HOME

TheInfoList



OR:

Norton Security is a cross-platform
security Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
suite that provides subscription-based real-time
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
prevention and removal in addition to
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
protection and
performance tuning Performance tuning is the improvement of system performance. Typically in computer systems, the motivation for such activity is called a performance problem, which can be either real or anticipated. Most systems will respond to increased load wi ...
tools. Other features include a
personal firewall A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall. A personal firewall differs from ...
,
email spam Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoida ...
filtering, and
phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
protection. Released on September 23, 2014 as part of Symantec's streamlined Norton line, it replaces the long-running
Norton Internet Security Norton Internet Security, developed by NortonLifeLock, Symantec Corporation, is a discontinued computer program that provides malware protection and removal during a subscription period. It uses Antivirus software#Signature-based detection, signa ...
as their flagship antivirus product.


Version history

In 2014, in an effort to streamline its Norton product line, Symantec combined nine standalone Norton products into one all-purpose suite. Norton Security superseded
Norton Internet Security Norton Internet Security, developed by NortonLifeLock, Symantec Corporation, is a discontinued computer program that provides malware protection and removal during a subscription period. It uses Antivirus software#Signature-based detection, signa ...
(and the pre-2019 versions of
Norton 360 Norton 360, developed by Symantec, was an “all-in-one” Internet security#Security suites, security suite for the consumer market. It was first released in 2007, but was discontinued in 2014; its features were carried over to its successor, ...
), with an overlapping release cycle that saw version 22 as the initial release of the former and the final release of the latter. However, version 22 of Norton 360 and Norton Internet Security were updates as opposed to full releases. In terms of similarities and differences with its predecessors, Norton Security retained all components of Norton Internet Security (including the antivirus, firewall and identity theft components) and added the optimization tools from Norton 360. Norton Security is available in three editions: Norton Security Standard with one license (valid for a single device), Norton Security Deluxe with five licenses and Norton Security Premium which offers ten licenses, 25 GB of hosted online backup, and a premium subscription to Symantec's parental control system. All editions include protection for Windows, OS X, Android and iOS devices. However, features may vary based on the operating system. In April 2019, the Norton 360 brand was reinstated, maintaining a similar plan structure but with the addition of VPN and, on the premium tiers,
LifeLock LifeLock Inc. is an American identity theft protection company based in Tempe, Arizona. LifeLock's system monitors for identity theft, the use of personal information, and credit score changes. LifeLock was acquired by computer security compan ...
(which was acquired by Symantec in 2017).


System requirements

*Operating Systems Supported (Norton Security 22.16.0.247 for Windows) **Microsoft Windows 7 (all versions) with Service Pack 1 (SP 1) or later **Microsoft Windows 8/8.1 (all versions). Some protection features are not available in Windows 8 Start screen browsers. **Microsoft Windows 10 (all versions). *Mac Operating Systems (Norton Security 8.8.1 build 76 for Mac) **macOS 10.10 or later *Android Operating Systems (Norton Mobile Security 4.5.0 for Android) **Android 4.1 or later *iOS Operating Systems (Norton Security 1.1.5 for iOS) **iOS 10 or later


See also

*
Norton 360 Norton 360, developed by Symantec, was an “all-in-one” Internet security#Security suites, security suite for the consumer market. It was first released in 2007, but was discontinued in 2014; its features were carried over to its successor, ...
*
SONAR Sonar (sound navigation and ranging or sonic navigation and ranging) is a technique that uses sound propagation (usually underwater, as in submarine navigation) to navigation, navigate, measure distances (ranging), communicate with or detect o ...
*
Comparison of antivirus software This article compares notable antivirus products and services. It is Wikipedia list article rather than a deep analysis of the strengths and weaknesses of each. Legend The term "on-demand scan" refers to the possibility of performing a manual ...


References


External links


Official site
{{Symantec
Security Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
Gen Digital software Software companies established in 2014 Antivirus software Proprietary software