Symantec™ Endpoint Protection Cloud

Symantec Endpoint Protection Cloud (SEP Cloud) is an easy-to-use service that protects and manages desktops, servers, and mobile devices from a single console. Default security settings and self-service device enrollment help you protect your devices quickly, making SEP Cloud the ideal solution for organizations with limited IT resources. Easy to use security-as-a-service for organizations with limited or no IT resources.


(Currently, SEP Cloud is not available for new signup.
New signup request are requested to check Malwarebytes)

Protecting users and their devices is critical for organizations of all sizes. For businesses with limited IT staff, endpoint protection and control over all your users’ devices (desktops, laptops, tablets & smartphones) can be daunting. The need to address advanced threats with limited resources requires a solution that simplifies endpoint protection and device management.

Advanced Endpoint Security Made Easy

Symantec™ Endpoint Protection Cloud (SEP Cloud) is an easy to use security-as-a-service that protects and manages PC, Mac, mobile devices and servers from a single console, making it the ideal solution for organizations with limited IT security resources. Symantec™ Endpoint Protection Cloud (SEP Cloud) effectively stops today’s ransomware, zero-day threats and other sophisticated attacks using advanced multi-layered technologies including advanced machine learning and behavior analysis.

Utilizing SEP Cloud’s (Symantec™ Endpoint Protection Cloud), default security settings and self-service device enrollment capabilities, this solution quickly protects your endpoints.

Intelligent Protection for Emerging Threats

A powerful combination of detection technologies stops advanced threats and rapidly-mutating malware regardless of how they attack your endpoint–all in a high-performance, lightweight agent.

  • Advanced machine learning blocks new and emerging threats using trillions of samples of good and bad files in the Symantec Global Intelligence Network to power machine-learning results.
  • Behavior monitoring determines file risk by monitoring nearly1,400file behaviors while they execute in real time to block malicious files.
  • Memory exploit mitigation neutralizes zero-day exploits in popular software that has not been patched by the vendor using signature-less technology that works regardless of the law, bug, or vulnerability.
  • High-speed emulation technology detects malware hidden by polymorphic custom packers. A static data scanner runs each file in milliseconds, in a lightweight virtual machine to force threats to reveal themselves, improving both detections rates and performance.
  • Network firewall and intrusion prevention technology analyzes incoming and outgoing traffic and blocks threats while they travel through the network before reaching endpoints. Rules-based firewall and browser protection defend against web-based attacks. With strong network protection, you can detect most threats before they reach endpoints.
  • File reputation analysis identifies whether a file is good or bad and assigns a reputation score by inspecting key attributes such file download frequency, download data, and download location—allbefore the file arrives at the endpoint.
  • Antivirus protection uses signatures and advanced file heuristics to analyze and eradicate malware on endpoints including viruses, worms, Trojans, spyware, bots, adware, and rootkits. Cloud-based file lookups during file scans provide the latest information and protect against outbreaks and new and emerging malware.

Stop Targeted Attacks and Zero-Day Threats with Layered Protection

and Intrusion
of new and
evolving threats
Monitors and
blocks files
that exhibit
Blocks zero-day
exploits against
in popular
Virtual machine
malware hidden
using custom
Blocks malware
before it
spreads to your
machine and
controls traffic
safety of files
and websites
using the
wisdom of the
Scans and
malware that
arrives on a
infections from
USB storage
devices, helps
prevent data

Mobile Security and Device Management

Mobile threat protection is built into Symantec™ Endpoint Protection Cloud (SEP Cloud) for iOS and Android devices to provide safeguards including blocking malware and protecting users from fraud. Integrated mobile device management provides visibility and control over network access and device data.

  • Safe mobile browsing detects and blocks phishing websites.
  • High-risk app detection proactively warns users about suspicious apps or apps that could impact device performance before downloading from the app store
  • Password protection prevents unauthorized access to devices by enforcing password requirements, and device controls such as the camera control can limit access or disable use.
  • Device lock &wipedevice capability protects the company data on mobile devices in the event a device is lost or stolen by remotely locking access to or wiping data from a mobile device.
  • Create Email and Wi-Fi policies to control access to company networks based on device ownership(company or personal) and device security status

Easy to Use Cloud-Based Set-up and Management

SEP Cloud’s (Symantec™ Endpoint Protection Cloud) highly intuitive cloud management allows you to secure and manage a wide variety of devices in the cloud including PCs, laptops, mobile phones, tablets, and servers with broad OS support(Mac, Windows, iOS, and Android). Setup takes just 5 minutes using the default security policy configurations.

Policy Setting
Fast Action
Up To Date
Create polices based on employees or groups that are seamlessly applied to all their devices.Find and remediate infected devices in 3 clicks and easily bring devices into compliance based on status and distribution.Stay ahead of threats with always-on security that is automatically updated.

