Kaspersky’s Advanced tier delivers the protection and management solution your organization needs to enforce IT policy, keep users free from malware, prevent data loss, and enhance IT efficiency.
The Protection and Management Capabilities You Need.
Kaspersky has built powerful enterprise-class features into the progressive tiers of our off erings, but we’ve made them technology uncomplicated and simple enough for any sized business.
THE INDUSTRY'S ONLY TRUE SECURITY PLATFORM
One Management Console
From one ‘single pane of glass’, the administrator can view and manage the entire security scene — virtual machines, physical and mobile devices alike
One Security Platform
Kaspersky Lab developed our console, security modules and tools in-house rather than acquiring them from other companies. This means the same programmers working from the same codebase have developed technologies that talk together
and work together. The result is stability, integrated policies, useful reporting and intuitive tools.
All tools are from one vendor, delivered in one installation — so you don’t have to go through a new budgeting and justifi cation process to bring your security risks in line with your business objectives.
ENCRYPTION AND DATA PROTECTION:
Choose from full-disk or file level, backed by Advanced Encryption Standard (AES) with 256 bit encryption to
secure critical business information in the event of device theft or loss.
Support for Removable Devices
Increases your security through policies that enforce the encryption of data on removable devices.
Secure Date Sharing
Means users can easily create encrypted and selfextracting packages to ensure data is protected when sharing via removable devices, email, network or web.
Transparency for End-Users
Kaspersky’s encryption solution is seamless and invisible to users, and has no adverse impact on productivity. No
impact on application settings or updates, either.
Enables IT administrators to set policies that allow, block or regulate applications (or application categories
Allows users to set, schedule and enforce data policies with removable storage and other peripheral device controls —
connected to USB or any other bus type.
Means that endpoint-based surfing controls follow the user — whether on the corporate network or roaming
Real-time fi le reputations delivered by the Kaspersky Security Network ensure your approved applications are
malware free and help maximize user productivity
Superior Endpoint Anti-Malware
Industry-proven traditional signature-based, proactive and cloud based methods for detecting malware threats
The Kaspersky Security Network (KSN) provides a response to suspected threats, much faster than traditional methods
of protection. KSN’s response time to a malware threat can be as little as 0.02 seconds!
SYSTEMS CONFIGURATION AND PATCH MANAGEMENT:
Advanced in-depth scanning for vulnerabilities combined with the automated distribution of patches.
Remote Deployment of Software
Central deployment of software to client machines, even to branch offices.
Network Admission Control (NAC)
With Network Admission Control (NAC), you can create a network ‘guest’ policy. Guest devices (including mobile
devices) are automatically recognized and sent to a corporate portal where the correct identifi cation password
enables them to use the resources you’ve approved.
Operating System and Application Image Deployment
Easy creation, storage and deployment of system images from a central location. Perfect for migration to Microsoft®
Hardware, Software and License Management
Hardware and software inventory reports help keep control over software license obligations. So you can save on costs
by centrally provisioning software rights.
MOBILE SECURITY FEATURES:
Innovative Anti-Malware Technologies
Combined signature-based, proactive and cloud-assisted detection results in real-time protection. A safe browser
and anti-spam increase the security
Deployment With Over The Air (OTA) Provisioning
Preconfigure and deploy applications centrally using SMS, email and PC.
Remote Anti-Theft Tools
SIM-Watch, Remote Lock, Wipe and Find all prevent unauthorized access to corporate data if a mobile device is
lost or stolen.
Application Control for Mobile Devices
Monitors applications installed on a mobile device according to the pre-defi ned group policies. Includes a
“Mandatory Application” group.
Support for Employee Owned Devices
BYOD initiative? Corporate data and applications are isolated in encrypted containers which are transparent to
the user. This data can be wiped separately
To learn more, contact an account manager at 1-800-800-0014.