
^ a b c d Walsh, Lawrence (November 2007).^ 'What's new for all releases of Symantec Endpoint Protection 14.x'.Network World ranked Symantec Endpoint Protection sixth in endpoint security products, based on data from NSS Labs testing. The report speculated the lack of integration would be addressed in version 14. Reception įorrester said version 12.1 was the most complete endpoint security software product on the market, but the different IT security functions of the software were not well-integrated. In 2019, Ofir Moskovitch, a Security Researcher discovered a Race Condition bug which involves 2 Critical Symantec Endpoint Protection Components: Tamper Protection & Proactive Threat Protection and directly results in Protection Mechanism Failure and can lead to a Self-Defense Bypass, aka 'SEMZTPTN' - Symantec Endpoint Minimized Timed Protection. The exploit in the Application and Device control driver allowed a logged-in user to get system access. In 2014, Offensive Security discovered an exploit in Symantec Endpoint Protection during a penetration test of a financial services organization.


In July 2012, an update to Endpoint Protection caused compatibility issues, triggering a Blue Screen of Death on Windows XP machines running certain third-party file systemdrivers.

The Indian government requires vendors to submit the source code of any computer program being sold to the government, to ensure that they are not being used for espionage. A hacker group called 'The Lords of Dharmaraja' claimed credit, alleging the source code was stolen from Indian military intelligence. In early 2012, source code for Symantec Endpoint Protection was stolen and published online.