Always Available Cloud-Based Architecture

Cloud-based management console,user-portal,real-time dashboard, and advanced endpoint protection

  • One-click policy configuration enables cross OS platform policy creation that protects users on any device. The policy is created just once, and that policy configuration translates to any device or operating system, greatly simplifying policy deployment and management.
  • Employee self-enrollment allows employees to enroll their corporate and personal devices in minutes using an online portal.
  • Built-in integration with Identity Providers such as Azure AD, Okta and VIP Access Manager makes it easy to synch users with SEP Cloud. For non-Azure Active Directory organizations, bulk upload of users via an Excel or .CSV the file is available.
  • An intuitive dashboard provides a quick view of an entire organization’s devices, their status, and distribution with the ability to run reports and take action quickly to remediate devices and keep them secure and in compliance.
  • Automated agent updates delivered from the SEP Cloud service ensures the newest information is downloaded to the device and is always up to date
  • Pre-configured templates and reports that can be scheduled or downloaded on-demand meet business reporting needs
  • Powerfulcustomizablerule engine with pre-configured alert rules provides actionable intelligence and notification on demand.

Flexible Subscription Options to Meet Your Business Needs

Symantec™ Endpoint Protection Cloud (SEP Cloud) offers flexible per user or per device subscription options with affordable monthly or annual terms. With a per-user subscription, you can support multiple devices (PC, Mac or Mobile) on a per-user basis for a flat fee and avoid budget surprises. The per-device subscription provides protection for a single PC or Mac device that is used by one or multiple users. With SEP Cloud, your endpoint protection service is always up to date with the latest features enabled and includes 24×7 technical support. The feature
comparison table below details features included with each subscription option:

Device Protection-FeaturesDesktop, Laptop,
Smartphone & Tablet
Desktop, Laptop &
Microsoft Surface Tablet
Network & Browser Exploit Prevention ok ok
Advanced Machine Learning ok ok ok
File Reputation Analysis ok ok ok
Behavior Monitoring & Blocking ok ok
Memory Exploit Mitigation ok ok ok
Emulator ok ok ok
File-based Malware Prevention ok ok ok
Advanced Firewall ok ok
Granular Device Controls ok ok
Mobile Device Management ok
Mobile Security ok
Wi-Fi & Email Access ok
Device Protection-Subscription OptionsDesktop, Laptop,
Smartphone & Tablet
Desktop, Laptop &
Microsoft Surface Tablet
Per Device Subscription ok
Per User (up to 5 devices) ok
Server-based Subscription ok
Encryption Add-on ok
Device Protection-Subscription PricingPer Device Subscription

Desktop, Laptop,
Smartphone & Tablet

Per User (up to 5 devices)

Desktop, Laptop &
Microsoft Surface Tablet

Per Year2,900 BDT /Year4,000 BDT /Year3,600 BDT /Year

Frequently Asked Questions about Symantec Endpoint Protection Cloud

What is the difference between Symantec Endpoint Protection and Symantec Endpoint Protection Cloud?

Symantec Endpoint Protection is primarily an on-premise product focused on the needs of larger enterprises (more than 1000 users), whereby Symantec Endpoint Protection Cloud offers comprehensive cloud-based security services, which includes real time visibility and management of each endpoint regardless of the of geographic location or network environment.

How simple is it to implement Symantec Endpoint Protection Cloud into your organization?

Deploying Symantec Endpoint Protection Cloud is simple and can be deployed in the following methods:

1.Standard Protection Agent Install – This installation method downloads a small installer that manages the full installation of the Protection Agent. It requires:

  • A user login for your Endpoint Protection Cloud account
  • Your physical presence at the computer or a remote connection to it

2. Redistributable installer package – Enables a network administrator to push out the Protection Agent for Endpoint Protection Cloud to the computers requiring protection. It provides a silent install of Endpoint Protection Cloud. (NOTE: The Redistributable Package can also be configured for deployment using Microsoft Active Directory.)

3. Email invitation – Enables you to send email invitations to download the Protection Agent for Endpoint Protection Cloud:

    1. Up to 50 email addresses separated by a semicolon can be submitted
    2. Invitation contains a URL valid for 30 days unless withdrawn by the admin
    3. Allows computer user to perform the installation themselves without administrator intervention.
    4. An Administrator can revoke the invitation, if necessary.
Why Symantec?

Symantec Corporation is the world’s leading Cyber security company. Symantec is defining the future of cybersecurity by solving the industry’s toughest challenges of securing mobile workforces, protecting the cloud, and stopping advanced threats. Organizations around the world partnering with Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Symantec operates the world’s largest civilian cyber intelligence network, allowing it to defend and protect against the most advanced threats.

