صفحه 1 از 2 12 آخرین
نمایش نتایج: از شماره 1 تا 10 از مجموع 11

موضوع: مباحث Symantec

  1. عضو متخصص ali68124 آواتار ها
    نمایش اطلاعات
    #1

    پیش فرض مباحث Symantec


    شرکت سیمانتک (Symantec Corporation) بزرگترین شرکت تولیدکننده نرم‌افزارهای امنیتی برای رایانه‌های شخصی در دنیا است.
    این شرکت در سال ۱۹۸۲ توسط گری هندریکس با کمک بنیاد ملی علوم آمریکا تاسیس شد. فعالیت‌های این شرکت بیشتر بر روی پروژه‌های مرتبط با هوش مصنوعی متمرکز بود. هندریکس چندین پژوهشگر در زمینه پردازش زبان‌های طبیعی از دانشگاه استنفورد استخدام کرد که در حقیقت اولین کارمندان شرکت سیمانتک بودند.
    در سال ۱۹۸۴ سیمانتک توسط شرکت نرم‌افزاری C&E خریداری شد که مالکان آن دنیس کولمن و گوردن ایوبنکس بودند. بعد از ادغام این دوشرکت نام سیمانتک بر روی این شرکت جدید باقی ماند و ایوبنکس به سمت مدیر ارشد اجرایی منصوب شد. اولین محصول شرکت یک نرم‌افزار با نام کیواندای بود که در سال ۱۹۸۵ منتشر شد. این نرم‌افزار یک سامانه مدیریت پایگاه داده‌ها را بهمراه یک واژه پرداز فراهم می‌آورد.
    در اگوست ۱۹۹۰ شرکت رایانه‌ای پیتر نورتون که نرم‌افزارهای مختلفی تحت سیستم‌عامل داس ارایه کرده بود توسط شرکت سیمانتک خریداری شد. نرم‌افزار ضدویروس و ابزارهای مدیریت اطلاعات که توسط شرکت سیمانتک منتشر می‌شوند همچنان با نام پیتر نورتون در بازار عرضه می‌شوند.
    اين شركت با بيش از 17500 كارمند در بيش از 40 كشور مختلف، از بزرگترين كمپاني هاي جهان به شمار مي رود. سيمانتك ارائه كننده محصولات امنيتي، مديريتي و پشتيبان گيري به مشتريان خود از شركتهاي كوچك تا بزرگترين شركتهاي جهاني كمك مي كند تا امنيت و مديريت اطلاعات خود را هرچه كاملتر و كارآمدتر محقق سازند.
    تصاویر پیوست شده

  2. نمایش تشکر

  3. عضو متخصص ali68124 آواتار ها
    نمایش اطلاعات
    #2

    پیش فرض Symantec Endpoint Protection 12.1.2


    Symantec Endpoint Protection combines Symantec AntiVirus with advanced threat prevention to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.
    Endpoint Protection protects networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms. Centralized policy management and response capabilities ease the administrative burden and lower the cost of managing security at the network, mobile, and remote client level.
    • Stops malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits.
    • Prevents security outbreaks thus reducing administrative overhead.
    • Lowers total cost of ownership for endpoint security.
    Key Features:
    • Provides unmatched protection from the market leader in endpoint security
    • Seamlessly integrates antivirus protection, antispyware, firewall, intrusion prevention, device and application control
    • Requires only a single agent
    • Powerful central management of security on Windows and Macintosh endpoints
    • Enables instant NAC upgrade without additional software deployment
    • Antispyware and antivirus programs for and Macintosh and Linux clients
    • Secures both physical and virtual environments
    New Features:
    • Single Agent and Single Console
    Delivers a single agent for all Symantec Endpoint Protection technologies and Symantec Network Access Control. Delivers a single integrated interface for managing all Symantec Endpoint Protection technologies and Symantec Network Access Control. All allow for a single communication method and content delivery system across all technologies.
    * Provides operational efficiencies such as single software updates, single policy updates.
    * Provides unified and central reporting.
    * Provides unified licensing and maintenance.
    * Requires no change to the client when adding Symantec Network Access Control enforcement.
    * Lowers Total Cost of Ownership for endpoint security.
    * Reduces administrative effort.
    • Proactive Threat Scanning
    Behavioral-based protection that protects against zero-day threats and threats not seen before. Unlike other heuristic-based technologies, Proactive Threat Scan scores both the good and bad behavior of unknown applications, providing a more accurate malware detection.
    * Accurately detects malware without the need to set up rule-based configurations.
    * Helps lower the number of false positives.
    • Advanced Rootkit Detection and Removal
    Provides superior rootkit detection and removal by integrating VxMS (Veritas Mapping Service—a Veritas technology), thereby providing access below the operating system to allow thorough analysis and repair.
    * Detects and removes the most difficult rootkits.
    * Saves time and money and productivity lossses associated with re-imaging infected machines.
    • Application Control
    Allows administrators to control access to specific processes, files, and folders by users and other applications. It provides application analysis, process control, file and registry access control, and module and DLL control. It enables administrators to restrict certain activities deemed as suspicious or high risk.
    * Prevents malware from spreading or harming endpoints.
    * Locks down endpoints to prevent data leakage.
    • Device Control
    Controls which peripherals can be connected to a machine and how the peripherals are used. It locks down an endpoints to prevent connections from thumb drives, CD burners, printers, and other USB devices.
    * Prevents sensitive and confidential data from being extracted or stolen from endpoints (data leakage).
    * Prevents endpoints from being infected by viruses spread from peripheral devices.


    دانلود با لینک مستقیم پارت 1
    نسخه Download Trialware (English) (Part1)

    دانلود با لینک مستقیم پارت 2
    نسخه Download Trialware (English) (Part2)




    دانلود با لینک مستقیم پارت 1
    نسخه Download Trialware (English) (Win32-bit Client)

    دانلود با لینک مستقیم پارت 2
    نسخه Download Trialware (English) (Win64-bit Client)

  4. نمایش تشکر

  5. عضو حرفه ای غروب آواتار ها
    نمایش اطلاعات
    #3

    Arrow

    سلام
    یکی لطف میکنه فرق (norton(antivirus and intrnet security رو با symantec endpoint به من بگه؟؟؟؟؟
    جفتشون محصول شرکت سیمانتک هستن؟؟؟؟؟؟
    اولی نسخه ی کاربرای خانگی و دومی نسخه ی بیزنس نرم افزاره یا اشتباه گفتم؟؟؟؟؟؟؟
    نمایش امضاء

  6. عضو متخصص ali68124 آواتار ها
    نمایش اطلاعات
    #4

    پیش فرض

    بله این ها شرکت سیمانتک هست

  7. نمایش تشکر

  8. عضو متخصص The king آواتار ها
    نمایش اطلاعات
    #5

    پیش فرض

    نوشته اصلی توسط غروب
    سلام
    یکی لطف میکنه فرق (norton(antivirus and intrnet security رو با symantec endpoint به من بگه؟؟؟؟؟
    جفتشون محصول شرکت سیمانتک هستن؟؟؟؟؟؟
    اولی نسخه ی کاربرای خانگی و دومی نسخه ی بیزنس نرم افزاره یا اشتباه گفتم؟؟؟؟؟؟؟
    نسخه اینترنت سکیوریتی و آنتی ویروس نورتون ، برای نسخه های خانگی توصیه میشند ، ولی نسخه های endpoint ، نسخه هایی هستند که مخصوص سرور ها میباشند.

  9. نمایش تشکر

  10. عضو متخصص ali68124 آواتار ها
    نمایش اطلاعات
    #6

    پیش فرض Symantec Endpoint Protection 11.0.7300.1294 / 12.1.2015.2015 Final x86/x64



    دانلود نسخه سروری نرم افزار امنیتی شرکت سیمانتک (ویرایش 32 و 64 بیتی)


    آنتی ویروس Symantec Antivirus Corporate Edition که با Norton Antivirus‌ متفاوت است و البته هر دو محصول شرکت Symantec هستند به دلیل داشتن قدرت خوب و عدم نیاز به سریال و رجیستر و کرک و Patch و ... و همچنین به دلیل هماهنگی با سیستم عامل های سرور یک آنتی ویروس خوب در شبکه محسوب می شود.

