Software Downloads for "Symantec Endpoint"

Nowadays, every computer users need to use some form of security or other to stay away from numerous security threats. These threats come in forms of virus, Trojan horse and similar malicious programs from web and sources like removable media and network etc. If this is the case with home users, there is no denying security need of business users. In office intranets and business networks, several computers and laptops are always linked to the web and network sharing activities remain at peak. Therefore, risk of malware intrusion is significantly higher in such setups.

  • Platform: WinOther
  • Publisher: Symantec
  • Date: 15-07-2012
  • Size: 522240 KB

Supports the following versions of Symantec antivirus software:

* Norton Antivirus 2009 for Windows XP Home/XP Pro/Vista
* Norton Internet Security 2009 for Windows XP/Home/XP Pro/Vista
* Norton Antivirus 2008 for Windows XP Home/XP Pro/Vista
* Norton Internet Security 2008 for Windows XP/Home/XP Pro/Vista
* Norton 360 version 2.0 for Windows XP/Vista
* Symantec Endpoint Protection 11.0.

Supports the following versions of Symantec antivirus software:

* Norton AntiVirus 2009 for Windows XP/Vista for 64-bit OS only
* Norton Internet Security 2009 for Windows XP/Vista for 64-bit OS only
* Norton AntiVirus 2008 for Windows XP/Vista for 64-bit OS only
* Norton Internet Security 2008 for Windows XP/Vista for 64-bit OS only
* Norton 360 version 2.0 for Windows XP/Vista for 64-bit OS only
* Symantec Endpoint Protection 11.0 for 64-bit OS only.

The Symantec SEP 12 app offers you install steps, configuration notes, and resources to use from your Android device. When you are on location to install or support Endpoint Protection, you can access this information from your pocket.

This app contains information about:

·Installing or upgrading Endpoint Protection

·Installing or upgrading Endpoint Protection Small Business Edition

·Deploying clients

·Finding additional resources (what’s new, known issues, support, community)

.

  • Platform: Android 2.x, Android 3.x, Android 4.4, Android 4.x
  • Publisher: Symantec.com
  • Date: 24-10-2014
  • Size: 78 KB

My Endpoint Protector provides device control and data loss prevention to everyone who want to centrally manage and control the use of USB, FireWire and other ports and portable storage device use. It works for PC and Mac OS X. Free for personal use. It is a SaaS Solution, meaning the management is happening in the cloud over an internet browser. My Endpoint Protector Key Benefits: 1. Centrally manage your endpoint / device use from anywhere 2. No server setup (hardware, licenses or maintenance) 3.

  • Platform: Mac, Windows
  • Publisher: CoSoSys
  • Date: 17-06-2010
  • Size: 4371 KB

Comodo Endpoint Security Manager BE (ESM BE) centrally manages the deployment of award-winning Comodo Internet Security (CIS) software that protects desktops and servers your business relies on. Offering unbeatable protection against internal and external threats, the Business Edition is specially designed to suit the needs of small businesses, ESM BE can be installed on a Windows server/ non-dedicated Windows PC and features highly detailed reports, task-orientated wizards, real-time alerts, automatic enforcement of security policy and a clearly organized touch-screen interface that helps admins resolve issues as soon as they occur.

Microsoft Endpoint Protection for Windows Azure provides the ability to include an antimalware protection agent in each Windows Azure virtual machine running your Windows Azure service.

It extends the Windows Azure SDK by providing an antimalware import which provides antimalware configuration and deployment capabilities.

Get Microsoft Endpoint Protection for Windows Azure and try it for yourself to fully assess its capabilities!

.

  • Platform: Windows
  • Publisher: Microsoft
  • Date:

Comodo Endpoint Security Manager (CESM) enables the remote, centralized management of end-point security products such as Comodo Internet Security on corporate workstations. With Comodo Endpoint Security Manager you will save time, money and increase network wide security. Unlike conventional security software providers; Comodo has adopted a Default Deny Protection model.

Default Deny Protection takes an advanced approach to preventing security breaches and reducing downtime. By working within the universe of known and safe executables, unknown applications within the environment are challenged prior to execution.

These tools make it easier for Forefront Endpoint Protection 2010 customers to use Group Policy for centralized management, provide optimized settings for various server roles, and diagnose and troubleshoot support issues.

