The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence

Total Page:16

File Type:pdf, Size:1020Kb

The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence Yixin Zou1 Allison McDonald1 Julia Narakornpichit2 Nicola Dell2 Thomas Ristenpart2 Kevin Roundy3 Florian Schaub1 Acar Tamersoy3 1University of Michigan 2Cornell Tech 3Norton Research Group Abstract apps still have a high false-negative rate [10]. Resources for IPV professionals and survivors mostly include high-level Technology plays an increasingly salient role in facilitating advice without standardized procedures for flagging and ad- intimate partner violence (IPV). Customer support at com- dressing tech issues [27]. The Clinic to End Tech Abuse [77] puter security companies are receiving cases that involve in New York City and the Technology-Enabled Coercive Con- tech-enabled IPV but might not be well equipped to handle trol Clinic in Seattle are examples of personalized computer these cases. To assess customer support’s existing practices security assistance to IPV survivors, but these services are and identify areas for improvement, we conducted five fo- currently small and only available in specific locations [32]. cus groups with professionals who work with IPV survivors We take a different perspective by focusing on customer (n=17). IPV professionals made numerous suggestions, such support agents at computer security companies for several rea- as using trauma-informed language, avoiding promises to sons. These agents are trained to troubleshoot tech issues, and solve problems, and making referrals to resources and support prior work shows that customers turn to them for a wide range organizations. To evaluate the practicality of these sugges- of security issues beyond products [67], making them a likely tions, we conducted four focus groups with customer support point of contact for survivors experiencing tech-enabled IPV. practitioners (n=11). Support practitioners expressed interest Computer security companies offer products that can help sur- in training agents for IPV cases, but mentioned challenges vivors by catching spyware or other malicious apps, meaning in identifying potential survivors and frontline agents’ lim- that the tech help provided by support agents, when contacted ited capacity to help. We conclude with recommendations for by survivors, can be timely and impactful. Additionally, sev- computer security companies to better address tech-enabled eral large computer security companies have expressed inter- IPV through training support agents, tracking the prevalence est in supporting IPV survivors, forming the Coalition Against of these cases, and establishing partnerships with IPV advo- Stalkerware [71]. However, helping IPV survivors through cates. customer support requires extreme care and caution. Inap- propriate responses or recommendations might re-traumatize 1 Introduction survivors [50] or even escalate violence as abusers seek to regain control [25, 27, 86]. Intimate partner violence (IPV) — abuse or aggression that We investigate the opportunities and challenges for com- occurs in a romantic relationship — is a pervasive societal phe- puter security customer support to help IPV survivors via nomenon that causes physical and psychological harms to vic- three steps: tims [22]. In the United States, more than one in three women and one in four men have experienced rape, physical violence, 1. To discover if customer support agents already encounter and/or stalking by an intimate partner in their lifetime [35]. IPV cases, we searched customer support cases at a large Research shows that technology plays an increasingly salient computer security company. Our search surfaced at least role in IPV [28,53,70,85]. In particular, a growing number of 53 tech-enabled IPV cases, in which survivors described mobile apps enable abusers to surreptitiously spy on, harass the attacks’ severity and resulting distress. Support agents or impersonate their intimate partners [6, 10, 64, 79]. typically focused on technical solutions without expressing Providing technical support to survivors of technology- sufficient empathy or awareness of IPV. enabled IPV is challenging. IPV professionals such as social 2. Having established that support agents encounter tech- workers and lawyers report having insufficient technical ex- enabled IPV cases, we explore how customer support could pertise [27]. Tools for detecting spyware and other malicious better serve IPV survivors by engaging 17 IPV profession- als from five support organizations in focus groups. IPV Stalkerware [71]. Regulators are also strengthening their over- professionals provided numerous suggestions, such as us- sight on spyware, such as the US Federal Trade Commission’s ing trauma-informed language, avoiding promises to solve settlement with Retina-X in 2019 [72]. problems, and making referrals to external resources for Interventions against tech-enabled IPV. In addition to spy- support