0% found this document useful (0 votes)
43 views19 pages

Kaspersky Security For Business Portfolio 2015. Product Catalogue

Kaspersky Lab offers a comprehensive security portfolio for businesses, emphasizing the need for superior threat intelligence and advanced malware detection tools. Their solutions are designed to protect various IT environments seamlessly through a single platform, ensuring minimal disruption and maximum efficiency. Kaspersky's Endpoint Security for Business provides multi-layered protection and is backed by world-renowned threat intelligence, making it a leading choice for organizations facing escalating cyber threats.

Uploaded by

AIC Best
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views19 pages

Kaspersky Security For Business Portfolio 2015. Product Catalogue

Kaspersky Lab offers a comprehensive security portfolio for businesses, emphasizing the need for superior threat intelligence and advanced malware detection tools. Their solutions are designed to protect various IT environments seamlessly through a single platform, ensuring minimal disruption and maximum efficiency. Kaspersky's Endpoint Security for Business provides multi-layered protection and is backed by world-renowned threat intelligence, making it a leading choice for organizations facing escalating cyber threats.

Uploaded by

AIC Best
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

KASPERSKY SECURITY FOR

BUSINESS PORTFOLIO 2015


‘THE POWER TO PROTECT Every business, regardless of size, is at risk from malware threats. Kaspersky Lab is
in a unique position to see and discover many of these threats.

YOUR ORGANIZATION’ And the threat level is escalating. New malware targeting individuals and businesses like yours
now exceeds 325,000 unique threats– every day.

At Kaspersky Lab, we are concerned about these threats and the risk they pose to your
business — that’s why we are advising organizations like yours to ensure that their IT security
strategy meets three key criteria:

• First, you need access to superior threat intelligence. This is a deep understanding of what
a threat looks like — how it is written and compiled. It’s important that your security system
is continuously fed by expert information and that your vendor scours malware hot zones
around the globe to see what’s coming next.

• Secondly, your security must include tools and techniques able to detect and eliminate
known, unknown and advanced malware. At the same time, your security software should
minimize the burden on your systems and maintain fast scanning times, so your business
is not disrupted.

• Thirdly, because business IT environments have become increasingly complex, this


technology needs to extend its reach across physical, mobile and virtual endpoints,
seamlessly and efficiently through a single platform, with no software conflicts, multiple
consoles or security gaps.

Only Kaspersky can offer the world-leading threat intelligence your company needs, and the
technology to put it to work, built into a unique comprehensive security platform.

Kaspersky solutions are designed with the flexibility to align with your business objectives.
This means we are always on standby to protect your organization against threats to your
physical and virtual endpoints, your mobile devices. your mail systems, servers, gateways,
and SharePoint portals. Contact us or your IT reseller today about any of the products,
solutions and services in this document. Let us show you how we can work together
to protect your business from cyber-threats.

3
SECURITY INTELLIGENCE SECURITY WITH
IS IN OUR DNA A DIFFERENCE

Expertise from the top down Kaspersky Lab delivers the most powerful anti-malware on the market
by harnessing the world-leading security intelligence that is built into our DNA and
influences everything we do – and how we do it.

• We’re a technology-driven company – from top to bottom – starting with our CEO, Eugene
Leading global threat intelligence, Kaspersky.
including the GREAT team
• Our Global Research & Analysis Team (GReAT), an elite group of IT security experts, have
been the first to uncover many of the world’s most dangerous malware threats and target-
ed attacks.
Respected among top security
organizations • M
 any of the world’s most respected security organizations and law enforcement agencies
have actively sought our assistance.

• S
 ince Kaspersky Lab develops and perfects all of its own core technologies in-house, our
products are naturally more stable and more efficient.

Technology driven • E
 ach year Kaspersky Lab participates in more independent tests than any other vendor –
and we come top in a much higher percentage of tests than any other vendor!

• T he most widely respected industry analysts – including Gartner, Inc, Forrester Research
and International Data Corporation (IDC) – rate us as a Leader within many key IT security
categories
Recognised as leaders
• O
 ver 130 OEMs – including Microsoft®, Cisco® Meraki, Juniper Networks, Alcatel Lucent
in independent tests and more – use our technologies within their own products and services.

That’s what makes the difference!


