Kaspersky Endpoint Security for Business Advanced combines
multi-layered security with extended control tools to deliver an
agile security solution that rapidly adapts to protect against new
threats. The security and systems management console drives
efficiency, while extra layers of defence help eliminate
vulnerabilities and further safeguard sensitive data.
Adaptive security with extended management & data protection
One management console
From the ‘single pane of glass’ management console, administrators
can view and manage the entire security landscape and apply your
chosen security policies to every endpoint in your business. This
helps deploy security rapidly and with minimum interruption or
fuss, using the wide range of preconfigured scenarios.
Agile, adaptive security
The product is designed to work within any IT environment. It
employs a full stack of proven and Next Gen technologies and
prevent detected attacks; built-in sensors and integration with
Endpoint Detection and Response (EDR) enable the capture of large
volumes of data to discover even the most obscure, sophisticated
cyberattacks.
A single product – transparent costs
With multiple security technologies built into a single product,
there are no hidden costs. One product means one license – and all
you need to protect your IT estate.
Customer satisfaction assured
Our strong focus on R&D means that our products deliver the
security you need. Decision-makers like you consistently express
outstanding levels of satisfaction with the results, as regularly
confirmed in independent surveys and reports.
Key features
Cloud-enabled endpoint controls
Unique Anomaly and Application Controls
Adaptive Anomaly Control, which automatically uplifts security
levels to the highest level appropriate to each role in the
organization, is complemented by enterprise-grade Application
Control and an always-up–to-date whitelisting database.
Host Intrusion Prevention (HIPS)
Regulates access to sensitive data and recording devices by using
local and cloud (Kaspersky Security Network) reputations databases,
without affecting the performance of authorized applications.
Device Control, Web Control and more…
Encryption and data protection
Comprehensive encryption
Your security team can centrally enforce FIPS 140.2 and Common
Criteria-certified encryption – at file, disk or device-level – and
manage native encryption tools such as Microsoft BitLocker and
macOS FileVault.
Unified, integrated policy
Unique integration of encryption with Application and Device
Controls provides an additional layer of security and
administrative ease.
Core threat protection features
Behavioral Detection and Automatic Rollback
Identifies and protects against advanced threats, including
ransomware, fileless attacks and admin account takeovers. Behavior
Detection blocks attacks, while Automatic Rollback reverses any
changes already made.
Protection against encryption for shared folders
A unique anti-cryptor mechanism is capable of blocking the
encryption of files on shared resources conducted by a malicious
process running on another machine on the same network.
Protection for containers and terminal servers
Protects Windows Server containers and a wide range of remote
access environments including Microsoft Remote Desktop Services and
Citrix XenApp/Xen Desktop. Traffic Security component provides
protection for web and mail traffic on the terminal server.
Exploit Prevention, Anti-rootkit technology and more…
Mobile Threat Defense features
Innovative anti-malware technologies
Combining ML-based, proactive and cloud-assisted detection with
real-time protection. Web protection, on-demand and scheduled scans
all increase security.
Deployment Over the Air (OTA) provisioning and more...
System, vulnerabilities and patch management
Patch management
Advanced in-depth scanning for vulnerabilities is complemented by
the automated distribution of patches.
Time-saving OS and software deployment
Create, store and deploy system images from a central location.
This is ideal for upgrade to Microsoft Windows 10, for example, or
deploying 150 popular applications identified by Kaspersky Security
Network.
Hardware, software and license management
Hardware and software inventory reports help control software
license obligations. Save on costs by centrally provisioning
software rights.
Support and Professional Services
Professional help is available whenever you need it. Operating in
more than 200 countries, from 34 offices worldwide, we have you
covered 24/7/365. Take advantage of our Premium Support packages
(MSA), or call on our Professional Services to ensure that you
derive maximum benefit and ROI from your Kaspersky Lab security
installation.
The protection and management capabilities you need
Kaspersky Lab has built powerful enterpriseclass features into the
progressive tiers of our products. We’ve made sure that the
technology is uncomplicated and flexible enough for any-sized
business to use.
Multiple protection layers for
• Windows, Linux and Mac
• Windows and Linux servers
• Windows Server containers
• Android and other mobile devices
• Removable storage
Unparalleled security against
• Software exploits
• Ransomware
• Mobile malware
• Advanced threats
• Fileless threats
• PowerShell & script-based attacks
• Web threats
Features included
• Anti-Malware (next level)
• Vulnerability Management
• Security Policy Adviser
• AI-based learning
• AMSI support (new)
• Encrypted traffic scanning (new)
• Process isolation
• Exploit Prevention and Rollback
• Firewall and OS firewall management
• Cloud-assisted protection
• Integrated EDR agent
• Adaptive Anomaly Control (new)
• Applicaiton, Web and Device Controls
• Server and containers protection (next level)
• Protection for terminal servers
• Windows Linux Subsystem support (new)
• Mobile Threat Defense (next level)
• OS encryption management
• System configuration & deployment
• Patch Management (next level)
• Reporting
Kaspersky Endpoint Advanced 10-14 Node 3 year Nová
Záruka: 24 měsíců | PN: KL4867XAKTS | Kód: 2409829 | CZ distribuce
Kaspersky Endpoint Security for Business Advanced combines multi-layered security with extended control tools to deliver an agile security solution that rapidly adapts to protect against new threats. The security and systems management console drives efficiency, while extra layers of defence help eliminate vulnerabilities and further safeguard…
Momentálně nedostupné
Popis
Technické specifikace mohou být změněny bez předchozího upozornění. Obrázky mají pouze informativní charakter.