<< WIN Symantec Endpoint Protection 12.1.6318.6100 + Symantec Norton Utilities 160239 by Den Spike Unattendeds © 2015
Symantec Endpoint Protection 12.1.6318.6100 + Symantec Norton Utilities 160239 by Den Spike Unattendeds © 2015
Category Applications
PlatformWindows
GenreSecurity software
Date 9 years, 3 weeks
Size 405.28 MB
 
Website http://www.wicked4all.info
 
Sender DenSpike (YnF0g)
Tag WICKED4ALL
 
Searchengine Search
NZB NZB
 
Number of spamreports 0

Post Description

Endpoint Protection:
--------------------

Key Features:
• Provides unmatched protection from the market leader in endpoint security
• Seamlessly integrates antivirus protection, antispyware, firewall, intrusion prevention, device and application
control
• Requires only a single agent
• Powerful central management of security on Windows and Macintosh endpoints
• Enables instant NAC upgrade without additional software deployment
• Antispyware and antivirus programs for and Macintosh and Linux clients
• Secures both physical and virtual environments

New Features:
• Single Agent and Single Console
Delivers a single agent for all Symantec Endpoint Protection technologies and Symantec Network Access Control. Delivers
a single integrated interface for managing all Symantec Endpoint Protection technologies and Symantec Network Access
Control. All allow for a single communication method and content delivery system across all technologies.
* Provides operational efficiencies such as single software updates, single policy updates.
* Provides unified and central reporting.
* Provides unified licensing and maintenance.
* Requires no change to the client when adding Symantec Network Access Control enforcement.
* Lowers Total Cost of Ownership for endpoint security.
* Reduces administrative effort.

• Proactive Threat Scanning
Behavioral-based protection that protects against zero-day threats and threats not seen before. Unlike other heuristic-
based technologies, Proactive Threat Scan scores both the good and bad behavior of unknown applications, providing a more
accurate malware detection.
* Accurately detects malware without the need to set up rule-based configurations.
* Helps lower the number of false positives.

• Advanced Rootkit Detection and Removal
Provides superior rootkit detection and removal by integrating VxMS (Veritas Mapping Service—a Veritas technology),
thereby providing access below the operating system to allow thorough analysis and repair.
* Detects and removes the most difficult rootkits.
* Saves time and money and productivity lossses associated with re-imaging infected machines.

• Application Control
Allows administrators to control access to specific processes, files, and folders by users and other applications. It
provides application analysis, process control, file and registry access control, and module and DLL control. It enables
administrators to restrict certain activities deemed as suspicious or high risk.
* Prevents malware from spreading or harming endpoints.
* Locks down endpoints to prevent data leakage.

• Device Control
Controls which peripherals can be connected to a machine and how the peripherals are used. It locks down an endpoints to
prevent connections from thumb drives, CD burners, printers, and other USB devices.
* Prevents sensitive and confidential data from being extracted or stolen from endpoints (data leakage).
* Prevents endpoints from being infected by viruses spread from peripheral devices.

Norton Utilities NL:
--------------------

De snelste manier om je pc sneller te maken.

Norton Utilities™


Biedt functies voor het opruimen, afstellen en versnellen van je pc, zodat hij weer als nieuw gaat draaien
•Zorgt dat je oude pc weer als nieuw gaat draaien.
•Versnelt het opstarten van de pc.
•Verhelpt veel voorkomende computerproblemen.
•Repareert problemen met de harde schijf en maakt schijfruimte vrij.

---------------------------------------------------------------------------------------------------------
LET OP! Bij Endpoint Protection zal je PC voor het afronden van de installatie, automatisch herstarten, dus hou hier
rekening mee aub
---------------------------------------------------------------------------------------------------------

Veel plezier ermee!


*Laat je PC tijdens installatie even met rust aub!

*Unattended software altijd als Administrator uitvoeren.

*De installer zoekt automatisch naar de juiste architectuur van je systeem de 32 of 64 bit

*Installatie is volledig Unattended.

*Tijdens installatie wordt het programma geactiveerd.

*Geschikt voor 32 en 64 bit systemen.

*Getest op W8.1 Enterprise 32 bit en W10 Professional 64 bit.
---------------------------------------------------------------------------------------------------------

GRTZ,
Den Spike

Comments # 0