LANDESK ANTIVIRUS Powered by Kaspersky Protect Your Endpoints from One Console

Total Page:16

File Type:pdf, Size:1020Kb

LANDESK ANTIVIRUS Powered by Kaspersky Protect Your Endpoints from One Console LANDESK ANTIVIRUS Powered by Kaspersky Protect Your Endpoints from One Console Every moment you are connected to the LANDESK Antivirus helps you: Internet (and sometimes even when n Deliver the fastest response times to you’re not), you are under attack. minimize your risk of security breaches Today’s cyber attacks have become n Reduce cost and complexity with a extremely dynamic and exponentially centralized solution more complex. LANDESK Antivirus n Detect significant numbers of virus software delivers comprehensive anti- and malware instances missed by malware solutions that are powerful, other solutions through advanced efficient and easy to manage. LANDESK heuristics n Enable IT staff and executives to Antivirus uses the award-winning quickly see which systems are Kaspersky Anti-Virus Engine to to deliver protected and which are vulnerable comprehensive protection from a wide n Provide vulnerability assessments for range of malware including viruses, multiple platforms including Trojans, worms, rootkits, spyware, and Windows, Mac, Linux and HP-UX adware. Security Capabilities: n Kaspersky Lab Awards Real-time protection against multi- vector threats – Protect against Kaspersky Anti-Virus has received viruses, trojans, worms, spyware, multiple highest accolades from leading adware, rootkits, bootkits, independent testing labs: keyloggers, screencapture malware, botnets, zero-day attacks, drive-by download infections and other malicious vectors n System watcher – Monitors and analyzes system operations proactively for suspicious activity n Rollback of malicious activity – Automatically returns a system to a point before malicious activity occurred n Behavior stream technology – Identifies dangerous application patterns within a user’s system KASPERSKY ANTI-VIRUS VS. COMPETITORS Criteria Kaspersky Sophos McAfee Symantec Trend Lab Micro AV-Comparatives: Advanced+ Standard Advanced Not Advanced Mar 2016 File Detection Test 99.9% DR * 97.6% DR 98.9% DR Included 98.4% DR AV-Comparatives: Aug-Nov 2015 Advanced+ Advanced Advanced Not Advanced Real World Protection Test 99.9% DR 97.5% DR 93.5% DR Included 99.9% DR** AV-Test.org, February 2016 Test 6.0/6.0/6.0 5.0/4.0/6.0 5.5/5.0/6.0 6.0/5.5/6.0 6.0/4.5/6.0 Protection/Performance/Usability MRG Effitas 360 Assessment & Level 1 Failed Failed Failed Failed Certification Programme - Q4 2015 100% block 96.8% block 96.3% block 98% block 98.2% block Dennis Labs Enterprise Q3 2015 AAA AAA A AAA AAA AV Protection Rating/Score 1020/1020 984 907.5 1018 996 Dennis Labs Home Q1 2015 AAA Not AA AAA AAA AV Protection Rating/Score 1020/1020 Included 960.5 1018 1000 * DR = Detection Rate, percentage of malware successfully detected by the solution. The higher, the better. ** Trend Micro’s rating has been downgraded by one rank due to 49 false positives (as compared to Kaspersky Lab’s 0). MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION* *In 2015 Kaspersky Lab products participated in 94 100% 3 places independent tests and reviews. Our products were awarded 60 firsts and achieved 77 top-three finishes. TOP of Kaspersky Lab e Scor 1st places – 60 80% Participation in 94 tests/reviews TOP 3 =82 % Avira ESET Bitdefender 60% Symantec * Notes: 40% • According to summary results of independent tests in 2015 for corporate, consumer and mobile Sophos products. Quick Heal • Summary includes independent tests conducted by : Avast AV-Comparatives, AV-Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, BullGuard VirusBulletin. Trend Micro • Tests performed in these programs assess all 20% AVG protection technologies against known, unknown and advanced threats. G DATA • The size of the bubble reflects the number of 1st Panda Security F-Secure Intel Security (McAfee) places achieved. Microsoft N of independent tests/reviews 0% 20 40 60 80 100 CONTACT KASPERSKY LAB USA: Brett Matesen, UK & Middle East: Mohammed Hussain, Global Account Manager, Regional Account Manager, Technology Licensing Technology Licensing [email protected] [email protected] Tel.: +44 (0) 871 789 1631 ext. 3112 Global: www.kaspersky.com/partners/oem/oem-contact.
