Symantec Endpoint Threat Defense for Active Directory - initial subscriptio

Mfg.Part: ETD-AD-NEW-AG-500-999-1Y | CDW Part: 5589480 | UNSPSC: 43233203
Availability: In Stock
Warranties
Advertised Price
Product Details
  • Initial subscription license (1 year)
  • 1 device
  • hosted
  • academic
  • volume
  • GOV
  • 500-999 licenses
View Full Product Details
Better Together
Symantec Endpoint Threat Defense for Active Directory - initial subscriptio
Quick View
Total Price:

Product Overview

Main Features
  • Initial subscription license (1 year)
  • 1 device
  • hosted
  • academic
  • volume
  • GOV
  • 500-999 licenses
Symantec Endpoint Threat Defense for Active Directory disrupts domain reconnaissance, detects an attacker that attempts lateral movement or credential theft, and mitigates the intrusion by process, user, or endpoint. The Artificial Intelligence engine utilizes Natural Language Processing to create a false environment on the endpoint. This obfuscates any AD reconnaissance commands that are utilized, regardless of protocol. This deception forces attackers to give themselves away when they attack AD. This intrusion can then be automatically mitigated through policy. It identifies vulnerabilities, misconfigurations, and possible backdoors within AD itself. This provides security teams with the opportunity to reduce the AD attack surface, harden the Domain, and reduce risk.

Security is provided without making any changes to AD, without deploying anything to the Domain Controllers, and without the use of an agent on the endpoints. It utilizes a Memory Manipulation (MM) that is automatically deployed to endpoints upon authentication. It does not consume RAM, CPU, or disk space. It is automatically deployed via the Core server with no need for a package or deployment tool like SCCM. It creates truth positive actionable alarms and does not create alert fatigue. Alarms do not generate noise that must be filtered and analyzed. When it creates an alarm, it is a high-fidelity event. Forensics are automatically created to help with Incident Response, and mitigation can be automatically or manually invoked.