Symantec unveils Endpoint Protection 12
Endpoint Protection 12 uses Symantec's Insight technology to protect against a wide array of threats.


Symantec has unveiled its latest endpoint protection software, designed to help firms deal with the explosion in malware.
In 2010 alone, hackers sent out more than 286 million unique pieces of malware, representing an average of more than nine new threats every second, Symantec said.
The updated versions of Symantec Endpoint Protection and Symantec Endpoint Protection Small Business Edition, both currently in beta, use the security giant's cloud based reputation technology Insight, previously known as Ubiquity.
Insight contains security ratings for more than 2.5 billion unique software files. This means the database has ratings for almost every software file in existence today, according to Symantec.
The products also come with SONAR 3, a hybrid behaviour and reputation engine, which forms a profile of a threat based on those two attributes and is designed to block zero-day and targeted threats.
Furthermore, the new endpoint products have been created with virtualised environments in mind, making the agent intelligent so it can detect when it is installed on virtual machines (VMs) and report back to the management console.
"Therefore the administrator can create policies that are appropriate to virtual environments," Mike Jones, Symantec's principal product marketing manager, told IT PRO.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"That would mean, for example, a set of VMs that share a host, the load can effectively be balanced across them so that you don't get what is often called an AV storm of concurrent scans on the same system, bogging it down."
Endpoint Protection 12 technologies can detect which key components across VMs do not need to be scanned, further lightening the workload.
"Previously, all intelligence had to be in the knowledge of the administrator, now we provide that to them," Jones added.
Businesses will have to wait to get their hands on Symantec Endpoint Protection 12 packages, which are only available in beta form through invite only. The public beta is expected to be available from April.
The products will be officially launched later in the year, but no specific date or quarter was given.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Third time lucky? Microsoft finally begins roll-out of controversial Recall feature
News The Windows Recall feature has been plagued by setbacks and backlash from security professionals
By Emma Woollacott Published
-
The UK government wants quantum technology out of the lab and in the hands of enterprises
News The UK government has unveiled plans to invest £121 million in quantum computing projects in an effort to drive real-world applications and adoption rates.
By Emma Woollacott Published
-
The threat prevention buyer's guide
Whitepaper Find the best advanced and file-based threat protection solution for you
By ITPro Published
-
Supply chain as kill chain
Whitepaper Security in the era Zero Trust
By ITPro Published
-
Microsoft under fire for “negligent” security practices in scathing critique by industry exec
News Microsoft took more than 90 days to issue a partial fix for a critical Azure vulnerability, researchers found
By Ross Kelly Published
-
Apple patches zero day linked to spyware campaign
News Kaspersky researchers were the first to report a zero day used in a sophisticated attack chain
By Rory Bathgate Published
-
MOVEit cyber attack: Cl0p sparks speculation that it’s lost control of hack
News The hackers return with their second major data-extortion attack of 2023, but may have bitten off more than they can chew
By Connor Jones Published
-
Microsoft says it knows who was behind cyber attacks on MOVEit Transfer
Dozens of organizations may have already lost data to hackers exploiting the critical flaw
By Rory Bathgate Published
-
Trend Micro security predictions for 2023
Whitepaper Prioritise cyber security strategies on capabilities rather than costs
By ITPro Published
-
Windows, macOS, and Tesla exploits debuted at Pwn2Own hacking contest
News Researchers took home more than $375,000 in winnings on the first day of the competition
By Ross Kelly Published