beyond the immediate technical issue. ware detection tools, prior work has proposed apps and oper- 3. To gauge the practicality of IPV professionals’ recom- ating systems that can help IPV survivors by erasing browser mendations, we conducted focus groups with 11 customer history [20, 73], recording evidence of abuse [3], or engaging support practitioners from four large computer security in safety planning [38]. However, few of them have received companies. Practitioners agreed on the importance of train- wide adoptions among IPV survivors. Support organizations ing agents for IPV cases but mentioned implementation such as NNEDV [76] and Safe Horizon [34] have provided challenges, such as frontline agents’ limited capacity and tech-focused resources for survivors, but these resources are uncertainty in identifying whether a customer may need often out of date or lack detailed guidance [27]. Computer se- IPV-related help. curity clinics are a recent approach for helping IPV survivors through one-on-one consultations with trained technologists, Through this process, we thoroughly engaged with mul- who analyze survivors’ digital assets and provide personalized tiple stakeholders and synthesized their insights into novel advice on resisting tech-enabled attacks [26, 32, 80]. Despite recommendations that both cater to the needs of IPV survivors early evidence of success, these clinics are currently limited and consider the real-world constraints of customer support. to the serving geographic locations [32] and face numerous To better address tech-enabled IPV, we recommend that com- challenges in remote operations [80]. Our focus — computer puter security companies should train support agents to be security companies’ customer support — has the potential to aware of IPV’s prevalence, the limitations of security software reach a broad audience, but this approach requires careful in curbing IPV, and when and how to provide additional help. attention to the nuances and unique risks in IPV to avoid Tracking the frequency and nature of relevant cases would unintentional harm. help companies assess their current practices and determine Customer Support. Customer support plays a crucial role areas to invest in. We further note the opportunity for com- in helping customers make purchase decisions, providing puter security companies and IPV advocates to learn from guidance on product use, and resolving problems or com- each other’s expertise and join forces to help IPV survivors plaints [7]. Reliability, assurance, tangibles, empathy, and re- combat tech-enabled abuse. sponsiveness (RATER) are key metrics in evaluating customer support’s quality [61]. Support agents need to make customers 2 Background and Related Work feel heard and respected to create a positive customer experi- ence [5]. In particular, past research highlights the importance A growing body of literature on tech-enabled IPV has doc- of training support agents in information technology to use umented the many ways abusers maliciously use technol- phrases that build rapport and show empathy [84] since they ogy [25,28,33,45,46,48,49,70,85] and how IPV survivors tend to be technical thinkers with limited soft skills. While struggle to protect their privacy and security [17,18,27,53]. these principles may apply to most, if not all customers, inter- The complex socio-technical and legal factors embedded acting with IPV survivors requires extra sensitivity and care, in the intimate relationship differentiate tech-enabled IPV as we discuss below. from abuse in other contexts such as online harassment [74], Interacting with IPV survivors. Training materials for doxxing [69], cyberstalking [25], and cyberbullying [83]. IPV professionals note the impacts of violence on IPV Malicious apps in IPV. Tech-enabled IPV often occurs survivors, such as post-traumatic stress disorder and sub- through surveillance apps installed on survivors’ devices [10, stance abuse, as well as the lengthy and challenging re- 27, 31, 47, 53]. mSpy, one of the largest spyware vendors, covery process [4, 59]. Some materials further empha- allegedly had around two million users as of 2014 [13]. In size empowerment — supporting survivors in finding their NortonLifeLock’s 2020 survey, 10% of respondents admitted inner strength [15, 41], and trauma-informed responses — using an app to monitor a former or current partner’s mes- understanding the persistent effects of trauma and providing a sages, calls, emails, or photos [78]. safe space [58,59]. Others discuss secondary trauma on IPV Most spyware apps are in fact dual-use, i.e., they have a professionals and respective
Recommended publications
  • Cost of a Cyber Incident)
