Kaspersky Endpoint Security for Business Kaspersky
Total Page:16
File Type:pdf, Size:1020Kb
KASPERSKY ENDPOINT SECURITY FOR BUSINESS Powerful multi-layered protection against known, unknown and advanced threats, designed and built by the industry’s leading security experts. Kaspersky Endpoint Security for Business, backed by world-renowned threat intelligence, provides unequalled IT security and control. Centralized Anti-Malware File Server Endpoint Mobile Systems Mail, Web and Centralized Firewall Endpoint Mobile Security Encryption Systems ManageCentralizedCentralizedment Firewall&Firewall FirewallCentralized FileSecurity ServerEndpointEndpoint Mobile ControlsMobile Security SecurityEndpointEncryption EncryptionSecurity SystemsSystemsEncryption SystemsManagement CollaborationMail, Web and Security CentralizedCentralized Centralized FileFirewall ServerFileFirewall Server FirewallFileFirewall ServerFileFile Server ServerFileEndpoint ServerEndpoint Mobile EndpointMobile SecurityMobile SecurityMobile SecurityEncryption SecurityEncryptionEncryptionEncryptionSystemsSystems Systems ManagementManagementManagement ControlsControlsControls and MDM ManagementManagementManagement Collaboration Security ManagementManagementManagementManagement andControls MDMandControls MDM Controls Controlsand MDMandand MDM MDMand MDM ManagementManagementManagementManagement KASPERSKY ENDPOINT SECURITY FOR BUSINESS — CORE Centralized Anti-Malware ManageCentralizedCentralizedment Firewall&Firewall Firewall File ServerFile ServerEndpointEndpoint Mobile Mobile Security SecurityEncryptionEncryption SystemsSystems ManagementManagement ControlsControls and MDMand MDM ManagementManagement Best-in-class anti-malware protection — the foundation of the Kaspersky Lab security platform Kaspersky Lab’s multi-layered protection technologies are developed in-house by people passionate about security. The result, independent tests confirm, is the most powerful and effective security solution in the industry — there is no better protection for your organization. Protection from Known, Unknown Cloud-Assisted Protection — Host-based Intrusion Prevention and Advanced Threats — unique, using real-time information from System (HIPS) with Personal sophisticated technologies identify the worldwide Kaspersky Security Firewall —HIPS restricts activities and eliminate existing and emerging Network. according to the application’s trust threats. level – supported by an application- System Watcher — Provides a level Personal Firewall, which Automatic Exploit Prevention — unique file-restore function should restricts network activity. proactively targets and identifies the system be impacted. unknown and advanced threats. NOT ALL FEATURES ARE AVAILABLE ON ALL PLATFORMS. DOWNLOAD A FREE TRIAL For details: www.kaspersky.co.in/business Simply register your details at www.kaspersky.co.in/trials Kaspersky Lab India All about Internet security: Find a partner near you: Contact Us: www.kaspersky.co.in www.securelist.com www.kaspersky.co.in/partners/buyoffline [email protected] KASPERSKY ENDPOINT SECURITY FOR BUSINESS — SELECT Centralized Anti-Malware File Server Endpoint Mobile Centralized Firewall Endpoint Mobile Security Encryption Systems ManageCentralizedCentralizedment Firewall&Firewall Firewall File ServerFile ServerFileSecurity ServerEndpointEndpoint Mobile ControlsMobile Security SecurityEncryptionEncryptionSecurity SystemsSystems ManagementCentralizedCentralized FirewallFirewall File ServerFileControls ServerEndpointEndpointand MDMMobile Mobile Security SecurityEncryptionEncryptionManagementSystemsSystems ManagementManagementManagementManagement ControlsControls andControls MDMandControls MDM and MDMand MDM Management ManagementManagementManagement Powerful, granular endpoint controls combined with proactive security and management for mobile devices and data Application, web and device controls, including dynamic whitelisting supported by Kaspersky’s unique in-house laboratory, add a further dimension to deep endpoint security. Corporate and employee owned (BYOD) mobile devices are also secured, and platforms are unified to be managed, together with all protected endpoints, though the Kaspersky Security Center console. File server protection ensures that infection cannot spread to secured endpoints through stored data. ENDPOINT CONTROLS MOBILE SECURITY: Mobile Device Management (MDM) — a unified interface for Application Control with Dynamic Powerful Security for Mobile Microsoft® Exchange ActiveSync Whitelisting — using real-time file Devices — advanced, proactive and iOS MDM devices with OTA (Over reputations delivered by the Kasper- and cloud-assisted technologies The Air) policy deployment. Samsung sky Security Network, enables IT ad- combine to deliver multi-layered real- KNOX for Android™-based