Recommended publications
  • Ivanti Device and Application Control Version History Since V 2.6
    Ivanti Device and Application Control Version History Since v 2.6 Details NEW IN VERSION 5.1 Update 2 [29-May-2018] • More granular control over device attached/detached notifications Additional controls have been added such that the IDAC Control system tray icon remains visible but notifications relating to 'device attached/detached' are now suppressed. For more information refer to https://community.ivanti.com/docs/DOC-67782. • Authorization Wizard now scans inside MSP files Most Windows 10 and Office 2016 updates are delivered as MSP files rather than MSIs. In previous IDAC versions, the Authorization Wizard could only scan inside MSIs making it very difficult to whitelist updates that were delivered as MSPs. We've changed this in 5.1U2 so that the Auth Wizard now scans inside MSPs in addition to MSIs. • Windows 10 version Support We've added support for Windows 10 version 1803 (OS build 17134) which was released by Microsoft on April 30th. Refer to the following community article for details of Windows version support with Ivanti Device and Application Control https://community.ivanti.com/docs/DOC-62154. • Citrix XenApp and XenDesktop Support We've added support for versions 7.15 and 7.17 of Citrix XenApp and XenDesktop. • 7zip library updated We've updated the 7zip library to version 18.01 to address vulnerability CVE-2018-5996. 7zip versions prior to 18.00 contain insufficient exception handling which can lead to multiple memory corruptions and allow remote attackers to cause a denial of service attack or execute arbitrary code. • SQL 2017 Support We've added support for Microsoft SQL 2017.
    [Show full text]
  • Supported Products for ESAP 3.7.8
    Firefox https://172.21.158.254/dana-admin/auth/listEsapProducts.cgi?versionid=... Windows ANTI-VIRUS Products PRODUCTS: Marketing Name Display Name 2345安全卫士 (3.x) 2345安全卫士 (3.x) 360 Internet Security (4.x) 360 Internet Security (4.x) 360 Internet Security (5.x) 360 Internet Security (5.x) 360 Internet Security (6.x) 360 Internet Security (6.x) 360 Total Security (4.x) 360 Total Security (4.x) 360 Total Security (5.x) 360 Total Security (5.x) 360 Total Security (6.x) 360 Total Security (6.x) 360 Total Security (8.x) 360 Total Security (8.x) 360 Total Security (9.x) 360 Total Security (9.x) 360天擎 (6.x) 360天擎 (6.x) 360安全卫士 (11.x) 360安全卫士 (11.x) 360杀毒 (1.x) 360杀毒 (1.x) 360杀毒 (3.x) 360杀毒 (3.x) 360杀毒 (5.x) 360杀毒 (5.x) ALYac Enterprise (2.x) ALYac Enterprise (2.x) ALYac Enterprise (3.x) ALYac Enterprise (3.x) AVANSI Antivirus (4.x) AVANSI Antivirus (4.x) AVG Anti-Spyware (7.x) AVG Anti-Spyware (7.x) AVG AntiVirus (10.x) AVG AntiVirus (10.x) AVG AntiVirus (15.x) AVG AntiVirus (15.x) AVG AntiVirus (16.x) AVG AntiVirus (16.x) AVG AntiVirus (2013.x) AVG AntiVirus (2013.x) AVG AntiVirus (2014.x) AVG AntiVirus (2014.x) AVG AntiVirus (2016.x) AVG AntiVirus (2016.x) AVG AntiVirus (7.x) AVG AntiVirus (7.x) AVG AntiVirus (8.x) AVG AntiVirus (8.x) AVG AntiVirus (9.x) AVG AntiVirus (9.x) AVG AntiVirus Business Edition (16.x) AVG AntiVirus Business Edition (16.x) AVG AntiVirus Free (17.x) AVG AntiVirus Free (17.x) AVG AntiVirus Free (18.x) AVG AntiVirus Free (18.x) AVG AntiVirus Free (19.x) AVG AntiVirus Free (19.x) AVG AntiVirus Free (20.x) AVG AntiVirus
    [Show full text]
  • The Forrester Wave™: Endpoint Security Suites, Q2 2018
    NOT LICENSED FOR DISTRIBUTION The Forrester Wave™: Endpoint Security Suites, Q2 2018 The 15 Providers That Matter Most To Enterprises And How They Stack Up by Chris Sherman and Salvatore Schiano June 21, 2018 Why Read This Report Key Takeaways In our 21-criteria evaluation of endpoint security Trend Micro, CrowdStrike, And Symantec Lead suite providers, we identified the 15 most The Pack significant ones — Bitdefender, Carbon Black, Forrester’s research uncovered a market in Check Point, Cisco, CrowdStrike, Cylance, ESET, which Trend Micro, CrowdStrike, Symantec, Ivanti, Kaspersky Lab, Malwarebytes, McAfee, Check Point, ESET, Sophos, and Bitdefender are Microsoft, Sophos, Symantec, and Trend Micro — Leaders; Carbon Black, McAfee, Kaspersky Lab, and researched, analyzed, and scored them. This Cisco, Cylance, Microsoft, and Malwarebytes are report shows how each provider measures up to Strong Performers; and Ivanti is a Challenger. help security professionals make the right choice. Security Pros Want An Effective Endpoint Security Suite From Vendors They Trust Buyers want an endpoint security suite that is effective at stopping modern threats without adding to their security team’s complexity. They also want to trust the vendor, both as a strategic partner and as a steward of their data. Behavioral Analysis, Automation, And Real- World Performance Are Key Differentiators As traditional approaches to endpoint security prove less effective, behavioral protection and suite automation have become key differentiators in today’s market. Buyers