Leading the discovery of the
most complicated threats

See and predict security


incidents with Kaspersky
Security Network

4 5
ABOUT OUR ANTI-MALWARE
TECHNOLOGY

IT security software is only as effective as the security engine at its core. Patch CLOUD-ASSISTED MALWARE HOST-BASED INTRUSION
DETECTION — KASPERSKY PREVENTION SYSTEM (HIPS) AND
management, MDM, encryption, device controls, anti-phishing — all these technologies SECURITY NETWORK (KSN) PERSONAL FIREWALL INDUSTRY-LEADING
and many more provide additional, valuable layers of security. Organizations should not A real-time response to new and Some program activities are PROTECTION —
compromise on security against known, unknown and advanced threats. unknown malware threats. A sufficiently high risk to make AN INDEPENDENTLY
constant flow of new data about restriction advisable, even though PROVEN FACT
attempted malware attacks and they may not be confirmed as
Kaspersky Lab’s security engine is continuously powered and enhanced by our unmatched, suspicious behavior, provided malicious. Kaspersky Labs’
dynamic threat intelligence. It’s our single focus on security, combined with our threat intelligence by over 60 million volunteer Host-based Intrusion Prevention During 2014
and global experience, that sets us apart. Kaspersky Lab software users, System (HIPS) restricts activities Kaspersky Lab
is used to help create instant file within the system according to the products participated
The industry-leading performance of the anti-malware engine built into the Kaspersky Endpoint verdicts, allowing all customers to application’s trust level — with
benefit from real-time protection the help of an application-level
in 93 independent
Security for Business platform is proven through multiple, ongoing independent tests. Your own with lower ‘false positives’. Personal Firewall, which restricts tests and reviews.
due diligence will confirm that Kaspersky security is unmatched. network activity. Our products received
AUTOMATIC EXPLOIT PREVENTION 66 top-three finishes,
Here’s what makes anti-malware protection from Kaspersky Lab so powerful, and so much more Automatic Exploit Prevention NETWORK ATTACK BLOCKER equal to a 71% TOP3
effective than the rest. specifically targets malware that Monitors suspicious activity on score, and achieved
exploits software vulnerabilities in your network — and lets you
popular applications by recognizing pre-define how your systems will
first place 51 times —
KEY PRODUCT FEATURES HIGHLIGHTS back into our security solutions, typical or suspicious behavior respond if any suspicious behavior in well over half of
designed to evolve constantly in an patterns. The technology then is detected. all tests.
• Known, Unknown and Advanced A MULTI-LAYERED APPROACH ever-transforming IT world. halts the exploit in its tracks, and
Threat Detection Kaspersky Lab’s multi-layered prevents any downloaded malicious FREQUENT UPDATES
No product or solution
approach is one reason why we are code from executing. Updates protecting against new by any of our leading
• Behavioral Analysis & Heuristics able to provide the most effective FEATURES competitors comes
malware threats are delivered
security in the marketplace ENCRYPTION RANSOMWARE to your security database through even close.
• Kaspersky Security Network for today. Because Kaspersky Lab HEURISTIC SECURITY —
Cloud-Assisted Protection COUNTER-MEASURES the fastest update cycle in the
technologies are developed in- REDUCING THE LOAD ON System Watcher saves copies of industry, together with continuously
house, layer upon layer of powerful, YOUR SYSTEMS important files in temporary storage, updating data about newly
• Active Disinfection
streamlined protection is able to Pattern-based malware identification in case a suspicious process discovered malware from
• Encryption and Ransomware work seamlessly together with provides improved detection — attempts to access them. Should the Kaspersky Security Network
Defense minimal impact on performance. delivering smaller update files as well ransomware attempt to encrypt the (KSN) cloud.
as increased security. originals, these files can be restored
• Automatic Exploit Prevention Each layer of protection in their unencrypted state.
addresses cyber-threats from a BEHAVIORAL ANALYSIS
• HIPS & Personal Firewall different perspective, allowing Kaspersky anti-malware includes ACTIVE DISINFECTION
IT professionals to implement two specific components for Uses different techniques for
• Network Attack Blocker tightly interlocking technologies, program activity analysis: ‘curing’ any detected infection —
providing security that is both preventing file and process
• Simple, Transparent
deep and wide. • Emulator — reproduces and execution including autostart,
Management Console
verifies the program’s intended destroying malware, and ‘rolling
WORLD-LEADING THREAT activities. back’ stored files to their
INTELLIGENCE — YOUR original condition.
ASSURANCE OF ONGOING • System Watcher — tracks the
PROTECTION activities of programs already
Kaspersky Lab’s Global threat running, discerning and analyzing
intelligence is world-renowned, behavior patterns characteristic
and that expertise is fed directly of malware.

6 7
SECURITY PRODUCTS, SOLUTIONS ABOUT KASPERSKY ENDPOINT
AND SERVICES FOR BUSINESS SECURITY FOR BUSINESS

Kaspersky Harnessing the expertise of the world’s best threat intelligence Kaspersky Endpoint Security for Business offers a complete security solution, designed
Endpoint Security ecosystem, Kaspersky Endpoint Security for Business provides by the world’s leading security experts. The deepest, most forward-looking protection,
for Business a tiered security approach based on a single integrated platform efficient performance and straightforward management build through progressive tiers
incorporating features including robust application, device and web
to fully secure your business.
control tools, data encryption, mobile endpoint security and MDM,
and systems and patch management.
All components have been designed and built in-house to mesh together into a single
Everything is managed from one central console — Kaspersky security platform geared to your business needs. The result is a stable, integrated solution
Security Center. with no gaps, no compatibility issues and no additional workload as your security builds.
Kaspersky Total Security for Business adds mail, web and
Administrators can see, control and protect their IT environment with Kaspersky Endpoint Security
collaboration server security, safeguarding your perimeters and
for Business. Tools and technologies are uniquely balanced across progressive tiers to meet your
securing your complete enterprise IT environment.
evolving security and IT needs. Kaspersky can make your job easier.

Kaspersky Standalone solutions allowing Kaspersky Lab security to be applied


Targeted Solutions to specific areas of your IT system. Collaboration Mail Web

Total
Some solutions, like Kaspersky Security for Mobile, are also License Control Inventories Sofware Distribution

Advanced

Kaspersky Security Center


available as part of Kaspersky Endpoint Security for Business.
OS Deployment Patch Management Vulnerability Assessment
Others, like Kaspersky Security for Virtualization, are available purely
as targeted solutions. Data Protection (Encryption)

All are built on the same leading edge technologies and threat Mobile Endpoint Security Mobile Device/Apps Management

Select
intelligence, and all physical, mobile and virtual endpoint security File Server Security
solutions are managed centrally through Kaspersky Security Center.
Application Control Device Control Web Control

Core
Kaspersky Security Leveraging Kaspersky’s threat intelligence, technical expertise, Anti-Malware
Intelligence Services data and training skills to boost the security of your brand, your Endpoint Management Infrastructure
and Enterprise Solutions organisation and your employees
Enterprise Solutions address security issues for specific industries Kaspersky boasts a comprehensive list of technologies — all working together from the same
and infrastructures, and specific forms of attack like Distributed codebase and further assisted by the cloud-based Kaspersky Security Network — to give our
Denial of Service (DDoS). customers the world-class protection they need.