    CO ST OF A CYBER INCIDENT: S YSTEMATIC REVIEW AND C ROSS-VALIDATION OCTOBER 26, 2020 1 Acknowledgements We are grateful to Dr. Allan Friedman, Dr. Lawrence Gordon, Jay Jacobs, Dr. Sasha Romanosky, Matthew Shabat, Kelly Shortridge, Steven Surdu, David Tobar, Brett Tucker and Sounil Yu for the review comments and helpful feedback on the earlier draft of the report. The authors would like to thank CISA staff for support and advice on this project. 2 Table of Contents 1. Objectives .................................................................................................................................................................... 7 2. Results in Brief .......................................................................................................................................................... 8 3. Analysis ...................................................................................................................................................................... 16 3.1. Per-Incident Cost and Loss Estimates .............................................................................................. 18 3.1.1. Cross-Validation: Primary Loss Data for Large and Small Incidents .................................. 20 3.1.2. Reconciliation of Per-Incident Cost Studies .................................................................................. 26 3.1.3. Per-Record Estimates ............................................................................................................................. 29 3.2. Aggregate
    [Show full text]
  • Checks to Avoid Malware Protect Your Laptop with Security Essentials
    What is Malware? Malware is software that can infect you computer and can be a virus or malicious software that can harm & slow your system or try to steal your personal information. To help avoid malware follow the check list below. Checks to avoid Malware Check you have updated Antivirus software installed such as Microsoft Security Essentials Install and run an Anti-Malware program such as Malwarebytes Uninstall any Peer 2 Peer software such as Limewire or Vuze Be careful with email attachments and never respond to mails asking for your password Protect your Laptop with Security Essentials Microsoft Security Essentials is a free antivirus software product for Windows Vista, 7 & 8. It pro- vides protection against different types of malware such as computer virus, spyware, rootkits, trojans & other malicious software. Download & install Security Essentials from the following link http:// www.microsoft.com/security_essentials/ Clear Infections using Malwarebytes Malware bytes is free to download & install from http://www.malwarebytes.org Once installed it is recommended that you run a Full Scan of your laptop to check for any malware that may reside on the system. Once complete, follow the on screen instructions to finish removing any threats found. You should regularly run updates and scans to ensure your system remains clean. It is also advisable to scan external storage devices such as USB keys as they can spread infections. If the above criteria are fully met, ISS staff at the service desk on the ground floor of the library are happy to investigate problems on your laptop For more information go to http://www.dcu.ie/iss ISS online service desk: https://https://iss.servicedesk.dcu.ie Follow ISS on Twitter @ISSservice .
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Kaspersky Managed Service Providers Program
    Kaspersky for Business MOBILE CONTROLS CLOUD ENDPOINT NETWORK SECURITY REPORTING VIRTUALIZATION SIEM SUPPORT SERVERS SERVICES CLOUD APPS Kaspersky Managed Service Providers Program Technical Reference Guide www.kaspersky.com #truecybersecurity Table of contents Program benefits 1 MSP program requirements 1 Products 2 Training and certification 5 Professional services 5 Technical designs 6 Kaspersky Endpoint Security Cloud 6 Kaspersky Endpoint Security for Business Select 6 Kaspersky Endpoint Security for Business Advanced 6 Kaspersky Hybrid Cloud Security 7 Kaspersky Security for Microsoft Office 365 8 Kaspersky Security for Mail Server 8 Kaspersky Security for Internet Gateways 9 Customer onboarding checklist 10 Appendix A 11 Appendix B 12 Appendix C 13 Appendix D 17 Program benefits • Flexible licensing allow you to choose between a monthly subscription and an annual license. Because you own the product license, there’s no need to spend time administrating contract renewals with customers — extending licenses is easy; no special action is required. • Increase sales revenues with volume-based discounts — the more customers you have, the less you pay. Pricing depends on the total number of devices of all customers. Sell more and gain bigger discounts. • Be even more efficient and grow your client base without having to hire additional engineers. With built-in best practices that drive operational efficiency, you’ll improve your tech-to-device ratio and boost your bottom line. Increase your scalability and protect more endpoints with fewer headaches. • Improved usability. Kaspersky Lab understands the importance of ease of use when it comes to security, and our design and usability specialists are closely involved in product development.