    [Show full text]
  • ISG Provider Lens™ Quadrant Report | August 2021 Section Name About This Report
    Cybersecurity - A research report Solutions & Services comparing provider strengths, challenges U.S. 2021 and competitive differentiators Quadrant Report Customized report courtesy of: August 2021 ISG Provider Lens™ Quadrant Report | August 2021 Section Name About this Report Information Services Group Inc. is solely responsible for the content of this report. ISG Provider Lens™ delivers leading-edge and actionable research studies, reports Unless otherwise cited, all content, including illustrations, research, conclusions, and consulting services focused on technology and service providers’ strengths and assertions and positions contained in this report were developed by, and are the sole weaknesses and how they are positioned relative to their peers in the market. These property of Information Services Group Inc. reports provide influential insights accessed by our large pool of advisors who are actively advising outsourcing deals as well as large numbers of ISG enterprise clients The research and analysis presented in this report includes research from the ISG who are potential outsourcers. Provider Lens™ program, ongoing ISG Research programs, interviews with ISG advisors, briefings with services providers and analysis of publicly available market information For more information about our studies, please email [email protected], from multiple sources. The data collected for this report represents information that call +49 (0) 561-50697537, or visit ISG Provider Lens™ under ISG Provider Lens™. ISG believes to be current as of July 2021, for providers who actively participated as well as for providers who did not. ISG recognizes that many mergers and acquisitions have taken place since that time, but those changes are not reflected in this report.
    [Show full text]
  • City of Mesa, AZ Contract # 2018011-02 for Information Technology Solutions and Services With
    ATTACHMENT 5 City of Mesa, AZ Contract # 2018011-02 for Information Technology Solutions and Services with SHI International Corp. Effective: March 1, 2018 The following documents comprise the executed contract between the City of Meza, AZ and SHI International Corp, effective March 1, 2018: I. Executed Contract II. Mayor and Council Approval III. Supplier Response IV. Original RFP ~ mesa-az AGREEMENT PURSUANT TO SOLICITATION CITY OF MESA AGREEMENT NUMBER 2018011 INFORMATION TECHNOLOGY SOLUTIONS & SERVICES CITY OF MESA, Arizona ("City") Department Name City of Mesa - Purchasing Division Mailing Address P.O. Box 1466 Mesa, AZ 85211-1466 Delivery Address 20 East Main St, Suite 400 Mesa, AZ 85201 Attention Sharon Brause, CPPO, CPPB, CPCP Senior Procurement Officer E-Mail [email protected] Phone (480) 644-2815 Fax (480) 644-2655 AND SHI INTERNATIONAL CORP., ("Contractor") Mailing Address 290 Davidson Ave Somerset, NJ 08873 Remit Address PO Box 952121 Dallas, TX 75395-2121 Attention Meghan Flisakowski, Public Program Manager E-Mail [email protected] Phone 512-517-4088 Fax 732-652-6599 Website www.publicsector.shidirect.com/ Page 1 of 33 CITY OF MESA AGREEMENT PURSUANT TO SOLICITATION This Agreement pursuant to solicitation ("Agreement") is entered into this 27th day of February, 2018, by and between the City of Mesa, Arizona, an Arizona municipal corporation ("City"), and SHI INTERNATIONAL CORP, a New Jersey corporation ("Contractor"). The City and Contractor are each a "Party" to the Agreement or together are "Parties" to the Agreement. RECITALS A. The City issued solicitation number 2018011 ("Solicitation") for INFORMATION TECHNOLOGY SOLUTIONS & SERVICES, to which Contractor provided a response ("Response"); and B.