In short, we’ve delivered the industry’s first Security Platform, built from the ground up, making it
KASPERSKY SMALL easy for the administrator to see, control and protect your world.
World-class protection made easy for very small businesses.
OFFICE SECURITY

MAINTENANCE AND
A range of support options for your Kaspersky security solution.
SERVICE AGREEMENTS

8 9
KASPERSKY ENDPOINT SECURITY KASPERSKY ENDPOINT SECURITY
FOR BUSINESS FOR BUSINESS — SELECT

Powerful multi-layered protection against known, unknown and advanced threats,


designed and built by the industry’s leading security experts. Kaspersky Endpoint
Security for Business, backed by world-renowned threat intelligence, provides
Centralized Anti-Malware File Server Endpoint Mobile
unequalled IT security and control. Management
Management
Centralized & Firewall
Centralized
Centralized
Management
Firewall
ManagementManagement
Firewall
Firewall
Centralized
Centralized
Management
FileFirewall
Server File Server
Security
FileFirewall
Server Endpoint EndpointControls
Endpoint
File Server
Controls
Mobile
Controls and
Mobile
Mobile
Security
Endpoint
Endpoint
FileControls
Server
MDM
and and
Security
Security
MDM Mobile
Mobile
MDM and MDM
Controls
Encryption
Security
Encryption
Encryption Systems
Security
Security
Systems
Systems
Encryption
Encryption
and MDMManagement
Management
Management
Systems
Systems
Management
Controls Management

Powerful, granular endpoint controls combined with proactive security and


management for mobile devices and data
Application, web and device controls, including dynamic whitelisting supported by Kaspersky’s
Centralized Anti-Malware File Server Endpoint Mobile Systems Mail, Web and
ManagementCentralized & Firewall
Centralized
Centralized
Management
Firewall Firewall
Firewall
Centralized
Centralized
Centralized FileFirewall
Server File Server
Security
FileFirewall
Centralized Server Endpoint
Firewall
Firewall
File
EndpointControls
Endpoint
File
Server
Mobile
Server
FileControls
ServerFile
Mobile
Mobile
Security Security
Security
Endpoint
Endpoint
Endpoint
Server Mobile
and MDM
Encryption
Security
Encryption
Encryption
Mobile
Mobile
Security
Endpoint Systems
Security
Security
Systems
Encryption Systems
Systems
Encryption
Encryption
Mobile Security
Management
SystemsSystems
Encryption
Encryption
Management Systems
Mail, Web and
Collaboration Security unique in-house laboratory, add a further dimension to deep endpoint security. Corporate and
Management
Management Management Controls
Controls and MDM
and MDM
Controls Management
Management Management Collaboration Security
andand MDM
Management
Management Management Controls
Controls and MDM
Controls MDM and MDM Management
Management Management
employee owned (BYOD) mobile devices are also secured, and platforms are unified to be managed,
together with all protected endpoints, though the Kaspersky Security Center console. File server
protection ensures that infection cannot spread to secured endpoints through stored data.

KASPERSKY ENDPOINT SECURITY ENDPOINT CONTROLS FILE SERVER SECURITY Mobile Application Management
(MAM) — Controls limit the user to

FOR BUSINESS — CORE


Application Control with Dynamic Managed together with endpoint running whitelisted applications, pre-
Whitelisting — using real-time file security through Kaspersky Security venting the deployment of unwanted
reputations delivered by the Kasper- Center. or unknown software. ‘Application
sky Security Network, enables IT ad- Wrapping’ isolates corporate data on
ministrators to allow, block or regulate employee owned devices. Additional
applications, including operating a MOBILE SECURITY: encryption or ‘Selective Wipe’ can be
‘Default Deny’ whitelisting scenario in remotely enforced.
a live or test environment. Application Powerful Security for Mobile
Privilege Control and Vulnerability Devices — advanced, proactive Mobile Device Management
Scanning monitor applications and re- and cloud-assisted technologies (MDM) — a unified interface for
Centralized Anti-Malware strict those performing suspiciously. combine to deliver multi-layered real- Microsoft® Exchange ActiveSync
Management
Centralized
Centralized &Firewall
Firewall File Server
Firewall File ServerEndpoint
EndpointMobile
Mobile
Security
Security Encryption Systems
Encryption Systems
Management
Management Controls
Controls and MDM
and MDM Management
Management time mobile endpoint protection. and iOS MDM devices with OTA (Over
Web Control — browsing policies The Air) policy deployment. Samsung
Best-in-class anti-malware protection — the foundation of the Kaspersky Lab can be created around pre-set or Web protection, anti-spam and KNOX for Android™-based devices is
customizable categories, ensuring anti-phishing components further also supported.
security platform comprehensive oversight and admin- increase device security.
strative efficiency. Self-Service Portal — allows self-reg-
Kaspersky Lab’s multi-layered protection technologies are developed in-house by people passionate Remote Anti-Theft — Lock, istration of employee-owned approved
about security. The result, independent tests confirm, is the most powerful and effective security Device Control — granular data pol- Wipe, Locate, SIM Watch, Alarm, devices onto the network with automat-
solution in the industry — there is no better protection for your organization. icies controlling the connection of re- Mugshot and Full or Selective Wipe ic installation of all required certificates
movable storage and other peripheral all prevent unauthorized access to and keys, and user/owner emergency
devices can be set, scheduled and corporate data if a mobile device activation of anti-theft features, reduc-
Protection from Known, Unknown Cloud-Assisted Protection — Host-based Intrusion Prevention
enforced, using masks for simultane- is lost or stolen. Administrator and ing the IT administrative workload.
and Advanced Threats — unique, using real-time information from System (HIPS) with Personal
ous deployment to multiple devices. end-user enablement, together with
sophisticated technologies identify the worldwide Kaspersky Security Firewall —HIPS restricts activities
Google Cloud Management support,
and eliminate existing and emerging Network. according to the application’s trust
delivers quick activation if required.
threats. level – supported by an application-
System Watcher — Provides a level Personal Firewall, which
Automatic Exploit Prevention — unique file-restore function should restricts network activity.
proactively targets and identifies the system be impacted. Kaspersky Endpoint Security for Business — SELECT also includes all components of the
unknown and advanced threats. CORE tier.