    [Show full text]
  • Key Benefits Core Technologies and Technical Features
    Advanced threat prevention Malwarebytes Endpoint Security is an innovative platform that delivers powerful multi- layered defense for smart endpoint protection. Malwarebytes Endpoint Security enables small and large enterprise businesses to thoroughly protect against the latest malware and advanced threats—including stopping known and unknown exploit attacks. Key Benefits Blocks zero-hour malware Easy management Reduces the chances of data exfiltration and saves Simplifies endpoint security management and identifies on IT resources by protecting against zero-hour vulnerable endpoints. Streamlines endpoint security malware that traditional security solutions can miss. deployment and maximizes IT management resources. Saves legacy systems Scalable threat prevention Protects unsupported programs by armoring Deploys protection for every endpoint and scales as vulnerabilities against exploits. your company grows. Increases productivity Detects unprotected systems Maintains end-user productivity by preserving Discovers all endpoints and installed software on your system performance and keeping staff on revenue- network. Systems without Malwarebytes that are positive projects. vulnerable to cyber attacks can be easily secured. Core Technologies and Technical Features Anti-Malware Proactive anti-malware/anti-spyware scanning Three system scan modes (Quick, Flash, Full) engine Enables selection of the most efficient system scan Detects and eliminates zero-hour and known based on endpoint security requirements and available viruses, Trojans, worms, rootkits, adware, and system resources. spyware in real time to ensure data security and network integrity. Extends its protection to Windows Server operating systems. | Santa Clara, CA | malwarebytes.com | [email protected] | 1.800.520.2796 Advanced threat prevention Malicious website blocking Advanced malware remediation Prevents access to known malicious IP addresses Employs delete-on-reboot to remove persistent or so that end users are proactively protected from deeply embedded malware.
    [Show full text]
  • Q3 Consumer Endpoint Protection Jul-Sep 2020
    HOME ANTI- MALWARE PROTECTION JUL - SEP 2020 selabs.uk [email protected] @SELabsUK www.facebook.com/selabsuk blog.selabs.uk SE Labs tested a variety of anti-malware (aka ‘anti-virus’; aka ‘endpoint security’) products from a range of well-known vendors in an effort to judge which were the most effective. Each product was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public email and web-based threats that were found to be live on the internet at the time of the test. The results indicate how effectively the products were at detecting and/or protecting against those threats in real time. 2 Home Anti-Malware Protection July - September 2020 MANAGEMENT Chief Executive Officer Simon Edwards CONTENTS Chief Operations Officer Marc Briggs Chief Human Resources Officer Magdalena Jurenko Chief Technical Officer Stefan Dumitrascu Introduction 04 TEstING TEAM Executive Summary 05 Nikki Albesa Zaynab Bawa 1. Total Accuracy Ratings 06 Thomas Bean Solandra Brewster Home Anti-Malware Protection Awards 07 Liam Fisher Gia Gorbold Joseph Pike 2. Threat Responses 08 Dave Togneri Jake Warren 3. Protection Ratings 10 Stephen Withey 4. Protection Scores 12 IT SUPPORT Danny King-Smith 5. Protection Details 13 Chris Short 6. Legitimate Software Ratings 14 PUBLICatION Sara Claridge 6.1 Interaction Ratings 15 Colin Mackleworth 6.2 Prevalence Ratings 16 Website selabs.uk Twitter @SELabsUK 6.3 Accuracy Ratings 16 Email [email protected] Facebook www.facebook.com/selabsuk 6.4 Distribution of Impact Categories 17 Blog blog.selabs.uk Phone +44 (0)203 875 5000 7.
    [Show full text]
  • Consumer Security Products Performance Benchmarks (Edition 2) Antivirus & Internet Security Windows 10
    Consumer Security Products Performance Benchmarks (Edition 2) Antivirus & Internet Security Windows 10 January 2020 Document: Consumer Security Products Performance Benchmarks (Edition 2) Authors: J. Han, D. Wren Company: PassMark Software Date: 13 January 2020 Edition: 2 File: Consumer_Security_Products_Performance_Benchmarks_2020_Ed_2.docx Consumer Security Performance Benchmarks 2019 PassMark Software Table of Contents TABLE OF CONTENTS ......................................................................................................................................... 2 REVISION HISTORY ............................................................................................................................................ 3 REFERENCES ...................................................................................................................................................... 3 EXECUTIVE SUMMARY ...................................................................................................................................... 4 OVERALL SCORE ................................................................................................................................................ 5 PRODUCTS AND VERSIONS ............................................................................................................................... 6 PERFORMANCE METRICS SUMMARY ................................................................................................................ 7 TEST RESULTS ................................................................................................................................................
