Symantec Endpoint Protection

The most advanced endpoint security platform on the planet delivered as a cloud service.

Maximum defense made simple. One single agent and a unified cloud console distribute the most effective endpoint security, along with the broadest integrations across both Symantec and partner ecosystems.

Register for Webinar

The Most Advanced Endpoint Protection. Delivered with Maximum Flexibility for Your Environment.

Symantec Endpoint Protection 15 (Cloud Delivered)*

Symantec Endpoint Protection 15 defines cloud-delivered endpoint security with multilayered defense, simplified single agent/single console management with AI-guided policy updates, and the broadest set of integrations available.

DOWNLOAD THE SEP 15 DATA SHEET >

Symantec Endpoint Protection 14 (On-Premises | Hybrid)

Symantec Endpoint Protection 14 offers security against all known attack vectors with unrivaled efficacy, cyber defense at scale delivered by one single agent, and high-performance client/on-premises management architecture.

FREE SEP 14 (ON-PREM | HYBRID) TRIAL >

DOWNLOAD THE SEP 14 DATA SHEET >

Symantec Endpoint Protection Cloud (for Business)

Symantec Endpoint Protection Cloud delivers uncompromised protection via security-as-a-service for businesses with limited IT security resources. It combines multi-layered threat protection and device management with intuitive cloud-based management.

LEARN MORE >

DOWNLOAD THE SEP CLOUD DATA SHEET >

AWARD

Symantec Endpoint Protection Wins AV-Test's Best Protection award for the fourth consecutive year.

AWARD

Symantec is ranked as a leader in endpoint security by top tier industry analysts.

Maximize Security Performance with a Multilayered Defense

The most advanced endpoint protection available—all from one single agent.

  • Beat crippling ransomware and unknown attacks with a combination of signatureless and critical endpoint technologies.
  • Maximize protection and minimize false positives with machine learning powered by the Symantec Global Intelligence Network, the world’s largest civilian threat database.
  • Block zero-day attacks that prey on memory-based vulnerabilities in popular applications.
  • Fine-tune detection engines on the fly to optimize your security posture.

DOWNLOAD THE DATA SHEET >

Phish the Phishers with Deception

Attackers reveal their methods without knowing they're watched.

  • Detect attackers by luring them into a decoy minefield.
  • Coax them into revealing their intent, tactics, and targets–so you can adapt your security posture.
  • Bait the trap by simply flipping a switch.

Simplify Rollout, Management, and Policy Updates

Streamline decision making for more accurate and useful results.

  • Simplify endpoint security management with a single cloud console.
  • Accurately update policies with fewer misconfigurations, and improve overall security hygiene, with artificial intellligence-guided security management.
  • Reduce update fatigue with the minimal footprint of Symantec's single-agent stack.

Attack Your Stack and Kill Complexity

Reduce the complexity and number of vendors in your security stack.

  • Get endpoint prevention, deception, hardening, and detection and response (EDR) with built-in, single-agent integration.
  • Maximize endpoint security efficacy and investment by integrating  with network security infrastructure.
  • Gain automation and orchestration by using open APIs for coordinating with existing IT infrastructure.

Upgrade to Symantec Complete Endpoint Defense

Need to add more layers to your endpoint defense? Upgrade from Symantec Endpoint Protection to new suites, each created for your specific security needs and maturity.

  • Expand your defense with Detection, Response and Hardening technologies.
  • Utilize interlocking defenses at the device, the app, and the network level.
  • Continue with simplified architecture with one single agent and console.

Symantec 2019 Internet Security Threat Report

Our 123 million sensors record thousands of threat events per second from 157 countries and block 142 million threats daily. Use intel from the world’s largest civilian threat network to your advantage—download ISTR 24 now.

Introducing Symantec Integrated Cyber Defense Exchange (ICDx)

Reduce complexity and cost with built-in integrations and streamlined interoperability.

ICDx simplifies product integrations and accelerates customer time to value across the Symantec enterprise portfolio and the industry’s largest partner ecosystem.

  • Remove the friction for security teams when integrating Symantec and third-party products
  • Enhance visibility from a unified view of events across Symantec products for searching, dashboards and reporting
  • Prepare higher quality cyber data to forward to SIEM and other SOC tools enhancing analytics and alerts
  • Speed responses to critical incidents with orchestrated actions targeting multiple Symantec products

Symantec Blogs

"Machine Learning: A Modern-Day Cyber Security Hero?"

"Machine Learning and Artificial Intelligence Can Help Enable Cyber Tools "

Posted: 04 Jun, 2019 | 3 Min Read

Read More

"IPv6 Is Finally Ready for Prime Time. Now What?"

"IPv6 has the potential to make the Internet a safer place. Here’s what you need to...

Posted: 28 May, 2019 | 3 Min Read

Read More

"How a Rapid Response Helped Thwart an Active Ransomware Attack"

"A ransomware attack reminded me of very valuable lessons that every organization needs to incorporate into...

Posted: 28 May, 2019 | 3 Min Read

Read More

"Malicious Bot Attacks: Why They're More Dangerous than Ever"

"Malicious bots remain a dangerous and persistent threat. Here’s how to beat them"

Posted: 22 May, 2019 | 3 Min Read

Read More

Industry Recognition

Symantec positioned highest in execution and furthest in vision in the Gartner Magic Quadrant for endpoint protection platforms.
Learn More

Symantec Endpoint Protection Wins AV-Test's Best Protection award for the fourth consecutive year.
Learn More

Symantec Wins Best Endpoint Security at SC Awards 2018.
Learn More

Symantec named a market leader in Next Generation Endpoint Security.
Learn More

Customers Validate Symantec Endpoint Protection Effectiveness

Gartner Peer Insights Customer Choice Award 2018
Learn More

Williams Martini Racing
Learn More

The Economist
Learn More

State of Oklahoma
Learn More

Discover Our Community

View the latest product discussions in our forums.

Need help?

Technical support and more.

Client Workstation and Server System Requirements*

Windows Operating Systems
  • Windows 7 (32-bit, 64-bit; RTM and SP1)
  • Windows Embedded 7 Standard, POSReady, and Enterprise (32-bit and 64-bit)
  • Windows 8 (32-bit, 64-bit)
  • Windows Embedded 8 Standard (32-bit and 64-bit)
  • Windows 8.1 (32-bit, 64-bit), including Windows To Go
  • Windows 8.1 update for April 2014 (32-bit, 64-bit)
  • Windows 8.1 update for August 2014 (32-bit, 64-bit)
  • Windows Embedded 8.1 Pro, Industry Pro, and Industry Enterprise (32-bit and 64-bit)
  • Windows 10 (32-bit, 64-bit)
  • Windows 10 November Update (2015) (32-bit, 64-bit)
  • Windows 10 Anniversary Update (2016) (32-bit, 64-bit)
  • Windows 10 Creators Update (version 1703) (32-bit, 64-bit)
  • Windows 10 Fall Creators Update (version 1709) (32-bit, 64-bit)
  • Windows 10 April 2018 Update (version 1803) (32-bit, 64-bit)
  • Windows 10 October 2018 Update (version 1809) (32-bit, 64-bit)
  • Windows Server 2008 (32-bit, 64-bit; R2, SP1, and SP2)
  • Windows Small Business Server 2008 (64-bit)
  • Windows Essential Business Server 2008 (64-bit)
  • Windows Small Business Server 2011 (64-bit)
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
Macintosh Operating Systems
  • Mac OS X 10.10, 10.11, macOS 10.12, 10.13, 10.14
Linux Operating Systems (32-bit and 64-bit versions)
  • Amazon Linux
  • CentOS 6U3, 6U4, 6U5, 6U6, 7, 7U1, 7U2, 7U3; 32-bit and 64-bit
  • Debian 6.0.5 Squeeze, Debian 8 Jessie; 32-bit and 64-bit
  • Fedora 16, 17; 32-bit and 64-bit
  • Oracle Linux (OEL) 6U2, 6U4, 6U5, 7, 7.1, 7.2, 7.3
  • Red Hat Enterprise Linux Server (RHEL) 6U2 - 6U8, 7 - 7.3
  • SUSE Linux Enterprise Server (SLES) 11 SP1 - 11 SP4, 32-bit and 64-bit; 12, 12 SP1 - 12 SP3, 64-bit 
  • SUSE Linux Enterprise Desktop (SLED) 11 SP1 - 11 SP4, 32-bit and 64-bit; 12 SP3, 64-bit 
  • Ubuntu 12.04, 14.04, 16.04; 32-bit and 64-bit
Virtual Environments
  • Microsoft Azure
  • Amazon WorkSpaces
  • VMware WS 5.0, GSX 3.2 or later, ESX 2.5 or later
  • VMware ESXi 4.1 – 5.5
  • VMware ESX 6.0
  • Microsoft Virtual Server 2005
  • Microsoft Windows Server 2008, 2012, and 2012 R2 Hyper-V
  • Citrix XenServer 5.6 or later
  • Virtual Box by Oracle
Windows Hardware Requirements
  • 32-bit processor: 2 GHz Intel Pentium III or equivalent minimum (Intel Pentium 4 or equivalent recommended)
  • 64-bit processor: 2 GHz Pentium 4 with x86-64 support or equivalent minimum
  • 1 GB of RAM (2 GB recommended)
  • 530 MB of free space on the hard disk
Mac Hardware Requirements
  • 64 - Bit Intel Core 2 Duo or later
  • 2 GB of RAM
  • 500 MB of free space on the hard disk
Linux Hardware Requirements
  • Intel Pentium 4 (2 GHz CPU or higher)
  • 1 GB of RAM
  • 7 GB of free space on the hard disk

Manager System Requirements

Windows Operating Systems
  • Windows Server 2008 (64 bit)
  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
Hardware
  • Intel Pentium Dual-Core or equivalent minimum; 8-core or greater recommended
  • 2 GB of RAM (8 GB recommended)
  • 40 GB available minimum free hard disk space (200 GB recommended) for the management server and database
Web Browser
  • Microsoft Internet Explorer 11
  • Mozilla Firefox 5.x through 60
  • Google Chrome 66
  • Microsoft Edge
Database

Embedded database included or choose from the following:

  • SQL Server 2008, SP4
  • SQL Server 2008 R2, SP3
  • SQL Server 2012, RTM – SP3
  • SQL Server 2014, RTM – SP2
  • SQL Server 2016, RTM, SP1
  • SQL Server 2017
Symantec Endpoint Protection client must run one of the following Windows desktop operating systems to run Symantec Endpoint Protection Hardening:
  • Windows 7 (RTM and SP1), Professional, Enterprise
  • Windows 8, Professional, Enterprise 
  • Windows 8.1 (update for April 2014 and August 2014; Windows To Go), Professional, Enterprise 
  • Windows 10 (RTM), Professional, Enterprise 
  • Windows 10 November Update (version 1511), Professional, Enterprise 
  • Windows 10 Anniversary Update (version 1607), Professional, Enterprise
  • Windows 10 Creators Update (version 1703), Professional, Enterprise
  • Windows 10 Fall Creators Update (version 1709), Professional, Enterprise
  • Windows 10 April 2018 Update (version 1803), Professional, Enterprise
  • Windows 10 October 2018 Update (version 1809), Professional, Enterprise (32-bit, 64-bit)