Messages

          Endpoint Security for Business - Advanced Platform

          Kaspersky lab - Endpoint Security for Business - Advanced

          Kaspersky’s Advanced tier delivers the protection and management solution your organization needs to enforce IT policy, keep users free from malware, prevent data loss, and enhance IT efficiency.

          The Protection and Management Capabilities You Need.

          Kaspersky has built powerful enterprise-class features into the progressive tiers of our off erings, but we’ve made them technology uncomplicated and simple enough for any sized business.

          Advanced Chart



          THE INDUSTRY'S ONLY TRUE SECURITY PLATFORM

          One Management Console

          From one ‘single pane of glass’, the administrator can view and manage the entire security scene — virtual machines, physical and mobile devices alike

          One Security Platform

          Kaspersky Lab developed our console, security modules and tools in-house rather than acquiring them from other companies. This means the same programmers working from the same codebase have developed technologies that talk together and work together. The result is stability, integrated policies, useful reporting and intuitive tools.

          One Cost

          All tools are from one vendor, delivered in one installation — so you don’t have to go through a new budgeting and justifi cation process to bring your security risks in line with your business objectives.


          ENCRYPTION AND DATA PROTECTION:

          Comprehensive Encryption

          Choose from full-disk or file level, backed by Advanced Encryption Standard (AES) with 256 bit encryption to secure critical business information in the event of device theft or loss.

          Support for Removable Devices

          Increases your security through policies that enforce the encryption of data on removable devices.

          Secure Date Sharing

          Means users can easily create encrypted and selfextracting packages to ensure data is protected when sharing via removable devices, email, network or web.

          Transparency for End-Users

          Kaspersky’s encryption solution is seamless and invisible to users, and has no adverse impact on productivity. No impact on application settings or updates, either.



          ENDPOINT CONTROLS:

          Application Control

          Enables IT administrators to set policies that allow, block or regulate applications (or application categories

          Device Control

          Allows users to set, schedule and enforce data policies with removable storage and other peripheral device controls — connected to USB or any other bus type.

          Web Control

          Means that endpoint-based surfing controls follow the user — whether on the corporate network or roaming

          Dynamic Whitelisting

          Real-time fi le reputations delivered by the Kaspersky Security Network ensure your approved applications are malware free and help maximize user productivity



          ENDPOINT CONTROLS:

          Superior Endpoint Anti-Malware

          Industry-proven traditional signature-based, proactive and cloud based methods for detecting malware threats

          Cloud-Assisted Protection

          The Kaspersky Security Network (KSN) provides a response to suspected threats, much faster than traditional methods of protection. KSN’s response time to a malware threat can be as little as 0.02 seconds!

          SYSTEMS CONFIGURATION AND PATCH MANAGEMENT:

          Patch Management

          Advanced in-depth scanning for vulnerabilities combined with the automated distribution of patches.

          Remote Deployment of Software

          Central deployment of software to client machines, even to branch offices.

          Network Admission Control (NAC)

          With Network Admission Control (NAC), you can create a network ‘guest’ policy. Guest devices (including mobile devices) are automatically recognized and sent to a corporate portal where the correct identifi cation password enables them to use the resources you’ve approved.

          Operating System and Application Image Deployment

          Easy creation, storage and deployment of system images from a central location. Perfect for migration to Microsoft® Windows® 8.

          Hardware, Software and License Management

          Hardware and software inventory reports help keep control over software license obligations. So you can save on costs by centrally provisioning software rights.



          MOBILE SECURITY FEATURES:

          Innovative Anti-Malware Technologies

          Combined signature-based, proactive and cloud-assisted detection results in real-time protection. A safe browser and anti-spam increase the security

          Deployment With Over The Air (OTA) Provisioning

          Preconfigure and deploy applications centrally using SMS, email and PC.

          Remote Anti-Theft Tools

          SIM-Watch, Remote Lock, Wipe and Find all prevent unauthorized access to corporate data if a mobile device is lost or stolen.

          Application Control for Mobile Devices

          Monitors applications installed on a mobile device according to the pre-defi ned group policies. Includes a “Mandatory Application” group.

          Support for Employee Owned Devices

          BYOD initiative? Corporate data and applications are isolated in encrypted containers which are transparent to the user. This data can be wiped separately




          To learn more, contact an account manager at 1-800-800-0014.
          PC Connection Clearance Center. Shop Now!

          PC Connection Interactive eCatalog


          04