There are 3 main reasons why you should partner with Symantec:

  • Growing security market:The Cyber security market is growing fast. Business attacks are growing in volume and sophistication. Small to mid-sized business owners are unprepared for what might come their way: ransomware, multi-phased attacks, viruses. Small businesses need security solutions that are easy to deploy, scale on-demand, and don’t use the entire IT budget. Subscribe to Symantec’s Cloud Solution Providers program, specialising in security solutions from the #1 market leader that are easily purchased, provisioned, and deployed quickly through the cloud.
  • Recurring revenue:With rapid growth in Cyber security, you’ll see increased revenue as you sell high-in-demand security solutions to small and mid-sized businesses and it is offering a recurring revenue, so you have a consistent, predictable monthly revenue stream. Add in management and support services and you create new revenue streams.
  • Fully Automated Experience: Symantec’s Online Services for Small Business and Mid-market customers are based on Symantec’s Security Cloud Platform—a state of the art infrastructure that delivers a consistent customer experience to every customer. On the back-end it handles every aspect of billing and on the front-end it provides on-demand provisioning. Integrated with cloud marketplaces, the cloud platform makes it easy, fast, and inexpensive for Cloud Solution Providers to service their end customers.
  • Dedicated Partner Focus:Symantec is fully committed to partners. We reward investment—you invest, we invest. A true partnership.
How do I check the service status of SEP Cloud?

Users can subscribe to service health notifications at for the current status of Symantec Endpoint Protection Cloud service.

What is the Symantec Endpoint Protection Cloud agent and how does it work?

The Symantec Endpoint Protection Cloud agent delivers services to a selected endpoint (laptop, desktop, or file server); it communicates information about system health, threats, and security policies with the management console. The agent receives protection updates via the service infrastructure. Agents are deployed via standard download or email invitation. The agent in the email invitation situation is installed by the OS of the machine that is being enrolled. With all supported platforms other than Windows 7, the MDM function of the device is enrolled first and then used that to install the agent. They can also be deployed to an organisation’s computers using a redistributable package. Once an agent has been installed on the selected endpoint systems, the agent is in position to help defend customer computer systems against a myriad of risks and threats.

What is the timeframe required for implementation?

The time frame of implementing Symantec Endpoint Protection Cloud is much shorter than a traditional implementation, due to the elimination of onsite management hardware and software installation. Each implementation timeframe may differ depending on the environment size.  If making use of the self-enrolment feature, a user can self-enrol a single endpoint in about a minute, the machine will then take anywhere from a couple more minutes to a half an hour (depending on bandwidth mostly) to complete the install and grab all the latest content/policy/etc, but no user interaction is required for that part. A user installing on 5 devices could complete their interactive portions in less than 10 minutes.

What type of reporting is available through Symantec Endpoint Protection Cloud?

Symantec Endpoint Protection Cloud provides flexible reporting including:

  • Alert History – A historical view of alerts/events that have occurred for one or more users.
  • Security Audit – A historical view of user generated events
  • Firewall History – Provides a summary of firewall events for one or more computers.
  • Risk Detection – Details the numerous types of risks detected in one or more computers.
  • Security Overview – Provides a summary of the overall security of all computers.
  • Reports can be exported into PDF, HTML and XML formats.

*Administrators can run on-demand reports or choose to schedule reporting at specified intervals and send via email for review.

What are the impacts of installing Symantec Endpoint Protection Cloud on a Microsoft Exchange server?

Symantec Endpoint Protection Cloud will automatically detect the exchange server and will not interfere with any mail flow.

How does Symantec Endpoint Protection Cloud affect the performance of user’s machine during definition updates and virus scans?

Definition updates are not monolithic but incremental, and the default scan policy is also tuned for minimal performance impact. Executing an on-demand full system scan will have a minor impact on overall system performance but by default these will only occur if initiated by the end user or admin. The performance of the user’s machine won’t be affected as the services delivered by Symantec Endpoint Protection Cloud has been enhanced by scan performance mitigation and reduced memory usage.

Can local administrators uninstall the product?

A local administrator can uninstall the product if they unenroll the device from SEP Cloud.

How does the corporate policy apply to remote users?

Automated updates occur transparently over an Internet connection to help keep employee systems current and consistent with policies, even when they’re not logged into the VPN.

What type of support is available for Symantec Endpoint Protection Cloud?

Symantec Endpoint Protection Cloud provide 24 / 7 support via telephone, email or live chat.

How to subscribe to Symantec Endpoint Cloud trail?
  • Start a 1-month trial by placing an order at
  • The quantity of trial licenses is fixed at 50 users/devices.
  • The trial will be converted to paid contract with a committed initial subscription term unless the trial is canceled manually by the signed up account holder.
  • The trial is only valid once per customer and cannot be extended.

If you’ve any query, please contact our Sales department.

Contact Us

We'd love to hear from you, we'll get back to you soon.

Start typing and press Enter to search