    [Show full text]
  • Rethinking Security
    RETHINKING SECURITY Fighting Known, Unknown and Advanced Threats kaspersky.com/business “Merchants, he said, are either not running REAL DANGERS antivirus on the servers managing point- of-sale devices or they’re not being updated AND THE REPORTED regularly. The end result in Home Depot’s DEMISE OF ANTIVIRUS case could be the largest retail data breach in U.S. history, dwarfing even Target.” 1 Regardless of its size or industry, your business is in real danger of becoming a victim of ~ Pat Belcher of Invincea cybercrime. This fact is indisputable. Open a newspaper, log onto the Internet, watch TV news or listen to President Obama’s recent State of the Union address and you’ll hear about another widespread breach. You are not paranoid when you think that your financial data, corporate intelligence and reputation are at risk. They are and it’s getting worse. Somewhat more controversial, though, are opinions about the best methods to defend against these perils. The same news sources that deliver frightening stories about costly data breaches question whether or not anti-malware or antivirus (AV) is dead, as reported in these articles from PC World, The Wall Street Journal and Fortune magazine. Reports about the death by irrelevancy of anti-malware technology miss the point. Smart cybersecurity today must include advanced anti-malware at its core. It takes multiple layers of cutting edge technology to form the most effective line of cyberdefense. This eBook explores the features that make AV a critical component of an effective cybersecurity strategy to fight all hazards targeting businesses today — including known, unknown and advanced cyberthreats.
    [Show full text]
  • American National Finishes the Job on Malware Removal Malwarebytes Leaves No Malware Remnants Behind
    CASE STUDY American National finishes the job on malware removal Malwarebytes leaves no malware remnants behind Business profile INDUSTRY American National offers a wide range of life and property/casualty Financial services insurance products for more than 5,000 individuals, agribusiness, and commercial policyholders. Headquartered in Galveston, Texas, BUSINESS CHALLENGE American National employs 3,000 people, and is represented by Ensure that machines are completely free agents in all 50 states and Puerto Rico. When the IT team needed of malware a lightweight—but highly effective—remediation solution, it turned IT ENVIRONMENT to Malwarebytes. Cisco Advanced Malware Protection (AMP), Cylance, layered enterprise Malwarebytes Breach Remediation does security model a great job. In some cases, Cisco AMP or SOLUTION Cylance removed portions of malware but Malwarebytes Breach Remediation left remnants behind. Malwarebytes completely cleans things up. RESULTS —Fran Moniz, Network Security Architect, American National • Removed remnants of malware that other solutions missed • Simplified remediation for help Business challenge desk staff Malware is inevitable • Freed time for advanced security When Fran Moniz arrived at American National as its Network training and projects Security Architect, one of his first tasks was to streamline security platforms. He replaced McAfee and Symantec antivirus solutions with a Sophos product and augmented it with Cisco Advanced Malware Protection (AMP). A year later, he added Cylance threat prevention to the infrastructure. “Unfortunately, the antivirus solution interfered with both Cisco AMP and Cylance,” said Moniz. “When we ran them together, we experienced malware infections. I removed the antivirus and now rely on the other tools to protect us.” Cisco AMP runs on the company’s IronPort email gateways, and Moniz uses Cylance on company servers.
