<s>
Symantec	B-Protocol
Endpoint	I-Protocol
Protection	I-Protocol
,	O
developed	O
by	O
Broadcom	O
Inc.	O
,	O
is	O
a	O
security	O
software	O
suite	O
that	O
consists	O
of	O
anti-malware	B-Application
,	O
intrusion	O
prevention	O
and	O
firewall	B-Application
features	O
for	O
server	B-Application
and	O
desktop	B-Device
computers	I-Device
.	O
</s>
<s>
The	O
first	O
release	O
of	O
Symantec	B-Protocol
Endpoint	I-Protocol
Protection	I-Protocol
was	O
published	O
in	O
September	O
2007	O
and	O
was	O
called	O
version	O
11.0	O
.	O
</s>
<s>
Endpoint	O
Protection	O
is	O
the	O
result	O
of	O
a	O
merger	O
of	O
several	O
security	O
software	O
products	O
,	O
including	O
Symantec	B-Protocol
Antivirus	I-Protocol
Corporate	I-Protocol
Edition	I-Protocol
10.0	O
,	O
Client	O
Security	O
,	O
Network	O
Access	O
Control	O
,	O
and	O
Sygate	O
Enterprise	O
Edition	O
.	O
</s>
<s>
For	O
example	O
,	O
it	O
can	O
block	O
data	O
transfers	O
to	O
unauthorized	O
device	O
types	O
,	O
such	O
as	O
USB	O
flash	O
drives	O
or	O
Bluetooth	B-Protocol
devices	O
.	O
</s>
<s>
At	O
the	O
time	O
,	O
Symantec	B-Protocol
Antivirus	I-Protocol
Corporate	I-Protocol
Edition	I-Protocol
was	O
widely	O
criticized	O
as	O
having	O
become	O
bloated	O
and	O
unwieldy	O
.	O
</s>
<s>
In	O
2009	O
,	O
Symantec	O
introduced	O
a	O
managed	O
service	O
,	O
whereby	O
Symantec	O
staff	O
deploy	O
and	O
manage	O
Symantec	B-Protocol
Endpoint	I-Protocol
Protection	I-Protocol
installations	O
remotely	O
.	O
</s>
<s>
Insight	O
was	O
intended	O
to	O
combat	O
malware	O
that	O
generates	O
mutations	O
of	O
its	O
files	O
to	O
avoid	O
detection	O
by	O
signature-based	O
anti-malware	B-Application
software	O
.	O
</s>
<s>
Symantec	B-Protocol
Endpoint	I-Protocol
Protection	I-Protocol
is	O
a	O
security	O
software	O
suite	O
that	O
includes	O
intrusion	O
prevention	O
,	O
firewall	B-Application
,	O
and	O
anti-malware	B-Application
features	O
.	O
</s>
<s>
According	O
to	O
SC	O
Magazine	O
,	O
Endpoint	O
Protection	O
also	O
has	O
some	O
features	O
typical	O
of	O
data	B-Application
loss	I-Application
prevention	I-Application
software	I-Application
.	O
</s>
<s>
It	O
is	O
typically	O
installed	O
on	O
a	O
server	B-Application
running	O
Windows	O
,	O
Linux	B-Application
,	O
or	O
macOS	B-Application
.	O
</s>
<s>
It	O
is	O
used	O
to	O
prevent	O
unapproved	O
programs	O
from	O
running	O
,	O
and	O
to	O
apply	O
firewall	B-Application
policies	O
that	O
block	O
or	O
allow	O
network	O
traffic	O
.	O
</s>
<s>
It	O
attempts	O
to	O
identify	O
and	O
block	O
malicious	O
traffic	O
in	O
a	O
corporate	O
network	O
or	O
coming	O
from	O
a	O
web	B-Application
browser	I-Application
.	O
</s>
<s>
Endpoint	O
Protection	O
has	O
an	O
administrative	O
console	O
that	O
allows	O
the	O
IT	O
department	O
to	O
modify	O
security	O
policies	O
for	O
each	O
department	O
,	O
such	O
as	O
which	O
programs	O
or	O
files	O
to	O
exclude	O
from	O
antivirus	B-Application
scans	O
.	O
</s>
<s>
In	O
early	O
2012	O
,	O
source	O
code	O
for	O
Symantec	B-Protocol
Endpoint	I-Protocol
Protection	I-Protocol
was	O
stolen	O
and	O
published	O
online	O
.	O
</s>
<s>
In	O
July	O
2012	O
,	O
an	O
update	O
to	O
Endpoint	O
Protection	O
caused	O
compatibility	O
issues	O
,	O
triggering	O
a	O
Blue	O
Screen	O
of	O
Death	O
on	O
Windows	B-Application
XP	I-Application
machines	O
running	O
certain	O
third-party	O
file	B-Application
system	I-Application
drivers	B-Application
.	O
</s>
<s>
In	O
2014	O
,	O
Offensive	O
Security	O
discovered	O
an	O
exploit	O
in	O
Symantec	B-Protocol
Endpoint	I-Protocol
Protection	I-Protocol
during	O
a	O
penetration	O
test	O
of	O
a	O
financial	O
services	O
organization	O
.	O
</s>
<s>
In	O
2019	O
,	O
Ofir	O
Moskovitch	O
,	O
a	O
Security	O
Researcher	O
discovered	O
a	O
Race	O
Condition	O
bug	O
which	O
involves	O
2	O
Critical	O
Symantec	B-Protocol
Endpoint	I-Protocol
Protection	I-Protocol
Client	O
Core	O
Components	O
:	O
Client	O
Management	O
&	O
Proactive	O
Threat	O
Protection	O
and	O
directly	O
results	O
in	O
Protection	O
Mechanism	O
Failure	O
that	O
can	O
lead	O
to	O
a	O
Self-Defense	O
Bypass	O
,	O
aka	O
"	O
SEMZTPTN	O
"	O
-	O
Symantec	O
Endpoint	O
Minimized	O
Timed	O
Protection	O
.	O
</s>
<s>
According	O
to	O
Gartner	O
,	O
Symantec	B-Protocol
Endpoint	I-Protocol
Protection	I-Protocol
14	O
is	O
one	O
of	O
the	O
more	O
comprehensive	O
endpoint	O
security	O
products	O
available	O
and	O
regularly	O
scores	O
well	O
in	O
independent	O
tests	O
.	O
</s>
<s>
Network	O
World	O
ranked	O
Symantec	B-Protocol
Endpoint	I-Protocol
Protection	I-Protocol
sixth	O
in	O
endpoint	O
security	O
products	O
,	O
based	O
on	O
data	O
from	O
NSS	O
Labs	O
testing	O
.	O
</s>