FEP Group Policy Tools (fep2010grouppolicytools-en-us.exe)
The FEP Group Policy tool is used to import settings from FEP policy XML files into a Group Policy Object (GPO) in an Active Directory domain, or into the Local Group Policy object on a Windows computer.

  • Platform: Windows
  • Publisher: Microsoft
  • Date:

The System Center Security Monitoring Pack for Endpoint Protection provides real-time monitoring of your Endpoint Protection clients by using System Center Operations Manager. Alerts can be configured for virus activity, firewall downtime, or update failures.

In addition to real-time event monitoring, the Endpoint Protection Security Management Pack also provides automated response capabilities to remediate security related issues.

Get System Center Security Monitoring Pack for Endpoint Protection and try it for yourself to see just how useful it can actually be for you!

.

  • Platform: Windows
  • Publisher: Microsoft
  • Date:

Symantec Backup Exec System Recovery (formerly LiveState Recovery) combines the speed and reliability of disk-based, bare-metal Windows?d*DSdu system recovery with revolutionary technologies for hardware-independent restoration and lights-out operation. The result is unparalleled freedom to restore systems anytime, from anywhere, to virtually any device.rnrnSymantec Backup Exec?d*DSdu? System Recovery 8 is the gold standard in complete Windows?d*DSdu system recovery with the ability to restore systems in minutes, even to dissimilar hardware or virtual environments.

Quality and Value for the 250-401 Exam
Test4pass Practice Exams for Symantec 250-401 are written to the highest standards of technical accuracy, using only certified subject matter experts and published authors for development.

100% Guarantee to Pass Your 250-401 Exam
If you prepare for the exam using our Test4pass testing engine, we guarantee your success in the first attempt. If you do not pass the Symantec Certified Security program 250-401 exam (ProCurve Secure WAN) on your first attempt we will give you a FULL REFUND of your purchasing fee AND send you another same value product for free.

  • Platform: Java, Linux, Windows
  • Publisher: Test4pass
  • Date:
  • Size: 10 KB

We are all well aware that a major problem in the IT industry is that there is a lack of quality Symantec Test Prep study materials. Our Certification Symantec Exam Preparation Materials provide you everything you will need to take a certification examination. Details are researched and produced by Certification Experts who are constantly using industry experience to produce precise, logical and verified explanations for the answers. You may get questions from different web sites or books, but logic is the key.

  • Platform: Windows
  • Publisher: testking.com
  • Date:
  • Size: 2641 KB

Metadefender Endpoint Management (MEM) leverages the OESIS Framework to verify the security and compliance posture of endpoint devices via static analysis. MEM also exposes APIs to enable third party solutions to consume and react to reported postures. Compliance checks report the status of: Encryption Password protection Operating System patch level Anti-malware protection Patch management clients Potentially unwanted applications (File sharing, toolbars, etc.) Endpoint detection & response (EDR) clients And more Security checks report indications of infection by: Reporting threats identified by locally installed anti-malware Reporting reputation of remote connections of the device And more Supported endpoint operating systems: Windows (XP - Windows 10) Windows Server (2008 - 2012 R2) OS X (10.

  • Platform: Mac OS X
  • Publisher: OPSWAT, Inc.
  • Date: 18-10-2016
  • Size: 7040 KB

Symantec AntiVirus™ for Handhelds Annual Service Edition protects your data wherever you go. Your PDA holds vital information you use every day, so safeguard it with virus protection developed especially for Pocket PC and Palm OS-based devices. Symantec AntiVirus for Handhelds searches only for viruses that can attack your specific operating system, so it scans files quickly and uses very little memory. It provides real-time defense against viruses when you download files or receive email attachments on a Pocket PC, or when a malicious program tries to execute on a Palm OS-based PDA.

A program to recover or replace lost or forgotten passwords to the files created in ACT! contact management software (from Symantec, Best Software and Sage). All versions of ACT! (up to ACT! 2006) are supported. The passwords are recovered (for versions 2005/2006, removed or replaced) instantly. The program is also able to change the security roles of users in ACT! 2005/2006 databases: e.g. from Restricted to Administrator..

