it is the buyer's responsibility to check the system requirements and compatibility of any product prior to purchase.
Returns/exchanges can be made within 30 calendar days of receiving your order. The return/exchange period begins on the date the order is delivered.
All returns/exchanges for non-defective products may be subject to a restocking fee of up to 18%.
All returned products must include their original packaging and must be in undamaged condition. Your return must be received within 14 calendar days of the issuance of an RMA number.
Return shipping costs, as well as any initial shipping costs paid on the order, will be covered by the customer in all cases, unless the product is defective, damaged or incorrect.
Defective/Damaged/Incorrect items: Refund/exchange requests for defective or damaged items must always be made within 14 calendar days from the date delivered.
UKTechStore 30 day limited warranty is a defective exchange policy that provides for replacement (at our sole discretion) of software that has been confirmed as defective by either the manufacture or UKTechStore. Due to licensing and copyright laws, we do not accept returns on software once a package has been opened or downloaded and installed in the case on products sent via electronic delivery. Defective software will be exchanged for the same title only according to UKTechStore limited 30 day warranty described above. Terms and conditions may vary by product or manufacture. UKTechStore will assist customers whenever possible in gaining satisfaction with product manufactures Products returned for exchange must be in new condition, original packaging and include all disks, registration cards, packing materials and other accessories and be received within 30 days of the invoice date. We reserve the right to refuse for return or charge a restocking fee for damaged or incomplete returns.
All returns require a Return Merchandise Authorization number. Please obtain a RMA number by sending an e-mail to email@example.com. In your e-mail please include your original order number, the title of the product you wish to return, the condition of the products you would like to send back and the reason for the return. Please DO NOT ship product back without an RMA number. We WILL NOT be responsible for product that is returned to us without an RMA number. For all returns shipping is pre-paid by the customer.
If your return or exchange appears to be within our guidelines, we will then issue you an RMA number and ship-to address via e-mail within a week of your request. All RMA numbers must be clearly written on the outside of the package and must be returned to us within 15 days of the order date. Please note: issuance of an RMA number does not guarantee acceptance of your return or exchange. We cannot accept opened, non-defective merchandise for credit or exchange. OEM and DSP software cannot be returned.
Products for return or exchange must be in new condition with all accessories, packing materials, disks, key codes, cards, manuals and any other materials included. Returns should be sent freight prepaid by ground service. We will only reimburse the freight charges if we deem that the return was caused by our error i.e. incorrect product, defective product etc. All non-defective returns will incur a 15% restocking fee on the line item amount.
Download: All software products delivered electronically are final sale once the Product Activation Code has been delivered, except in the case of case of defective items. For more information please contact us at firstname.lastname@example.org
It is your responsibility to ensure that you have the computer knowledge to download and install a software program on your machine.
All the software products offered as “Download” have very simple download and installation instructions, directly from the manufacturer. If you are having difficulty installing the software purchased, we will do everything in our power to troubleshoot with you in order to help you get started. If necessary, we will put you directly in contact with the manufacturer for further support.
We do not offer exchanges or give refunds for wrongful purchases as it is the buyers responsibility to check the system requirements of any product prior to purchase.**
How to request a Return/Exchange:
Please contact us directly at email@example.com and provide the following information:
Order # #####
Product name and quantity you wish to return
Date you received your product
Condition of the product (used/unused)
Condition of product packaging (opened/unopened)
Reason for return
Once your request has been approved, you will receive an RMA number and your return instructions. Please follow these instructions closely in order to ensure that your return is received and processed correctly. All refunds will be processed within 1-4 business days upon receipt of the returned item.