Norton Security is a cross-platform
security
Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
suite that provides subscription-based real-time
malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
prevention and removal in addition to
identity theft
Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
protection and
performance tuning
Performance tuning is the improvement of system performance. Typically in computer systems, the motivation for such activity is called a performance problem, which can be either real or anticipated. Most systems will respond to increased load wi ...
tools. Other features include a
personal firewall
A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall.
A personal firewall differs from ...
,
email spam
Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming).
The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoida ...
filtering, and
phishing
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
protection. Released on September 23, 2014 as part of Symantec's streamlined Norton line, it replaces the long-running
Norton Internet Security
Norton Internet Security, developed by NortonLifeLock, Symantec Corporation, is a discontinued computer program that provides malware protection and removal during a subscription period. It uses Antivirus software#Signature-based detection, signa ...
as their flagship antivirus product.
Version history
In 2014, in an effort to streamline its Norton product line, Symantec combined nine standalone Norton products into one all-purpose suite.
Norton Security superseded
Norton Internet Security
Norton Internet Security, developed by NortonLifeLock, Symantec Corporation, is a discontinued computer program that provides malware protection and removal during a subscription period. It uses Antivirus software#Signature-based detection, signa ...
(and the pre-2019 versions of
Norton 360
Norton 360, developed by Symantec, was an “all-in-one” Internet security#Security suites, security suite for the consumer market.
It was first released in 2007, but was discontinued in 2014; its features were carried over to its successor, ...
), with an overlapping release cycle that saw version 22 as the initial release of the former and the final release of the latter. However, version 22 of Norton 360 and Norton Internet Security were updates as opposed to full releases.
In terms of similarities and differences with its predecessors, Norton Security retained all components of Norton Internet Security (including the antivirus, firewall and identity theft components) and added the
optimization tools from Norton 360.
Norton Security is available in three editions: Norton Security Standard with one license (valid for a single device), Norton Security Deluxe with five licenses and Norton Security Premium which offers ten licenses, 25 GB of
hosted online backup, and a premium subscription to Symantec's parental control system.
All editions include protection for Windows, OS X, Android and iOS devices. However, features may vary based on the operating system.
In April 2019, the Norton 360 brand was reinstated, maintaining a similar plan structure but with the addition of VPN and, on the premium tiers,
LifeLock
LifeLock Inc. is an American identity theft protection company based in Tempe, Arizona. LifeLock's system monitors for identity theft, the use of personal information, and credit score changes.
LifeLock was acquired by computer security compan ...
(which was acquired by Symantec in 2017).
System requirements
*Operating Systems Supported
(Norton Security 22.16.0.247 for Windows)
**Microsoft Windows 7 (all versions) with Service Pack 1 (SP 1) or later
**Microsoft Windows 8/8.1 (all versions). Some protection features are not available in Windows 8 Start screen browsers.
**Microsoft Windows 10 (all versions).
*Mac Operating Systems (Norton Security 8.8.1 build 76 for Mac)
**macOS 10.10 or later
*Android Operating Systems (Norton Mobile Security 4.5.0 for Android)
**Android 4.1 or later
*iOS Operating Systems (Norton Security 1.1.5 for iOS)
**iOS 10 or later
See also
*
Norton 360
Norton 360, developed by Symantec, was an “all-in-one” Internet security#Security suites, security suite for the consumer market.
It was first released in 2007, but was discontinued in 2014; its features were carried over to its successor, ...
*
SONAR
Sonar (sound navigation and ranging or sonic navigation and ranging) is a technique that uses sound propagation (usually underwater, as in submarine navigation) to navigation, navigate, measure distances (ranging), communicate with or detect o ...
*
Comparison of antivirus software
This article compares notable antivirus products and services. It is Wikipedia list article rather than a deep analysis of the strengths and weaknesses of each.
Legend
The term "on-demand scan" refers to the possibility of performing a manual ...
References
External links
Official site
{{Symantec
Security
Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
Gen Digital software
Software companies established in 2014
Antivirus software
Proprietary software