10 11
KASPERSKY ENDPOINT SECURITY KASPERSKY TOTAL SECURITY
FOR BUSINESS — ADVANCED FOR BUSINESS

Centralized Anti-Malware File Server Endpoint Mobile Systems Centralized Anti-Malware File Server Endpoint Mobile Systems Mail, Web and
ManagementCentralized & Firewall
Centralized
Centralized Firewall File Server
Security
Endpoint EndpointControls
Endpoint Mobile Security Encryption
Security Systems Systems
Encryption Systems
Systems Management ManagementCentralized & Firewall
Centralized
Centralized Firewall File Server
Security
Endpoint EndpointControls
Endpoint Mobile Security Encryption
Security Systems Systems
Encryption Systems
Systems Management Mail, Web and
Collaboration Security
Firewall
Firewall
Centralized
Centralized
Centralized FileFirewall
Server
FileFirewall
Centralized Server
Firewall
Firewall FileMobile
Mobile
Server
FileControls
Server Security
EndpointSecurity
Encryption
Endpoint
Endpoint Encryption
Mobile
Mobile
Mobile Security
Security
Security
Endpoint Encryption
Encryption
Mobile Security SystemsSystems
Encryption
Encryption Systems Firewall
Firewall
Centralized
Centralized
Centralized FileFirewall
Server
FileFirewall
Centralized Server
Firewall
Firewall FileMobile
Mobile
Server
FileControls
Server Security
Security
Endpoint
Endpoint Encryption
Endpoint Encryption
Mobile
Mobile
Mobile Security
Security
Security
Endpoint Encryption
Encryption
Mobile Security SystemsSystems
Encryption
Encryption Systems
Management File Server File Server
and MDM Management Management File Server File Server
and MDM Management Collaboration Security
Management
ManagementManagement Management
Management Management Controls
Controls and MDM
and MDM
Controls
Controls
Controls andand
and MDM
Controls MDM Management
MDM ManagementManagement Management
Management
Management Management
ManagementManagement Management
Management Management Controls
Controls and MDM
and MDM
Controls
Controls
Controls andand
and MDM
Controls MDM Management
MDM ManagementManagement Management
Management
Management
and MDM and MDM

Systems management tools optimize IT efficiency and security, while integrated Organizations who demand comprehensive security for their entire IT
encryption protects sensitive data environment choose Kaspersky Total Security for Business
Automated patch management and OS image management, remote software distribution and Kaspersky Total Security for Business delivers the most complete platform of protection and
SIEM integration all help to streamline administration, while hardware and software inventories management offered in the industry today. Kaspersky Total Security for Business secures every
and license management provide visibility and control. Integrated encryption technology adds a layer of your network and includes powerful configuration tools to ensure your users are productive
powerful layer of data protection. and free from the threat of malware, regardless of device or location.

SYSTEMS MANAGEMENT Hardware and Software ENCRYPTION MAIL SERVER SECURITY SECURITY FOR INTERNET COLLABORATION SECURITY
Inventories and Licensing GATEWAYS
Vulnerability and Patch Management — identification, Powerful Data Protection — File/ Effectively prevents email based Defends SharePoint® servers
Management — automated OS and visibility and control (including Folder (FLE) and Full Disk (FDE) malware threats, phishing attacks Ensures secure Internet access and farms against all forms of
application vulnerability detection blocking), together with license encryption can be applied to and spam using cloud-based, across the organization by malware. DLP functionality for
and prioritization, combined with usage management, provides endpoints. Support for “portable real-time updates for exceptional automatically removing malicious Sharepoint, available separately,
the rapid automated distribution of insight into all software and mode” ensures encryption capture rates and minimal false and potentially hostile programs provides content and file filtering
patches and updates. hardware deployed across the administration across devices positives. Anti-malware protection in HTTP(S) / FTP / SMTP and capabilities identify confidential
environment, including removable leaving administrative domains. for IBM® Domino ® is also included. POP3 traffic. data and protect against data
Operating System Deployment — devices. Software and hardware DLP functionality for Microsoft leakage.
easy creation, storage and license management, guest device Flexible User Login — Pre-boot Exchange is available separately.
deployment of OS ‘golden’ images detection, privilege controls and authentication (PBA) for added
from a central location, including access provisioning are also security includes optional ‘single
UEFI support. available. sign-on’ for user transparency.
2-factor or token based
Software Distribution and SIEM Integration — support for authentication is also available.
Troubleshooting — remote IBM® QRadar and HP ArcSight
software deployment and SIEM systems. Integrated Policy Creation —
application and OS update available Unique integration of encryption
on-demand or scheduled, including Role Based Access Control with application and device
Wake-on-LAN support. Time-saving (RBAC) — Administrative controls provides an additional
remote troubleshooting and efficient responsibilities can be assigned layer of enhanced security and
software distribution is supported across complex networks, with administrative ease
through Multicast technology. console views customized according
to assigned roles and rights

Kaspersky Endpoint Security for Business — ADVANCED also includes all components of the Kaspersky Total Security for Business also includes all components of the ADVANCED, SELECT
SELECT and CORE tiers. and CORE tiers.

12 13
PRODUCT FEATURES KASPERSKY SECURITY
Which solution is right for you? FOR FILE SERVER

Managed Available in
Kaspersky Security for File Server provides cost-effective, reliable, scalable security for
by Security a Targeted shared file storage with no discernable impact on system performance.
Core Select Advanced Total Center Solution
HIGHLIGHTS FEATURES • Centralized installation,
Anti-Malware • • • • • management and updates with
POWERFUL ANTI-MALWARE • Real-time anti-malware flexible configuration options.
Firewall • • • • • PROTECTION protection for file servers
Kaspersky’s award-winning anti- running the latest versions of • Flexible incident response
Application Control • • • • malware engine provides powerful Windows ® (including Windows scenarios.
server protection, blocking even Server ® 2012/R2), Linux® and
Device Control • • • • the latest known and potential FreeBSD (both including Samba). • Comprehensive reports on
malware threats from entering network protection status.
Web Control • • • • the local network via malicious or • Citrix and Microsoft® terminal
dangerous programs. server protection. • Application status notification
File Server Security • • • • • system.
HIGH PERFORMANCE AND • Fully supports cluster servers.
Mobile Endpoint Protection • • • • • RELIABILITY • Support for Hierarchical
You can be confident that • Scalability — supporting and Storage Management (HSM)
Mobile Device/ Apps Management • • • • • Kaspersky Security for File Server securing even the most complex systems.
will not noticeably slow your system heterogeneous infrastructures
Encryption • • • down or interfere with business with ease. • Proven Hyper-V and Xen
operations under heavy network Desktop support.
Vulnerability Assessment • • • • load conditions. • Reliability, stability and high
fault tolerance. • V Mware Ready.
Patch Management • • • • MULTIPLE PLATFORM SUPPORT
A single, effective security solution • O ptimized, intelligent scan • Support for ReFS.
Inventories • • • • for heterogeneous server networks, technology including on-demand
supporting the latest platforms and scanning of critical system
and servers including terminal, areas.
License Control • • • •
cluster and virtual servers, with no
compatibility issues. • Trusted zones help increase
Software Distribution • • • • security performance while
POWERFUL MANAGEMENT reducing resource levels needed
Operating Systems Deployment • • • • AND REPORTING for scanning.
Effective, user-friendly
Collaboration Server Security • • management tools, information • Q uarantine and back-up of data
about server protection status, prior to disinfection or deletion.
Mail Server Security • • • flexible time settings for scans
and an extensive reporting system • I solation of infected
Internet Gateway Security • • provide efficient control of file workstations.
server security, all helping reduce
Virtual Infrastucture Security • • the cost of ownership.
Storage Server Security • •
Kaspersky Security for File Server is included in Kaspersky Endpoint Security for Business —
SELECT and ADVANCED, as well as Kaspersky Total Security for Business. It is also available to
• Included • Partially included — see product pages for details purchase separately as a Targeted Solution.