Privacyware's Endpoint Security Console (ESC) provides a centralized administrative control capacity for assuring network endpoint protection on desktop and notebook computers utilizing Privacyware's popular Personal Firewall and Intrusion Protection Application, Privatefirewall. ESC enables system administrators to install, monitor, and configure Privatefirewall endpoint defense solution on any Windows workstation, laptop or host within a server domain. Settings can be customized for individual computers or for Users/Groups defined and configured within Active Directory.

  • Platform: Windows
  • Publisher: Privacyware.com
  • Date: 14-12-2006
  • Size: 23121 KB

Cryptzone Endpoint Encryption is a complete desktop solution which features three products in one: Secured eMail (email encryption), Secured eFile (file/folder encryption), Secured eUSB (USB flash drive encryption). They are all tightly integrated with Windows and require very little time to get used to and start working with. Secured eFile: Secured eFile is a file/folder encryption solution designed for ease-of-use, while maintaining the highest possible level of security. Secured eFile is tightly integrated within your current environment, lying merely as a thin layer on top of your existing infrastructure.

  • Platform: Windows
  • Publisher: Cryptzone
  • Date: 19-03-2009
  • Size: 11100 KB

Lock the Bad Guys out of your USB ports with MyUSBOnly; Block Untrusted USB Memory Stick Activity in Office. Secure Your Files: Stealing information - or just reading it without permission - is a lot easier than it used to be. Prevent data theft by blocking all but your trusted USB storage devices. Stop your files from walking away on thumb drives, mp3 players, flash cards and portable USB hard drives. Secretly log all USB connect and disconnect activity. Run it invisibly, so you can catch, as well as deter, problem coworkers, visitors, family members, or managers.

  • Platform: Windows
  • Publisher: A.C. Element
  • Date: 05-09-2009
  • Size: 2631 KB

Do you use WinFax or TalkWorks fax software from Symantec?Do you often find yourself changing the sender information in WinFax PRO or TalkWorks each time you send a fax? Sending a resume and want to make sure YOUR name is on the fax? Fax UserControl allows you to select from an unlimited amount of user names and switch users instantly! If you have several users on one machine sending faxes, you would need to constantly change the sender name in the Program Setup. With Fax UserControl, you simply select the Name or Company and click Ok.

  • Platform: Windows
  • Publisher: getfaxing.com
  • Date: 09-06-2009
  • Size: 201 KB
New Reviews


Print Inspector

Whether you are using a printer connected to your local desktop computer or a print server sometimes you need to see whats going on in your printer by having a close look at the print jobs sent by the users. Print Inspector is such type software ...


Disk Genius

Disk Genius was formerly known as Partition Guru which is an all-in-one solution for disk partition management, data recovery and disk repairing. It can recover lost files from partition, backup and restore partition table, clone partition or clone ...


Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


WebAcappella

Web design sector has witnessed several trends and technological innovations affect website development in big ways. With time, designing websites has become easier. Nowadays, you can find web design software that nearly eliminates the need to ...


New Downloads

RationalPlan Single Project
for Mac

RationalPlan Single Project is
a project management software
covering the project
management areas starting with
WBS ...

Flowrigami

Flowrigami is an open-source
BPM workflow editor and
visualization tool that allows
creating, editing and
visualizing ...

Debut Pro Edition for Mac

Debut Pro Edition Video
Capture Software for Mac
allows you to easily capture
video and store the data on
your Mac\'s ...

Raise Data Recovery

Raise Data Recovery is an
efficient utility with an
intuitive wizard-style
interface for effortless
recovery of data from ...

@SwIt Printfil

Print from DOS, Unix, Linux to
Windows printers: USB, GDI,
PDF, e-mail, network, IP, fax.
Capture LPT1:-LPT9: & ...

MindView

MindView is a professional
mind mapping software that
allows you to visually
brainstorm, organize and
present ideas. With ...

Spool Queue Viewer++

Spool Queue Viewer++ is a
feature rich spool queue
viewer that windows should
have by default, we have taken
it to the ...

Pidro Challenge

The Pidro card game - a game
of daring and skill. You and
your computer partner play
against two computer
opponents.

ExtraMAME

A small MS Windows compatible
game GUI wrapper for MAME, the
Multiple Arcade Machine
Emulator authored by Nicola
Salmoria ...

Express Scribe Pro Edition

Express Scribe Pro Edition
helps typists by installing on
the user\'s computer and
connecting to a transcription
foot ...