    [Show full text]
  • PC Pitstop Supershield 2.0
    Anti -Virus Comparative PC Matic PC Pitstop SuperShield 2.0 Language: English February 2017 Last Revision: 30 th March 2017 www.av-comparatives.org Commissioned by PC Matic - 1 - PC Pitstop – February 2017 www.av-comparatives.org Introduction This report has been commissioned by PC Matic. We found PC Matic PC Pitstop very easy to install. The wizard allows the user to change the location of the installation folder and the placing of shortcuts, but the average user only needs to click Next a few times. The program can be started as soon the setup wizard completes. A Different Approach PC Matic approaches security differently than traditional security products. PC Matic relies mainly on a white list to defeat malware; this can lead to a higher number of false alarms if users have files which are not yet on PC Matic’s whitelist. Unknown files are uploaded to PC Matic servers, where they get compared against a black- and white list (signed and unsigned). By default, PC Matic SuperShield only blocks threats and unknown files on-execution, but does not remove/quarantine them. Additional features In addition to malware protection, PC Matic also provides system maintenance and optimization features. These include checking for driver updates, outdated programs with vulnerabilities, erroneous registry entries and disk fragmentation. A single scan can be run which checks not only for malware, but also for any available system optimization opportunities. Commissioned by PC Matic - 2 - PC Pitstop – February 2017 www.av-comparatives.org Tested products The tested products have been chosen by PC Matic. We used the latest available product versions and updates available at time of testing (February 2017).
    [Show full text]
  • KSPY 9223 Cimubisa English.Indd
    MOBILE SECURITY, ENDPOINT PROTECTION AND CONTROL BILBAO, A CITY RECOGNIZED FOR ITS TECHNOLOGICAL INNOVATION, HAS ENTRUSTED KASPERSKY LAB WITH THE PROTECTION OF SERVICES PROVIDED TO CITIZENS The Bilbao City Council Municipal Computer Center (CIMUBISA) is the publicly owned company which manages all information technology services for both Public sector the council and the majority of the municipal enterprises. The Council has been recognized on numerous occasions for technological innovation, municipal and government transparency and for the online development of its local administration. • Bilbao, Basque Country (Spain) • Using Kaspersky Endpoint Security Challenge for Business Advanced Bilbao City Council provides many electronic services, with an extensive catalogue of online operations such as accessing public information, registering as a resident, enrolling on courses, workshops and activities, applying for welfare benefits, managing municipal taxes and electronic billing or reaching practically all suppliers. Through its different information management platforms which include web page, transparency, generation and electronic billing, the Council provides easier access to its services for more than 350,000 inhabitants of the city and the 900,000 people who live in the surrounding areas. It’s important that the security of the data and communications is guaranteed, protecting the system against any current or future online threats. “ The integration of MDM capabilities together with the comprehensive support and maintenance offered by their channel were key factors in the selection of Kaspersky Lab.” Manu Roibal, Director of Systems and Operations at CIMUBISA The Kaspersky Lab solution SECURITY The majority of attacks suffered by organizations originate from endpoint Protection of personal devices, so Bilbao City Council decided to find a supplier which would allow data and confidential them to easily manage the security of their equipment, both static and mobile, information through the use of a next generation endpoint security platform.
    [Show full text]
  • Collaboration with Kaspersky
    CUSTOMER CASE STUDY PROBIZNESBANK CONTINUES ITS COLLABORATION WITH KASPERSKY LAB To successfully manage all its operations and FINANCE & clearly communicate with its internal staff INSURANCE and external partners, Probiznesbank needs • Founded in 1993 to ensure all its processes are available • One of Russia’s top 100 banks around the clock. This is impossible without reliable protection for its IT infrastructure. Probiznesbank, one of Russia’s 100 largest banks, continues to use Kaspersky Lab solutions to protect its IT infrastructure. In total, over 14,000 licences have been extended for Kaspersky Endpoint Security for Business and a further 10,000 licenses for Kaspersky Endpoint Security for Mail Server. Thanks to these products, the file and mail servers at Probiznesbank’s various divisions and staff work places around the country, are reliably protected against all kinds of cyber threats, both external and internal. 14,000 KESB licenses Moscow 10,000 Security for Mail Server licenses Challenge Probiznesbank needed a solution which could ensure the data confidentiality and effectively block harmful viruses. Kaspersky Endpoint Security for Business meets all the company’s requirements and offers additional advantages, such as central management of the protection system, rapid response to incidents, and more. In addition to protecting work places, the Kaspersky solution makes it easier to control mobile devices’ access to the corporate network, ensuring reliable data protection, which is a critical factor in the financial sector. Kaspersky Security for Mail Server effectively protects the bank’s mail system from unwanted messages and viruses. The smart spam filter and optimized use of system resources mean that the load on the corporate network can be prbb.ru significantly reduced and stable operation is ensured.
    [Show full text]