Symantec Endpoint Protection 14

The world's most advanced single-agent endpoint security with prevention, detection and response, deception and adaptation.

Watch the Webcast

AWARD

AV-Test awards Symantec Endpoint Protection and Symantec Endpoint Protection Cloud with Best Protection 2017

Learn More

REPORT

Symantec is positioned by Gartner as the highest in execution and furthest in vision in the Endpoint Protection Platforms Magic Quadrant

The EPP MQ 2018 report has many new recommendations for required and desirable capabilities in an EPP solution in response to changing market dynamics and customer requirements. Does your EPP solution have the right protections?

Read the Report

Protecting 175 Million Endpoints Across the Globe

Only Symantec can secure your endpoints via one single agent to:

  • Beat crippling ransomware and unknown attacks with multilayered protection that combines signatureless and critical endpoint technologies.
  • Maximize protection and minimize false positives with advanced machine learning and behavioral analysis.
  • Block zero-day attacks that prey on memory-based vulnerabilities in popular applications with memory exploit mitigation.
  • Fine-tune your detection engines on the fly to optimize your security posture.

Download the Data Sheet

Phish the Phishers with Deception

Entice attackers with bait to reveal their methods – without them knowing they're being watched.

  • Detect attackers by luring them into a decoy minefield.
  • Reveal their intent, tactics, and targets—so security teams can pre-emptively adapt their security posture.
  • Set the trap as simply as flipping a switch.

Read the Deception White Paper

 

Cage Your Vulnerabilities. Unleash Your Applications.

Hardening bulletproofs applications, or any software. Now, you can implement any productivity tools and browsers without risk.

  • Auto-classify risk levels of all endpoint applications, whether or not they're in use.
  • Use application isolation to limit exploits.
  • Implement hardening in minutes with an intuitive cloud console.

Read the Hardening White Paper Request a Demo

Attack Your Stack to Kill Complexity

Reduce the complexity and number of vendors in your security stack.

  • Detect and respond to threats anywhere by integrating SEP with network security infrastructure.
  • Built-in integration delivers prevention, Detection and Response (EDR), Deception, and Hardening with one single agent.
  • Use open APIs to coordinate with existing IT infrastructure for automation and orchestration.

Learn More Read the Brochure

Stronger, Faster, Lighter

More layers of protection and unrivaled performance, all from one lightweight agent.

  • Reduces bandwidth usage and definition file sizes by 70 percent compared to SEP 12.
  • Enables faster scanning times using our proprietary real-time cloud lookup.
  • Reduces IT resource use via automated updates to lower costs.

SEP 14 Out-Performs the Competition

Industry Recognition

16 Years Running, a Leader in Gartner Magic Quadrant*
Learn More

Symantec Receives the 2017 Frost & Sullivan's Endpoint Security Vendor of the Year Award
Learn More

Symantec Endpoint Protection wins AV-TEST Award for Best Protection 2016
Learn More

Symantec named a market leader in Next-Generation Endpoint Security
Learn More

Customers Validate Symantec Endpoint Protection Effectiveness

Gartner Peer Insights Customer Choice Award 2017
Learn More

Williams Martini Racing
Learn More

The Economist
Learn More

State of Oklahoma
Learn More

Discover Our Community

View the latest product discussions in our forums.

Learn More

Need help?

Technical support and more.