    نرم افزار Symantec Endpoint هم نسخه فایروال دار این آنتی ویروس است. نسخه Small Business نرم افزار Endpoint که در سایت موجود است ولی این نسخه هم قیمت بالاتری دارد و هم امکانات آن برای کار بر روی سرور و کار با دیتا بیس و مدیریت آنتی ویروسهای شبکه بیشتر است.

    مقایسه نسخه های مختلف این نرم افزار را در اینجا ببینید.

    امکانات نرم افزار:
    1- دارا بودن آنتی ویروس Symantec به همراه فایروال
    2- امکان تشخیص نفوذهای داخل به خارج و برعکس
    3- کنترل برنامه های سیستم در دسترسی به اینترنت
    4- کنترل دسترسی های به سیستم شما از کامپیوترهای شبکه
    5- امکان کار و مدیریت و Update برنامه توسط سرور
    6- امکان برقراری سیستم سرور و کلاینت و به روز رسانی خودکار در هنگام به روز رسانی سرور
    7- کنترل سخت افزارها و قطعات ورودی و خروجی سیستم
    8- امکان شناسایی برنامه های جاسوسی و مخرب
    9- امکان محافظت از بانک اطلاعاتی نصب شده روی سرور
    و ...

    به دلیل 60 روزه بودن Manager در نسخه 12.1 نسخه 11 هم قرار داده شده است.


    نکات:
    1- این برنامه به صورت نسخه کامل است و نیاز به هیچ گونه کرک و سریال و فعال سازی و ... ندارد.
    2- این نسخه کاملترین نسخه این برنامه شامل نسخه Mac و Linux و ویندوز 32 بیتی و 64 بیتی و Manager آنها می باشد.
    3- برنامه بدون هیچ محدودیتی هم به صورت آفلاین (با دریافت و اجرای فایل اپدیت) و هم به صورت آنلاین به روز می شود.
    4- استفاده از توضیحات به صورت کلی یا جزئی بدون ذکر منبع در سایتها و وبلاگهای دیگر مجاز نیست.
    دانلود با لینک مستقیم



  11. نمایش تشکر

  12. عضو حرفه ای phoenix آواتار ها
    نمایش اطلاعات
    #7

    پیش فرض

    دوستاني كه از نرم افزار دوستاني كه از نرم افزار symantec endpoint 12 استفاده ميكنن اين دو لينك رو بررسي و نتيجه رو اينجا اعلام كنن:

    :Link Button:

    :Link Button:

  13. نمایش تشکر

  14. عضو متخصص ali68124 آواتار ها
    نمایش اطلاعات
    #8

    پیش فرض Symantec Endpoint Protection 12.1.2



    System requirements

    Symantec Endpoint Protection now supports additional new platforms and configurations.

    You can now install Symantec Endpoint Protection Manager on the following operating systems:

    Windows 8

    Windows Server 2012

    You can now install the Symantec Endpoint Protection client on the following operating systems:

    Windows 8 and Windows Server 2012

    Mac OS X 10.8, Mountain Lion

    Mac OS X case-sensitive formatted volumes

    You can now use Symantec Endpoint Protection Manager from the following browsers:

    Microsoft Internet Explorer 10

    Google Chrome

    For the complete list of system requirements:

    See the knowledge base article: Release Notes and System Requirements for all versions of Symantec Endpoint Protection and Symantec Network Access Control

    Installation

    The Client Deployment Wizard includes the following changes:

    The Client Deployment Wizard includes the Communication Update Package Deployment option to push the communications file (Sylink.xml) to the client in a client installation package. You use the Sylink.xml file to convert an unmanaged client to a managed client, or to manage a previously orphaned client. In previous releases, you needed to export the Sylink.xml file from the management server, and import Sylink.xml to each client.

    See Restoring client-server communications with Communication Update Package Deployment.

    See Why do I need to replace the client-server communications file on the client computer?.

    The Client Deployment Wizard searches the network faster to find the computers that do not have the client software installed.

    The Client Deployment Wizard includes the Automatically uninstall existing security software option so that a security software removal feature can uninstall third-party security products from the client computer. The feature removes security software before the client installation package installs the client software. With version 12.1.2, the feature removes more than 40 additional third-party products.

    For a list of products that the third-party security software removal feature uninstalls, see the knowledge base article: About the third-party security software removal feature in Symantec Endpoint Protection 12.1

    See Deploying clients using a Web link and email.

    See Deploying clients by using Remote Push.

