Call a Specialist Today! 833-335-0426

Symantec Endpoint Protection Small Business Edition
Run Your Business in a Smarter, More Secure Way

Symantec Endpoint Protection Small Business Edition

Due to Broadcom acquisition of Symantec, orders may be delayed. Please contact us for details.

Sorry, this product is no longer available, Please contact us for a replacement.



You’ve worked hard to grow your business, and don’t want to see it compromised by a malicious attack. More than ever, small businesses are being targeted for cyberattacks. In 2017, 61% small and medium-sized organizations experienced a cyberattack.1 You need a way to keep your data safe and prevent business disruption due to malicious threats entering your network and preying on your end users.

Endpoint protection for your business should be powerful and easy to use without requiring technical expertise. It should also protect your PC, Mac and Windows servers, without slowing them down or impacting end user productivity. Symantec Endpoint Protection Small Business Edition (SEP SBE) has been designed specifically to meet the needs of small businesses and is delivered as a cloud-managed subscription service:

Simple, fast and effective malware and exploit protection

SEP SBE is fast and effective at stopping malware (viruses, worms, Trojans, spyware, bots, adware, and rootkits), and zero-day exploits in their tracks, without disrupting productivity.

Sets-up in minutes

SEP SBE sets-up within minutes with no special IT staff or training required. You get complete, multi-layered protection with helpful and reliable support 24 hours a day, seven days a week.

Built for growing businesses

SEP SBE enables you to add or remove users or devices with only a few clicks. As a cloud-managed service, you conveniently manage protection for all your desktops, laptops, and servers from one central location.

Based on the same multi-layered threat protection engines as our enterprise-grade Symantec Endpoint Protection

Features & Benefits:

Stop Targeted Attacks and Zero-Day Threats with Layered Protection

Advanced Machine Learning Behavior Monitoring Memory Exploit Mitigation Emulator Firewall and Intrusion Prevention File Reputation Antivirus Device Control
Pre-execution detection of new and evolving threats Monitors and blocks files that exhibit suspicious behaviors Blocks zeroday exploits against vulnerabilities in popular software Virtual machine detects malware hidden using custom packers Blocks malware before it spreads to your machine and controls traffic Determines safety of files and websites using the wisdom of the community Scans and eradicates malware that arrives on a system Blocks infections from USB storage devices, helps prevent data theft

A powerful combination of detection technologies stop advanced threats and rapidly-mutating malware regardless of how they attack your endpoint – all in a high-performance, lightweight agent.

  • Advanced machine learning blocks new and emerging threats using trillions of samples of good and bad files in the Symantec Global Intelligence Network to power machine-learning results.
  • Behavior monitoring determines file risk by monitoring nearly 1,400 file behaviors while they execute in real time to block malicious files.
  • Memory exploit mitigation neutralizes zero-day exploits in popular software that has not been patched by the vendor using signatureless technology that works regardless of flaw, bug, or vulnerability.
  • Emulation technology detects malware hidden by polymorphic custom packers. A static data scanner runs each file in milliseconds, in a lightweight virtual machine to force threats to reveal themselves, improving both detection rates and performance.
  • Network firewall and intrusion prevention technology analyzes incoming and outgoing traffic and blocks threats while they travel through the network before reaching endpoints. Rules-based firewall and browser protection defend against web-based attacks. With strong network protection, you can detect most threats before they reach endpoints.
  • File reputation analysis identifies whether a file is good or bad and assigns a reputation score by inspecting key attributes such file download frequency, download date, and download location—all before the file arrives at the endpoint.
  • Antivirus protection uses signatures and advanced file heuristics to analyze and eradicate malware on endpoints including viruses, worms, Trojans, spyware, bots, adware, and rootkits. Cloud-based file lookups during file scans provide the latest information and protect against outbreaks and new and emerging malware.

System Requirments:


  • Windows 10 (32/64bit)
  • Windows 8.1 (32/64bit)
  • Windows 8 (32/64bit)
  • Windows 7 SP1 (32/64bit)

Note that the Desktop Enterprise/Pro/Home/Ultimate editions and variations are supported, unless explicitly stated otherwise.


  • Windows Server 2016
  • Windows Server 2012 Standard (64bit), Windows Server 2012 Datacenter (64bit), Windows Server 2012 R2 Standard (64bit)
  • Windows Server 2008 and 2008 R2
  • Note: Windows Small Business Server 2011 support is implied with Server 2008 R2 support.


  • Mac OS X 10.13 (High Sierra)
  • Mac OS X 10.12 (Sierra)
  • Mac OS X 10.11 (El Capitan)
  • Mac OS X 10.10 (Yosemite)

Client installation

  • Mac OS X 10.10 (Yosemite)
  • Mac OS X 10.9 (Mavericks)
  • Mac OS X 10.8 (Mountain Lion)
  • Windows 8.1
  • Windows 8
  • Windows 7 (32-bit, 64-bit, RTM, and SP1)
  • Windows Server 2012 R2
  • Windows Server 2012
  • Windows Server 2008 and 2008 R2

Management software installation

  • Windows 8.1
  • Windows 8
  • Windows 7 (32-bit, 64-bit, RTM and SP1; all editions except Home)
  • Windows Server 2012 R2
  • Windows Server 2012
  • Windows Server 2008 R2
  • Windows Small Business Server 2011 (64-bit)

Key Capabilities:

Local update service Reduce network bandwidth usage by assigning a local computer as the “local update host” to connect to the internet to get the latest security software and content updates and then share with other computers on the local area network.
Always-on protection Automated updates occur transparently over the internet connection to help keep employee systems current and consistent with policies whether they are in the office or on the road - even when they’re not logged into VPN.
Easy set-up and management Administrators access an easy-to-use web-based management console to configure security settings for all their supported devices. You receive real-time alerts via SMS or email, and easily perform functions such as changing security settings, configuring alerts, and generating reports.
Partner management console Provides the ability for a partner to manage the cloud-managed service for their customers through a web-based console
Customizable reporting Automated event logging highlights administrative activities such as login times, polices created, and computers added. Administrators can export this data into graphical reports (PDF, HTML) for audit purposes.
Per Device Subscription License A monthly or annual subscription fee covers service updates and 24 X 7 technical support.

Pricing Notes: