Kaspersky's Advanced tier delivers the protection and management solution your organization needs to enforce IT policy, keep users free from malware, prevent data loss, and enhance IT efficiency.
The Protection and Management Capabilities You Need
Kaspersky has built powerful enterprise-class features into the progressive tiers of our offerings, but we’ve made the technology uncomplicated and simple enough for any sized business.
THE INDUSTRY'S ONLY TRUE SECURITY PLATFORM
One Management Console
From one ‘single pane of glass’, the administrator can view and manage the entire security scene—virtual machines, physical and mobile devices alike.
One Security Platform
Kaspersky Lab developed our console, security modules, and tools in-house rather than acquiring them from other companies. This means the same programmers working from the same codebase have developed technologies that talk together
and work together. The result is stability, integrated policies, useful reporting, and intuitive tools.
All tools are from one vendor, delivered in one installation—so you don’t have to go through a new budgeting and justification process to bring your security risks in line with your business objectives.
ENCRYPTION AND DATA PROTECTION:
Choose from full-disk or file level, backed by Advanced Encryption Standard (AES) with 256 bit encryption to
secure critical business information in the event of device theft or loss.
Support for Removable Devices
Increase your security through policies that enforce the encryption of data on removable devices.
Secure Date Sharing
Users can easily create encrypted and self-extracting packages to ensure data is protected when sharing via removable devices, email, network or Web.
Transparency for End Users
Kaspersky's encryption solution is seamless and invisible to users, and has no adverse impact on productivity—no impact on application settings or updates, either.
IT administrators are able to set policies that allow, block, or regulate applications (or application categories).
Users can set, schedule, and enforce data policies with removable storage and other peripheral device controls—connected to USB or any other bus type.
Endpoint-based surfing controls follow the user—whether on the corporate network or roaming.
Real-time file reputations delivered by the Kaspersky Security Network ensure your approved applications are
malware free and help maximize user productivity.
Superior Endpoint Anti-Malware
Industry-proven traditional signature-based, proactive and cloud based methods for detecting malware threats.
The Kaspersky Security Network (KSN) provides a response to suspected threats, much faster than traditional methods
of protection. KSN’s response time to a malware threat can be as little as 0.02 seconds!
SYSTEMS CONFIGURATION AND PATCH MANAGEMENT:
Advanced in-depth scanning for vulnerabilities combined with the automated distribution of patches.
Remote Deployment of Software
Central deployment of software to client machines, even to branch offices.
Network Admission Control (NAC)
With Network Admission Control (NAC), you can create a network ‘guest’ policy. Guest devices (including mobile
devices) are automatically recognized and sent to a corporate portal where the correct identification password
enables them to use the resources you’ve approved.
Operating System and Application Image Deployment
Easy creation, storage, and deployment of system images from a central location. Perfect for migration to Windows 8.
Hardware, Software, and License Management
Hardware and software inventory reports help keep control over software license obligations, so you can save on costs
by centrally provisioning software rights.
MOBILE SECURITY FEATURES:
Innovative Anti-Malware Technologies
Combined signature-based, proactive and cloud-assisted detection results in real-time protection. A safe browser
and anti-spam increase the security.
Deployment with Over the Air (OTA) Provisioning
Preconfigure and deploy applications centrally using SMS, email and PC.
Remote Anti-Theft Tools
SIM-Watch, Remote Lock, Wipe, and Find all prevent unauthorized access to corporate data if a mobile device is
lost or stolen.
Application Control for Mobile Devices
Monitor applications installed on a mobile device according to the pre-defined group policies. Includes a
“Mandatory Application” group.
Support for Employee Owned Devices
BYOD initiative? Corporate data and applications are isolated in encrypted containers which are transparent to
the user. This data can be wiped separately.
To learn more, contact an Account Manager at 1.800.800.0014.