Learn More

Client Workstation and Server System Requirements*

Windows Operating Systems
  • Windows Vista (32-bit, 64-bit)
  • Windows 7 (32-bit, 64-bit; RTM and SP1)
  • Windows Embedded 7 Standard, POSReady, and Enterprise (32-bit and 64-bit)
  • Windows 8 (32-bit, 64-bit)
  • Windows Embedded 8 Standard (32-bit and 64-bit)
  • Windows 8.1 (32-bit, 64-bit), including Windows To Go
  • Windows 8.1 update for April 2014 (32-bit, 64-bit)
  • Windows 8.1 update for August 2014 (32-bit, 64-bit)
  • Windows Embedded 8.1 Pro, Industry Pro, and Industry Enterprise (32-bit and 64-bit)
  • Windows 10 (32-bit, 64-bit)
  • Windows 10 November Update (2015) (32-bit, 64-bit)
  • Windows 10 Anniversary Update (2016) (32-bit, 64-bit)
  • Windows 10 Creators Update (version 1703) (32-bit, 64-bit)
  • Windows 10 Fall Creators Update (version 1709) (32-bit, 64-bit)
  • Windows 10 April 2018 Update (version 1803) (32-bit, 64-bit)
  • Windows Server 2008 (32-bit, 64-bit; R2, SP1, and SP2)
  • Windows Small Business Server 2008 (64-bit)
  • Windows Essential Business Server 2008 (64-bit)
  • Windows Small Business Server 2011 (64-bit)
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2012 R2 update for April 2014
  • Windows Server 2012 R2 update for August 2014
  • Windows Server 2016
Macintosh Operating Systems
  • Mac OS X 10.10, 10.11, macOS 10.12, 10.13
Linux Operating Systems (32-bit and 64-bit versions)
  • Amazon Linux
  • CentOS 6U3, 6U4, 6U5, 6U6, 7, 7U1, 7U2, 7U3; 32-bit and 64-bit
  • Debian 6.0.5 Squeeze, Debian 8 Jessie; 32-bit and 64-bit
  • Fedora 16, 17; 32-bit and 64-bit
  • Oracle Linux (OEL) 6U2, 6U4, 6U5, 7, 7.1, 7.2, 7.3
  • Red Hat Enterprise Linux Server (RHEL) 6U2 - 6U8, 7 - 7.3
  • SUSE Linux Enterprise Server (SLES) 11 SP1 - 11 SP4, 32-bit and 64-bit; 12, 12 SP1 - 12 SP3, 64-bit 
  • SUSE Linux Enterprise Desktop (SLED) 11 SP1 - 11 SP4, 32-bit and 64-bit; 12 SP3, 64-bit 
  • Ubuntu 12.04, 14.04, 16.04; 32-bit and 64-bit
Virtual Environments
  • Microsoft Azure
  • Amazon WorkSpaces
  • VMware WS 5.0, GSX 3.2 or later, ESX 2.5 or later
  • VMware ESXi 4.1 – 5.5
  • VMware ESX 6.0
  • Microsoft Virtual Server 2005
  • Microsoft Windows Server 2008, 2012, and 2012 R2 Hyper-V
  • Citrix XenServer 5.6 or later
  • Virtual Box by Oracle
Windows Hardware Requirements
  • 32-bit processor: 2 GHz Intel Pentium III or equivalent minimum (Intel Pentium 4 or equivalent recommended)
  • 64-bit processor: 2 GHz Pentium 4 with x86-64 support or equivalent minimum
  • 1 GB of RAM (2 GB recommended)
  • 530 MB of free space on the hard disk
Mac Hardware Requirements
  • 64 - Bit Intel Core 2 Duo or later
  • 2 GB of RAM
  • 500 MB of free space on the hard disk
Linux Hardware Requirements
  • Intel Pentium 4 (2 GHz CPU or higher)
  • 1 GB of RAM
  • 7 GB of free space on the hard disk

Manager System Requirements

Windows Operating Systems
  • Windows Server 2008 (64 bit)
  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
Hardware
  • Intel Pentium Dual-Core or equivalent minimum; 8-core or greater recommended
  • 2 GB of RAM (8 GB recommended)
  • 40 GB available minimum free hard disk space (200 GB recommended) for the management server and database
Web Browser
  • Microsoft Internet Explorer 11
  • Mozilla Firefox 5.x through 60
  • Google Chrome 66
  • Microsoft Edge
Database

Embedded database included or choose from the following:

  • SQL Server 2008, SP4
  • SQL Server 2008 R2, SP3
  • SQL Server 2012, RTM – SP3
  • SQL Server 2014, RTM – SP2
  • SQL Server 2016, RTM, SP1
  • SQL Server 2017
Symantec Endpoint Protection client must run one of the following Windows desktop operating systems to run Symantec Endpoint Protection Hardening:
  • Windows 7 (RTM and SP1), Professional, Enterprise
  • Windows 8, Professional, Enterprise 
  • Windows 8.1 (update for April 2014 and August 2014; Windows To Go), Professional, Enterprise 
  • Windows 10 (RTM), Professional, Enterprise 
  • Windows 10 November Update (version 1511), Professional, Enterprise 
  • Windows 10 Anniversary Update (version 1607), Professional, Enterprise
  • Windows 10 Creators Update (version 1703), Professional, Enterprise
  • Windows 10 Fall Creators Update (version 1709), Professional, Enterprise
  • Windows 10 April 2018 Update (version 1803), Professional, Enterprise (Version 14.2 only)

Version 14.0.1.x clients only support 64-bit operating systems. Version 14.2 and later clients support both 32-bit and 64-bit operating systems.

Download the Data Sheet