devices is ministrators to allow, block or regulate time mobile endpoint protection. also supported. applications, including operating a ‘Default Deny’ whitelisting scenario in Web protection, anti-spam and Self-Service Portal — allows self- a live or test environment. Application anti-phishing components further registration of employee-owned ap- Privilege Control and Vulnerability increase device security. proved devices onto the network with Scanning monitor applications and re- automatic installation of all required strict those performing suspiciously. Remote Anti-Theft — Lock, certificates and keys, and user/owner Wipe, Locate, SIM Watch, Alarm, emergency activation of anti-theft Web Control — browsing policies Mugshot and Full or Selective Wipe features, reducing the IT administrative can be created around pre-set or all prevent unauthorized access to workload. customizable categories, ensuring corporate data if a mobile device comprehensive oversight and admin- is lost or stolen. Administrator and strative efficiency. end-user enablement, together with Google Cloud Management support, Device Control — granular data poli- delivers quick activation if required. cies controlling the connection of re- movable storage and other peripheral devices can be set, scheduled and Mobile Application Management enforced, using masks for simultane- (MAM) — Controls limit the user to ous deployment to multiple devices. running whitelisted applications, pre- venting the deployment of unwanted FILE SERVER SECURITY or unknown software. ‘Application Wrapping’ isolates corporate data on Managed together with endpoint employee owned devices. Additional security through Kaspersky Security encryption or ‘Selective Wipe’ can be Center. remotely enforced. Kaspersky Endpoint Security for Business — SELECT also includes all components of the CORE tier. NOT ALL FEATURES ARE AVAILABLE ON ALL PLATFORMS. DOWNLOAD A FREE TRIAL For details: www.kaspersky.co.in/business Simply register your details at www.kaspersky.co.in/trials Kaspersky Lab India All about Internet security: Find a partner near you: Contact Us: www.kaspersky.co.in www.securelist.com www.kaspersky.co.in/partners/buyoffline [email protected] KASPERSKY ENDPOINT SECURITY FOR BUSINESS — ADVANCED Centralized Anti-Malware File Server Endpoint Mobile Systems Centralized Firewall Endpoint Mobile Security Encryption Systems ManageCentralizedCentralizedment Firewall&Firewall FirewallCentralized FileSecurity ServerEndpointEndpoint Mobile ControlsMobile Security SecurityEndpointEncryption EncryptionSecurity SystemsSystemsEncryption SystemsManagement CentralizedCentralized Centralized FileFirewall ServerFileFirewall Server FirewallFileFirewall ServerFileFile Server ServerFileEndpoint ServerEndpoint Mobile EndpointMobile SecurityMobile SecurityMobile SecurityEncryption SecurityEncryptionEncryptionEncryptionSystemsSystems Systems ManagementManagementManagement ControlsControlsControls and MDM ManagementManagementManagement ManagementManagementManagementManagement andControls MDMandControls MDM Controls Controlsand MDMandand MDM MDMand MDM ManagementManagementManagementManagement Systems management tools optimize IT efficiency and security, while integrated encryption protects sensitive data Automated patch management and OS image management, remote software distribution and SIEM integration all help to streamline administration, while hardware and software inventories and license management provide visibility and control. Integrated encryption technology adds a powerful layer of data protection. SYSTEMS MANAGEMENT Hardware and Software ENCRYPTION Inventories and Licensing Vulnerability and Patch Management — identification, Powerful Data Protection — File/ Management — automated OS and visibility and control (including Folder (FLE) and Full Disk (FDE) application vulnerability detection blocking), together with license encryption can be applied to and prioritization, combined with usage management, provides endpoints. Support for “portable the rapid automated distribution of insight into all software and mode” ensures encryption patches and updates. hardware deployed across the administration across devices environment, including removable leaving administrative domains. Operating System Deployment — devices. Software and hardware easy creation, storage and license management, guest device Flexible User Login — Pre-boot deployment of OS ‘golden’ images detection, privilege controls and authentication (PBA) for added from a central location, including access provisioning are also security includes optional ‘single UEFI support. available. sign-on’ for user transparency. 2-factor or token based Software Distribution and SIEM Integration — support for authentication is also available. Troubleshooting — remote IBM® QRadar and