Following on the success of the Norton 2009 and 10 releases, Symantec has made an ongoing commitment to delivering security products that are fast and light. The Norton 2011 products have maintained an eye on performance, in spite of adding significant new protection technology to the release.
With Norton AntiVirus the very uniqueness of a file and its attributes is what helps us identify it as new malware. More than three years in the making, Quorum tracks files and applications and dozens of their attributes such as their age, download source, digital signature, and prevalence. These attributes are then combined using complex algorithms to determine a reputation. As a file is distributed across the Internet and these attributes change, Quorum updates the reputation of the file. This reputation is especially important when a file is new, likely to be a threat, and traditional defenses are not likely to detect it.
The Norton Insight family of technologies in the new 2011 products uses extensive online intelligence systems to proactively protect the PC and keep users informed of the security and performance impact of files and applications that they encounter in their everyday online experience.
Norton Download Insight - Uses extensive online intelligence systems leveraging reputation to proactively protect your PC. Analyzes and reports on the safety of new files and applications before users install and run them.
Norton System Insight - Provides features and easy-to-understand system information to help keep PCs performing at top speed. Automatic and on-demand application optimization rejuvenates application performance. Provides a view of recent events on the computer, providing the information required to research and analyze PC issues. Performance graphs help pinpoint what's causing a computer to slow down.
Norton Threat Insight - Provides details on threats that have been detected on your PC - including useful information on where it came from (the URL) and when it was initially encountered.
Norton Insight Network - Leverages a cloud-based approach unique to Symantec. Based on the Quorum technology, it takes cloud-based security beyond traditional blacklists and whitelists. It uses a statistical analysis of file attributes based on billions of scans on millions of computers to identify the trust level of a file. This way Norton can identify files to be trustworthy or untrustworthy that would otherwise fall into the grey area of the unknown with only traditional security methods.
SONAR 2 - Sophisticated second-generation behavioral security technology that detects entirely new threats based on their suspicious actions, without the need for traditional fingerprints. Leverages data from the reputation cloud, firewall, network communications (IPS), and file attributes such as location on the PC, origin information, etc., to decide when to detect a program as a threat.
*Limited time offer available only in the United States to students: (i) who attend an educational institution located in the United States; and (ii) who have an email address at their educational institution with the .edu domain suffix.