    See Deploying clients by using Save Package.

    You can download and run a new diagnostic tool on the management server and client to help you diagnose common issues before and after installation. The Symantec Help tool enables you to resolve product issues yourself instead of calling Support.

    See Troubleshooting computer issues with the Symantec Help support tool.

    See the knowledge base article at the following URL: Symantec Help (SymHelp)

    Virtualization

    Symantec Endpoint Protection includes the following virtualization improvements:

    A VMware vShield-enabled Shared Insight Cache. Delivered in a Security Virtual Appliance, you can deploy the vShield-enabled Shared Insight Cache into a VMware infrastructure on each host. The vShield-enabled Shared Insight Cache makes file scanning more efficient. You can monitor the Security Virtual Appliance and client status in Symantec Endpoint Protection Manager.

    See What do I need to do to use a vShield-enabled Shared Insight Cache?.

    For managing Guest Virtual Machines (GVMs) in non-persistent virtual desktop infrastructures:

    Symantec Endpoint Protection Manager includes a new option to configure the aging period for offline non-persistent GVMs. Symantec Endpoint Protection Manager removes the non-persistent GVM clients that have been offline longer than the specified time period.

    Symantec Endpoint Protection clients now have a configuration setting to indicate that they are non-persistent GVMs. You can filter out the offline non-persistent GVMs in the Clients tab view in Symantec Endpoint Protection Manager.

    See Using Symantec Endpoint Protection in non-persistent virtual desktop infrastructures.

    Remote management

    Symantec Endpoint Protection provides public support to remotely manage and monitor the client and the management server. New Web services let you write your own tools to perform the following tasks remotely:

    Run commands on the client to remediate threat situations.

    Export policies from the server.

    Apply policies to clients across servers.

    Monitor license status and content status on the management server.

    Documentation and other tools for remote monitoring and management support appear in the Web services SDK, located in the following folder on the installation disc: /Tools/Integration/ SEPM_WebService_SDK

    Windows 8 features


    Support for the Microsoft Windows 8 style user interface, including toast notifications for critical events.

    See Configuring user interface settings.

    Support for Windows 8 and Windows Server 2012.

    Windows 8 Early Launch Anti-Malware (ELAM) support provides a Microsoft-supported way for anti-malware software to start before all other third-party components. In addition, vendors can now control the launching of third-party drivers, depending on trust levels. If a driver is not trusted, it can be removed from the boot sequence. ELAM support makes more efficient rootkit detection possible.

    See Adjusting the Symantec Endpoint Protection early launch anti-malware (ELAM) options.

    Protection features

    Virus and Spyware Protection:

    Full support for the Microsoft Windows 8 style user interface.

    Proactive Threat Protection:

    Device Control now sends a notification and creates a log event each time it blocks a previously disabled device. Previously, Device Control sent a notification and log event only the first time the device was disabled.

    See Managing device control.

    System lockdown can now run in blacklist mode. You must configure system lockdown to display a blacklist mode as well as the default whitelist mode. The blacklist mode blocks only the applications on the specified list. Symantec Endpoint Protection Manager can automatically update the existing file fingerprint lists and application name lists that system lockdown uses for whitelisting or blacklisting.

    See Automatically updating whitelists or blacklists for system lockdown.

    Exceptions:

    Added support for HTTPS in trusted Web domain exceptions.

    Common variables in exceptions now apply to 64-bit applications as well as 32-bit applications.

    See Excluding a file or a folder from scans.

    Policies:

    You can export all the policies, locations, and server settings for a domain. If you then import these policies and settings into a new domain, you do not need to recreate them.

    See Exporting and importing server settings.

    See Adding a domain.

    See Exporting and importing individual policies.

    LiveUpdate

    The LiveUpdate Settings policy includes an additional type of Group Update Provider (GUP) that allows clients to connect to Group Update Providers in a different subnet. This new type of GUP lets you explicitly define which networks each client may connect to. You can configure a single LiveUpdate policy to meet all your requirements.

    See Using Group Update Providers to distribute content to clients .

    A link on the client Status page now lets end users quickly and easily confirm that the client has the most current content. The link displays the content version dialog box, where a new column lists the last time that the client checked each content type for updates. Users can be more confident that their client updates correctly and has the latest protection.

    - Symantec Endpoint Protection 12.1.2 Win32-bit Client EN.
    :Download Link:
    - Symantec Endpoint Protection 12.1.2 Win64-bit Client EN.
    :Download Link:
    - Cleanwipe ver 12.1.2015.2015
    :Download Link:


    تصاویر پیوست شده
    • Sym01.jpg (194.5 کیلو بایت, 44 نمایش)
    • Sym02.jpg (163.1 کیلو بایت, 42 نمایش)

  15. نمایش تشکر

  16. عضو متخصص ali68124 آواتار ها
    نمایش اطلاعات
    #9

    پیش فرض Symantec Endpoint Protection 12.1.2100.2093


    Symantec Endpoint Protection combines Symantec AntiVirus with advanced threat prevention to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership. Endpoint Protection protects networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms. Centralized policy management and response capabilities ease the administrative burden and lower the cost of managing security at the network, mobile, and remote client level.
    • Stops malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits.
    • Prevents security outbreaks thus reducing administrative overhead.
    • Lowers total cost of ownership for endpoint security.
    Key Features:
    • Provides unmatched protection from the market leader in endpoint security
    • Seamlessly integrates antivirus protection, antispyware, firewall, intrusion prevention, device and application control
    • Requires only a single agent
    • Powerful central management of security on Windows and Macintosh endpoints
    • Enables instant NAC upgrade without additional software deployment
    • Antispyware and antivirus programs for and Macintosh and Linux clients
    • Secures both physical and virtual environments
    New Features:
    • Single Agent and Single Console
    Delivers a single agent for all Symantec Endpoint Protection technologies and Symantec Network Access Control. Delivers a single integrated interface for managing all Symantec Endpoint Protection technologies and Symantec Network Access Control. All allow for a single communication method and content delivery system across all technologies.
    * Provides operational efficiencies such as single software updates, single policy updates.
    * Provides unified and central reporting.
    * Provides unified licensing and maintenance.
    * Requires no change to the client when adding Symantec Network Access Control enforcement.
    * Lowers Total Cost of Ownership for endpoint security.
    * Reduces administrative effort.
    • Proactive Threat Scanning
    Behavioral-based protection that protects against zero-day threats and threats not seen before. Unlike other heuristic-based technologies, Proactive Threat Scan scores both the good and bad behavior of unknown applications, providing a more accurate malware detection.
    * Accurately detects malware without the need to set up rule-based configurations.
    * Helps lower the number of false positives.
    • Advanced Rootkit Detection and Removal
    Provides superior rootkit detection and removal by integrating VxMS (Veritas Mapping Service—a Veritas technology), thereby providing access below the operating system to allow thorough analysis and repair.
    * Detects and removes the most difficult rootkits.
    * Saves time and money and productivity lossses associated with re-imaging infected machines.
    • Application Control
    Allows administrators to control access to specific processes, files, and folders by users and other applications. It provides application analysis, process control, file and registry access control, and module and DLL control. It enables administrators to restrict certain activities deemed as suspicious or high risk.
    * Prevents malware from spreading or harming endpoints.
    * Locks down endpoints to prevent data leakage.
    • Device Control
    Controls which peripherals can be connected to a machine and how the peripherals are used. It locks down an endpoints to prevent connections from thumb drives, CD burners, printers, and other USB devices.
    * Prevents sensitive and confidential data from being extracted or stolen from endpoints (data leakage).
    * Prevents endpoints from being infected by viruses spread from peripheral devices.


  17. نمایش تشکر

  18. عضو متخصص ali68124 آواتار ها
    نمایش اطلاعات
    #10

  19. نمایش تشکر

صفحه 1 از 2 12 آخرین

اطلاعات تاپیک

Users Browsing this Thread

در حال حاضر 1 در حال مشاهده این موضوع می باشد.. (0 کاربر و 1 مهمان در این انجمن حضور دارند)

برچسب برای این موضوع

بوک مارک ها

بوک مارک ها

مجوزهای ارسال و ویرایش

  • شما نمی توانید موضوع جدید ارسال کنید
  • شما نمی توانید به پست ها پاسخ دهید
  • شما نمی توانید فایل پیوست ضمیمه کنید
  • شما نمی توانید پست های خود را ویرایش کنید
  •