    [Show full text]
  • Cybersecurity
    Cybersecurity Sector Update – April 2021 SPECIALIST INDEPENDENT M&A AND FUNDRAISING ADVISER TO FAST-GROWING TECHNOLOGY BUSINESSES APRIL 2021 1 CYBERSECURITY FAST FACTS CYBERSECURITY FUNDRAISING AND M&A ACTIVITY REMAINS STRONG DESPITE THE CHALLENGES OF A GLOBAL PANDEMIC $8.3bn $21.9bn Invested by VCs +22% -15% Total M&A deal value -36% -6% globally in 2020 transacted in 2020 Value Volume Value Volume $3.7bn $5.5bn Invested by VCs +35% -12% Total M&A deal value -14% -21% globally in Q1 2021 transacted in Q1 2021 Value Volume Value Volume PUBLIC CYBERSECURITY STOCKS ARE TRADING AT ALL-TIME HIGHS, HELPING TO LIFT VALUATIONS IN THE PRIVATE MARKETS +118% 11x LTM rev 3x 24x LTM rev Cybersecurity index Cybersecurity index CrowdStrike stock Paid by CrowdStrike appreciation since valuation appreciation since its IPO in for acquiring Expanse 16th March 2020 June 2019 (+$28.4bn in MC) in Nov 2020 Source(s): Pitchbook (Geography: North America & Europe), Capital IQ APRIL 2021 2 CYBERSECURITY SECTOR SNAPSHOT – APRIL 2021 1 The cybersecurity sector enjoyed another year of strong deal activity ▪ $8.3bn of VC money was invested in the sector in North America and Europe across 632 deals in 2020 (+22% in value but deal count was down by -15%). The strong momentum is set to continue – in the US, cybersecurity businesses already raised $3.6bn in Q1 2021 alone ▪ 2020 was also a new record year for cybersecurity investment in the UK, infosecurity businesses raised over £821m across 73 deals ▪ M&A deal activity remained at high levels compared to a record 2019, amounting to $21.9bn (-36% in value, deal count was down by -6%) ▪ Whilst VC investors were hedging their bets in later stage deals and proven business models, corporate and PE acquirers are not afraid to pay record valuations in highly competitive auctions, e.g.
    [Show full text]
  • Security Software
    Infrastructure Software Taxonomy SOFTWARE DEVELOPMENT / DEVOPS IT OPERATIONS MANAGEMENT SECURITY Solutions that enable the Solutions that help to manage Solutions that protect software software development lifecycle, the provisioning, capacity, and systems against malicious including planning, creating, performance, and availability of attacks, unauthorized access and testing, and deploying software an organization’s IT resource use, and other external applications and systems infrastructure and internal risks Infrastructure / Application IT GRC and Service and Identity and Continuous Integration Version Test App / Database Operations Network / App / Advanced Threat SIEM / Security Lifecycle Asset Support Access / Continuous Delivery Management Management Performance Analytics Data Security Protection Analysis Management Management Management Management Monitoring Select Market Participants Select Market Participants Select Market Participants DATA MANAGEMENT CLOUD MANAGED SERVICES COLLABORATION / COMMUNICATION Solutions that manage cloud Solutions that enable groups and Solutions that integrate, cleanse, security, computing, storage, teams to communicate, share, migrate, and manage data across network operations, and coordinate, cooperate, and solve platforms to produce accurate application stacks to automate problems for the purpose of and consistent information and enhance business operations completing a task Project Business Data Quality and Database Data PaaS / aPaaS / Managed Hosting Managed Backup and Communications Agile Project
    [Show full text]
  • Ivanti Device and Application Control Version History Since V2.6
    Ivanti Device and Application Control Version History Since v2.6 Details NEW IN VERSION 5.1 Update 3 [18-Dec-2018] • File-Type Filtering for the Portable Device Class The Portable Device class now supports file-type filtering. File filters can be used to limit access to specific file types (e.g. pdf, doc, xls). Up to now, file-type filtering was only available for use with the Removable Storage Devices, Floppy Disk Drives, and DVD/CD Drives device classes. With 5.1 Update 3, file filters can also be used with the Portable Device class. This would enable customers to restrict file transfers to and from mobile phones but allow pictures to be transferred, for example. • Device Control event generated when encrypted media is unlocked Additional logging has been added in 5.1 Update 3 so that an event is generated when encrypted media (e.g. USB key) is unlocked. This log event could then be used to trigger additional actions on the endpoint, for example. • Windows Support Updates We’ve added support for Windows 10 version 1809 (OS build 17763) which was released by Microsoft on Nov 13th. Refer to the following community article for details of Windows 10 version support with Ivanti Device and Application Control https://community.ivanti.com/docs/DOC-62154. We’ve also added support for Windows Server 2019 which was released by Microsoft on Oct 2nd. • Citrix XenApp and XenDesktop Support We’ve added support for version 7.18 of Citrix XenApp and XenDesktop. Components in this Release Component Version SK version 5.1.494 SCOMC version 5.1.500 SXS version 5.1.500 DB version 5.1.500 SMC version 5.1.500 1 ISSUES RESOLVED IN VERSION 5.1 Update 3 [18-Dec-2018] Problem ID Title 51197 Endpoint UI (RTNotify) on crashes randomly with unhandled exception "phase 2 file" 53658 HES 5.0: select user filter and schedule report causes reporting to fail 64411 Card reader unusable after installing agent (Windows 10 1709).
