Endpoint Security - Market Quadrant 2021
Copyright © November 2021, The Radicati Group, Inc. Licensed for distribution. 17
protection, advanced machine learning, behavioral analysis, reputation filtering, exploit and
intrusion prevention, deception, mail security, web security, firewall, device control,
antivirus removal tools, recovery tools, reporting, REST APIs, and integration with
Symantec intelligent threat cloud capabilities. The solution also includes Mobile Threat
Defense, endpoint detection and response, Threat Hunter, protections against Active
Directory exploits, attack surface reduction capabilities, such as Adaptive Protection,
application control, and extended operating system protections. It protects all endpoints
including workstations, laptops, mobile phones, tablets, and servers and is compatible with
Windows, macOS, Linux, Android, iOS, VMware ESX, Citrix XenServer, and other virtual
machines. The solution is managed from a centralized console, which supports the definition
of granular management policies. Key capabilities include:
o Advanced mobile threat defense – uses predictive technology in a layered approach that
leverages crowd-sourced threat intelligence, in addition to device and server based
analysis, to proactively protect mobile devices from malware, network threats, and
application or OS vulnerability exploits.
o Endpoint Detection and Response (EDR) – detects advanced attacks, provides real-time
analytics, and enables SOC teams to actively hunt threats and pursue forensic
investigations and remediation.
o Threat Intelligence API – provides access to Symantec’s Global Intelligence Network
(GIN). Through API integration into partners with SIEM/SOAR/TIP, SOC teams can
easily identify the scope of an attack and streamline their threat investigations.
o Application Control – assesses the risk level of applications and their vulnerabilities, and
allows only “known good” applications to run.
o Active Directory Security – automatically learns an organization’s entire Active Directory
structure and uses obfuscation to prevent attackers from stealing credentials and moving
laterally within the organization.
o Adaptive Protection – provides attack surface reduction that evolves with the threat
landscape to address each organization’s unique environment. It relies on Advanced
Machine Learning to automate granular behavioral rules resulting in no operational
impact.