14 15
ABOUT OUR ENDPOINT CONTROLS
TECHNOLOGY

Powerful endpoint control tools, tightly integrated with cutting-edge anti-malware and Dynamic Whitelisting, which may WEB CONTROLS DEVICE CONTROLS
be enabled via comprehensive Monitor, filter and control the web Disabling a USB port doesn’t
the industry’s only dedicated Whitelisting laboratory helps protect your business from ‘Default Deny’ blocks all sites that end users can access always solve your removable device
today’s dynamic threat environment. applications attempting to run on in the workplace, increasing problems. For example, a disabled
any workstation, unless explicitly productivity while protecting against USB port impacts on other security
allowed by administrators. web-based malware and attacks. measures, such as token-based
PROTECT, ENFORCE, CONTROL application behavior and prevent • Application vulnerability
Kaspersky Lab is the only security VPN access.
•V
 ulnerabilities in trusted them from executing unexpected scanning: Proactive defense
company with a dedicated Kaspersky Lab’s advanced web
applications, web-based actions that could endanger the against attacks targeted
Whitelisting laboratory, maintaining controls are built on a constantly Kaspersky Lab’s device controls
malware and lack of control over endpoint or network. Simplified, at vulnerabilities in trusted
a constantly monitored and updated directory of web sites, enable a more granular level of
peripheral devices form part of customizable or automated policy applications.
updated database of more than grouped into categories (e.g. adult, control at bus, type and device
an increasingly complex threat creation and enforcement enable:
500 million programs. games, social networks, gambling,). level – maintaining end user
landscape. Kaspersky Lab’s Most control solutions offer
Administrators can easily create productivity while optimizing
Application, Web and Device • Application start-up control: only basic blocking/access
Kaspersky Lab’s Default Deny can policies to prohibit, limit or audit security. Controls can be applied
Control tools enable complete Grant, block, audit application functionality. Kaspersky Lab’s
be applied in a test environment, end user use of any individual sites right down to the specific serial
control over your endpoints without launches. Drive productivity control tools are unique in their
enabling administrators to or categories of site, as well as number of the device.
compromising on productivity. by restricting access to non- use of cloud-based whitelisting
establish application legitimacy create their own lists. Malicious
business-related applications. databases, enabling near-
before blocking. In addition, sites are automatically blocked. • S et connect/read/write
APPLICATION CONTROL AND real-time access to the latest
application categories based on permissions for devices, as well
DYNAMIC WHITELISITING • Application privilege control: application data.
digital signatures can be created, By restricting their use, as time scheduling.
Protect systems from known Regulate and control application
preventing users from starting Kaspersky Lab’s web controls
and unknown threats by giving access to system resources and Kaspersky Lab’s application
legitimate software that’s been help prevent data loss via social • Create device control rules based
administrators total control over data. Classify applications as control technologies use
modified by malware or comes from networks and instant messaging on masks, eliminating the need
the applications and programs trusted, untrusted or restricted. cloud-based whitelisting
a suspicious source. services. Flexible policies enable to physically connect devices in
allowed to run on endpoints, Manage application access to databases to analyse and
administrators to allow browsing at order to whitelist them. Whitelist
regardless of end user behavior. encrypted data on endpoints, monitor applications at every
EASY ADMINISTRATION certain times of the day. Integration multiple devices simultaneously.
In addition, enable application such as information posted via stage: download, installation,
All Kaspersky Lab control tools with Active Directory means
integrity monitoring to evaluate web browsers or Skype. execution.
integrate with Active Directory, so policies can be applied across the • C ontrol data exchange via
setting blanket policies is simple organization quickly and easily. removable devices inside
and fast. All endpoint controls are and outside the organization,
managed from the same console, For added security, Kaspersky reducing the risk of data loss or
through a single interface. Lab’s web controls are enabled theft.
directly at the endpoint, meaning
Application Application Vulnerability policies are enforced even when • Integrate with Kaspersky Lab’s
Startup Control Privilege Control Monitor the user is not on the network. encryption technologies, to
enforce encryption policies on
specific device types.

Heuristic Analysis

Local Whitelisting
CLOUD Whitelisting

Endpoint Controls technology is included in Kaspersky Endpoint Security for Business — SELECT
and ADVANCED, and in Kaspersky Total Security for Business.

16 17
KASPERSKY SECURITY
FOR MOBILE

Mobile devices are increasingly attractive to cybercriminals. Meanwhile, ‘Bring Your WEB CONTROL/SAFE BROWSER CONTAINERIZATION MOBILE DEVICE MANAGEMENT
Supported by Kaspersky Security Separate business and personal (MDM)
Own Device’ (BYOD) is contributing to an increasingly complex mix of devices, creating Network (KSN), these technologies data by ‘wrapping’ applications Support for Microsoft ® Exchange
a challenging management and control environment for IT administrators. work in real time to block access into containers. Additional policies, ActiveSync, Apple MDM and
to malicious and unauthorized such as encryption, can be applied Samsung KNOX 2.0 – enables a
web sites. A Safe Browser to protect sensitive data. Selective wide range of policies, through a
Kaspersky Security for Mobile ensures your device is safe, no matter where it is. Protect delivers constantly updated wipe enables the deletion of unified interface, regardless of the
against constantly evolving mobile malware. Quickly and easily gain visibility and control reputation analysis, ensuring safe containerized data on a device platform. E.g. Enforce encryption
mobile browsing. when an employee leaves, without and passwords or control camera
over the smartphones and tablets in your environment, from one central location and impacting on their personal data. use, applying policies to individual
with minimal disruption. APPLICATION CONTROL users or groups, managing APN/
Integrated with KSN, Application ANTI-THEFT VPN settings etc
Controls restrict application use to Remote Anti-Theft features
KEY PRODUCT FEATURES HIGHLIGHTS Security for Mobile a proactive approved software only, prohibiting including wipe, device lock, locate, SELF-SERVICE PORTAL
mobile protection solution, rather use of grey or unauthorized SIM watch, ‘mugshot’ and ‘alarm’ Delegate routine security
• Powerful Anti-Malware ADVANCED ANTI-MALWARE than one that simply attempts to software. Make device functionality device detection can be activated management to employees, enable
FOR MOBILE DEVICE AND DATA isolate a device and its data. dependent on installation of in the event of device loss or self-registration of approved devices.
• Anti-Phishing and Anti-Spam SECURITY required applications. Application theft. Depending on the case, During new device enablement
IIn 2014 alone, Kaspersky Lab CENTRALIZED MANAGEMENT inactivity control enable admins the anti-theft commands can be process, all required certificates can
• Web protection dealt with almost 1.4 million unique Manage multiple platforms and to require user re-login if an applied in a very flexible way. For be delivered automatically through
mobile malware attacks . Kaspersky devices from the same console application is idle for a defined example, integration with Google the portal, no need for administrator
• Application Control
Security for Mobile combines as other endpoints — increase period of time. This protects data Cloud Messaging (GCM) allows involvement. In case of the device
• Rooting/jailbreak detection anti-malware with deep layers of visibility and control without even if an application is open when delivering the commands almost loss, the employee can perform all
protection technologies, guarding additional effort or technology the device is lost or stolen. immediately, increasing reaction available Anti-Theft actions through
• Containerization against known and unknown threats to manage. times and improving security, while the Portal.
to data stored on mobile devices. ROOTING/JAILBREAK DETECTION sending commands through the
• Anti-Theft Automatic detection and reporting Self-Service Portal doesn’t require CENTRALIZED MANAGEMENT
MOBILE DEVICE MOBILE SECURITY AND of rooting or jailbreaking can be actions from administrator. Manage all mobile devices
• Mobile Device Management MANAGEMENT (MDM) MANAGEMENT FEATURES followed with automatic blocking centrally, from a single console,
Integration with all leading mobile of access to containers, selective which also allows managing IT
• S elf-Service Portal device management platforms POWERFUL ANTI-MALWARE wiping or entire device wipe. security for all other endpoints.
enables remote ‘Over the Air’ Signature-based, proactive and Web Console allows administrators
• Centralized management
(OTA) deployment and control for cloud-assisted (via Kaspersky control and manage devices
• Web Console easier usability and management Security Network — KSN) remotely, from any computer.
of Android, iOS and Windows protection from known and
• Supported platforms: Phone devices. unknown mobile malware threats.
- Android™ On-demand and scheduled scans
- iOS MOBILE APPLICATION combine with automatic updates to
- Windows® Phone MANAGEMENT (MAM) increase protection.
Containerization and selective wipe
capabilities enable separation of ANTI-PHISHING AND ANTI-SPAM
business and personal data on the Powerful Anti-Phishing and Anti-
same device — supporting BYOD Spam technologies protect the
initiatives. Combined with our device and its data from phishing
encryption functionality and anti- attacks and help filter out
malware, this makes Kaspersky unwanted calls and texts.
Kaspersky Security for Mobile is included in Kaspersky Endpoint Security for Business — SELECT
and ADVANCED, as well as Kaspersky Total Security for Business. It is also available to purchase
separately as a Targeted Solution.