    [Show full text]
  • Approved Agreements
    General Services Administration, IT Schedule 70 9/4/2018 Company/Manufacturer Agreements GSA Approved EULA/CSAs Listings Date Approved 45Press Privacy Policy 12-Dec-2016 45AIR Terms & Conditions 12-Dec-2016 2SMS Limited Warranty 29-Aug-2013 2SMS End User License Agreement 29-Aug-2013 A10 Networks, Inc. License Terms and Conditions 25-Jan-2018 A Better Solution (ABS) Consulting EULA 15-Dec-2014 Abbott Informatics Software License, Support, and Services Agreement 4-Dec-2015 Abeyon Service Agreement 21-Aug-2018 Ab Initio Software LLC Master License Agreement 24-Aug-2017 Acadis Envisage Technologies, LLC Readiness Suite Master Agreement 12-Oct-2017 Accela Accela Subscription Terms and Conditions 30-Jul-2014 Accela, Inc. Software License, Maintenance Terms and Conditions 16-Sep-2014 Accelerated Technology Laboratories, Inc. ATL LIMS OnDemand Software and Services Subscription Agreement 17-Jun-2016 Accelerated Technology Laboratories, Inc. Master Software & Services Agreement 2-Dec-2013 Accellion Solutions License Agreement 27-Jul-2015 Access Smart Power LogOn Administrator End User License Agreement 7-Apr-2014 ACF Technologies Master License Agreement 8-Nov-2017 Acronis End User License Agreement 4-Mar-2015 ACS Internet LLC Alaska Communications Acceptable Use Policy 17-Dec-2016 Alaska Communications End User License Agreement 17-Dec-2016 Acunetix Web Vulnerability Scanner End User License Agreement 6-Apr-2017 Alaska Communications Services Agreement Terms and Conditions 13-Dec-2016 Actionable Intelligence Technologies Software License Agreement 30-Mar-2015 Active Navigation, Inc. 14-Aug-2012 Active Navigation, Inc. End User License Agreement 14-Aug-2012 Active Navigation, Inc. Software Maintenance Agreement 14-Aug-2012 Actsoft End User License Agreement 23-Oct-2014 Adaptive Computing 22-Sep-2013 Addendum for GSA Customers for licenses to Contrast On- Premises Edition 14-Jan-2015 AdmitMac 31-Dec-2012 ADL Data Systems, Inc.
    [Show full text]
  • Software Sector Summary Report
    SOFTWARE SECTOR REPORT Q3 2020 EXECUTIVE SUMMARY Software Q3 2020 » In Q3 2020, the software sector continued to show its resiliency. M&A deal activity and overall M&A deal value witnessed a sharp rebound, and private financing activity continued at a healthy pace. Investors have shown a strong desire for software business models amidst greater cloud adoption and remote work environments, evidenced by favorable performances in public markets and heavy IPO activity with subsequent pops in share price value – Software sector performed well in Q3 with the IGV tech-software index outperforming the S&P 500 by 34.1% LTM as of Q3 2020 – Infrastructure software index grew 148.8% LTM as of Q3 2020, outperforming all other software subsegments » Q3 ’20 saw ~$18Bn in financing deal value and ~$56Bn in M&A deal value - 215 financings, 3.2% lower than Q3 ‘19 - 469 M&A transactions, 22.1% higher than Q3 ’19 » Significant M&A activity in Q3 includes acquisitions in the Security sector: Ivanti’s $930MM acquisition of MobileIron and Fastly’s $775MM acquisition of Signal Sciences » Financial software had some of the largest financing deals in Q3 ‘20 led by the $660MM financing of Robinhood and $650MM financing of Klarna; the Security sector also saw high financing volume » Overall outlook in software growth remains healthy, with most sectors seeing notable growth Select Q3 Active Investors Select Q3 Active Acquirers Notes: Sources: PitchBook, 451 Research, Capital IQ. 2 GCA OVERVIEW The GCA Software Team Sector Coverage US Team VERTICAL SOFTWARE Josh Wepman
    [Show full text]