Kaspersky Endpoint Security for Business Select
With multiple platforms, devices, and applications to support, it’s getting harder to protect against all the threats out there. The more tools you have to support this effort, the more time you spend on updates. This increases the cost and effort you’re devoting to managing all these different tools and creates obstacles across your organization.
The core challenge in today’s environment isn’t that there are no tools available. It’s that each individual tool adds to the complexity you face when trying to implement your security policies. With Kaspersky, you’ll get the security you need to close the gaps in your security posture while reducing the number of tools you have to work with.
Kaspersky provides a complete, fully integrated platform that gives you the world’s best anti-malware protection, robust endpoint control tools, plus systems management, encryption, and Mobile Device Management—all managed from a single console. This is not simply a collection of solutions strung together and sold as a “suite.” It’s a uniﬁed platform that makes it easy for you to see your risk across all your systems and endpoints, apply your policies consistently, and bring your security posture in line with your
Kaspersky Endpoint Security for Business SELECT
In addition to delivering Kaspersky’s award-winning anti-malware technologies, Kaspersky Endpoint Security for Business SELECT adds mobile security, file server security and flexible control technologies that help you to ensure compliance with your security policies.
Kaspersky’s ‘Select’ tier includes mobile device deployment and protection via Mobile Device Management (MDM) and mobile anti-malware. Endpoint control tools (web, device and application) help your organization enforce IT policy, keeping the essential elements of your IT environment secure.
Powerful Endpoint Anti-Malware
Kaspersky’s ‘best of breed’ scanning engine operates at multiple levels in the operating system, rooting out malware. The cloud-based Kaspersky Security Network (KSN) protects users in real time against new threats.
Flexible, Granular Control Tools
A cloud-based, categorized database of safe and unsafe applications and websites helps the administrator to set and enforce policies for applications and web surﬁng, while granular controls ensure that only speciﬁc devices can plug in to machines on the network.
Efficient Mobile Deployment and Security for Smartphones and Tablets
Agent-based mobile security is available for Android™, BlackBerry®, Symbian and Windows® Mobile devices. Mobile device policies and software can be securely deployed over the air to these and to iOS devices through Kaspersky MDM.
Tuned to ﬂag hardware and software vulnerabilities which could be exposed to an attack.
Endpoint Protection Features
Frequent Updates and Signature-Based Protection
Industry-proven traditional signature-based method for detecting malware threats.
Behavioural Analysis Performed by System Watcher
Delivers proactive protection against threats that have not yet been recorded in signature databases.
The Kaspersky Security Network (KSN) provides a response to suspected threats, much faster than traditional methods of protection. KSN’s response time to a malware threat can be as little as 0.02 seconds!
Host-Based Intrusion Prevention System (HIPS) With Personal Firewall
Pre-deﬁned rules for hundreds of the most commonly used applications reduce time spent on conﬁguring the ﬁrewall.
Enables IT administrators to set policies that allow, block or regulate applications (or application categories).
Allows users to set, schedule and enforce data policies with removable storage and other peripheral device controls — connected to USB or any other bus type.
Means that endpoint-based surﬁ ng controls follow the user — whether on the corporate network or roaming.
Real-time ﬁle reputations delivered by the Kaspersky Security Network ensure your approved applications are malware free and help maximize user productivity
Mobile Security Features
Innovative Anti-Malware Technologies
Combined signature-based, proactive and cloud-assisted detection results in real-time protection. A safe browser and anti-spam increase the security.
Deployment With Over The Air (OTA) Provisioning
The ability to pre-conﬁgure and deploy applications centrally using SMS, email and PC.
Remote Anti-Theft Tools
SIM-Watch, Remote Lock, Wipe and Find all prevent unauthorized access to corporate data if a mobile device is lost or stolen.
Application Control for Mobile Devices
Monitors applications installed on a mobile device according to the pre-deﬁ ned group policies. Includes a “Mandatory Application” group.
Support for Employee Owned Devices
Corporate data and applications are isolated in encrypted containers which are transparent to the user. This data can be wiped separately.