How Symantec Adaptive Protection Marks a New Chapter in Security Defense

How Symantec Adaptive Protection Marks a New Chapter in Security Defense


Kevin HaleyDirector, Symantec Security Response




Enterprises across the globe are invested heavily in endpoint security to protect their endpoints. Despite the time and money spent, more breaches are happening today than ever before. Attackers have found blind spots and are exploiting them hourly. To address this challenge, security teams need to do more than plug a few holes. They need to consider an innovative approach to level up endpoint protection and maximize security overall.  We call this Adaptive Protection.
So, how can we all think about protection differently?
Symantec, a division of Broadcom, believes the answer lies in where we place our attention. Every customer environment is unique, yet today, most security technologies are delivered “dumbed down” to prevent and avoid false positives.  In addition, to get maximum protection, many vendors provide complex settings and configuration options. Tweaking them falls to the customer and if done incorrectly, the negative outcome is often disastrous. Alternatively, relying only on detection leads to diminishing returns -- and plenty of potential breaches.

Enterprises across the globe are invested heavily in endpoint security to protect their endpoints. Despite the time and money spent, more breaches are happening today than ever before. Symantec focuses on protection that is preventative, flexible – and automatic. The key ingredient is machine learning built on Symantec’s decades of experience with large organizations working to automate the configuration of protection settings and deliver the highest level of custom protection with zero impact to productivity. Stronger protection also makes detection more efficient, allowing the SOC to only focus on a limited set of threats and not have to deal with alerts and issues that protection could have stopped.
Adaptive Protection automatically/continuously reduces the endpoint attack surface. Attackers can no longer cre ..

Support the originator by clicking the read the rest link below.