18 19
ABOUT OUR ENCRYPTION
TECHNOLOGY

Prevent unauthorized data access caused by device loss, theft or data-stealing ENCRYPTION FEATURES ROLE BASED ACCESS CONTROL EMERGENCY RECOVERY
In larger organizations, Administrators can decrypt data in
malware. SEAMLESS INTEGRATION WITH choose to delegate encryption the event of hardware or software
KASPERSKY LAB SECURITY management using role based failure. User password recovery
Proactive data protection and compliance is a global imperative. Kaspersky Lab’s TECHNOLOGIES access control functionality. This for PBA or encrypted data access
Complete integration with enables less complex encryption is implemented via a simple
encryption technology protects valuable data from accidental loss, device theft and Kaspersky Lab’s anti-malware, management. challenge/response mechanism.
targeted malware attacks. Combining strong encryption technology with Kaspersky endpoint controls and management
technologies for true multi-layered PRE-BOOT AUTHENTICATION (PBA) OPTIMIZED DEPLOYMENT,
Lab’s industry-leading endpoint protection technologies, our integrated platform security built on a common code User credentials are required before CUSTOMIZABLE SETTINGS
protects data at rest and in motion. base. For example, a single policy the operating system even boots, For ease of deployment, Kaspersky
could enforce encryption on providing an additional layer of Lab’s encryption functionality is
specific removable devices. Apply security, with optional single sign- enabled only within the ‘Advanced’
Because it’s from Kaspersky Lab, it’s easy to deploy and administer from a centralized encryption settings under the same on. Kaspersky Lab’s encryption and ‘Total’ tiers of Kaspersky
management console, using a single policy. policy as anti-malware, device technology PBA is also available Endpoint Security for Business,
control and other endpoint security for non-QWERTY keyboard layouts. no need for separate installation.
elements. No need to deploy Encryption settings are pre-
and manage separate solutions. SMARTCARD AND TOKEN defined but can be customized
Prevent data loss and unauthorized Network hardware compatibility AUTHENTICATION for common folders such as My
information access with Kaspersky is automatically checked before Supports Two Factor Authentication Documents, Desktop, new folders,
Lab’s Encryption Technology: Deployment, Management encryption is deployed; support via popular makes of smartcards file extensions and groups, such
• Full Disk Encryption (FDE) and Policy Enforcement
for UEFI and GPT platforms is and tokens, eliminating the need as Microsoft ® Office documents
• File/Folder Level (FLE) standard. for additional usernames and or message archives.
• Removable and Internal Devices passwords and enhancing end user
experience.
ADMINISTERED THROUGH A
SINGLE MANAGEMENT CONSOLE

INDUSTRY STANDARD SECURE installed — facilitating secure ‘off user productivity. Single sign-on
CRYPTOGRAPHY perimeter’ data exchange. ensures seamless encryption —
Kaspersky Lab uses Advanced the end user may not even be
Encryption Standard (AES) with 256 SINGLE SIGN-ON, END USER aware the technology is running.
bit key length with simplified key TRANSPARENCY
management and escrow. Supports From set up to daily use, Kaspersky Kaspersky Lab’s encryption
Intel® AES-NI technology, UEFI and Lab’s encryption technology enables seamless, transparent file
GPT platforms. works transparently across all transfer between users inside and
applications, without impeding end outside the network.
COMPLETE FLEXIBILITY
Kaspersky Lab offers file and folder
level encryption (FLE) and full
disk encryption (FDE), covering all Inside the Network Outside the Network

possible use scenarios. Data may


be protected on both hard drives
and removable devices. ‘Portable
mode’ enables the use and transfer
of data on encrypted removable
media, even on computers Encyption technology is included in Kaspersky Endpoint Security for Business — ADVANCED, and
where encryption software is not in Kaspersky Total Security for Business.

20 21
KASPERSKY SYSTEMS
MANAGEMENT

Enhance security, reduce complexity with centralized IT management tools. about patch installation status. FLEXIBLE OPERATING SYSTEM SIEM INTEGRATION
Non-critical fixes can be postponed AND APPLICATION PROVISIONING Report directly and effect event
until after hours, even if computers Centralized, easy creation, storage, transfers into leading SIEM
Unpatched vulnerabilities in popular applications are one of the biggest threats to are switched off, using Wake- cloning and deployment of optimally systems — IBM® QRadar and HP
business IT security. This risk is compounded by increasing IT complexity — if you don’t on-LAN. Multicast broadcasting secured system images. After hours ArcSight. Collect logs and other
enables local distribution of patches deployment via Wake-on-LAN with security-related data for analysis,
know what you’ve got, how can you secure it? and updates to remote offices, post installation editing for greater minimizing administrator workload
reducing bandwidth requirements. flexibility. UEFI support. and tools, while simplifying
By centralizing and automating essential security, configuration and management enterprise-level reporting.
HARDWARE AND SOFTWARE SOFTWARE DISTRIBUTION
tasks, such as vulnerability assessment, patch and update distribution, inventory INVENTORIES Deploy/update remotely, from a ROLE-BASED ACCESS CONTROL
management and application rollouts, IT administrators not only save time, but Automatic discovery, inventory, single console. Over 100 popular Distinguish administrative roles
optimize security. notification and tracking of applications, identified via and responsibilities in complex
hardware and software, including Kaspersky Security Network can be networks. Customize console view
removable devices, provides automatically installed, after hours according to role and rights.
Kaspersky Systems Management helps minimize IT security risks and cut through administrators with detailed insight if desired. Full support for remote
IT complexity, giving managers complete, real-time control and visibility over multiple into devices and assets used on the troubleshooting, with enhanced CENTRALIZED MANAGEMENT
corporate network. Guest devices security via user permissions and One integrated administration
devices, applications and users, from a single screen. can be detected and provided with session logs/audits. Save on traffic console, Kaspersky Security Center,
Internet access. License control to remote offices with Multicast supports the administration of
KEY PRODUCT FEATURES ENHANCE SECURITY MANAGE CENTRALLY provides visibility into number of technology for local software system security for desktop, mobile
Increase IT security and reduce Kaspersky Lab’s Systems nodes and expiry date. distribution. and virtual endpoint, across the
• Vulnerability Assessment and routine task loads with timely, Management is a managed network, through a single interface.
Patch Management automated patching and updates. component of the Kaspersky
Automated vulnerability discovery Security Center. Each feature is
• Hardware and software and prioritization supports greater accessed and managed through this
inventories efficiency and reduces resource central console, using consistent,
burden. Independent tests1 show intuitive commands and interfaces
• Remote software installation that Kaspersky Lab delivers the to automate routine IT tasks.
and troubleshooting, including most comprehensive automated
remote office coverage patch and update coverage in the
fastest time. FEATURES
• Operating systems deployment
CONTROL WITH FULL VISIBILITY VULNERABILITY ASSESSMENT
• SIEM integration Total network visibility from a single AND PATCH MANAGEMENT
console eliminates administrator Automated software scanning
• Role-based access control guesswork and provides awareness enables rapid vulnerability
of every application and device detection, prioritization and
• Centralized management (including guest devices) entering remediation. Patches and updates
the network. This drives centralized can be delivered automatically,
control of user and device access in the shortest timeframes2, for
to organizational data and Microsoft® and non-Microsoft
applications, in line with IT policies. software. Administrator is notified

Kaspersky Systems Management is included in Kaspersky Endpoint Security for Business —


ADVANCED, and in Kaspersky Total Security for Business, and is also available to purchase
1, 2 P
 atch Management Solutions Test commissioned by Kaspersky Lab and performed by AV-TEST GmBH (July 2013) separately as a Targeted Solution.

22 23
KASPERSKY SECURITY KASPERSKY SECURITY
FOR MAIL SERVER FOR INTERNET GATEWAY

Kaspersky Security for Mail Server provides outstanding protection for traffic Kaspersky Security for Internet Gateway is a world-class anti-malware solution that
running through mail servers from spam, phishing and both generic and advanced ensures safe always-on Internet access for your entire workforce.
malware threats, even in the most complex heterogeneous infrastructures.
HIGHLIGHTS FEATURES FEATURES SPECIFIC TO
Protection against confidential data loss through emails and attachments is also MICROSOFT® FOREFRONT® TMG
provided for Microsoft® Exchange Server Environments. POWERFUL PROTECTION • Always-on, proactive AND ISA SERVERS:
REDUCES DOWNTIME AND protection from emerging and
DISRUPTION known malware threats. • Real-time monitoring of
HIGHLIGHTS business-specific glossaries, help (including personal details and Kaspersky Labs’ award-winning application status.
identify suspicious emails which payment card data), glossaries anti-malware engine blocks the • Outstanding malware
PROTECTION FROM MALWARE can then can be blocked. The and deep level analysis using latest known and potential malware detection rates combined with • S canning of VPN connections.
THREATS system can even alert the sender’s structured data. threats from entering the local minimal false positives.
Powerful protection from malware Line Manager to the potential data network via malicious or dangerous • Real-time scanning of HTTPS
is provided by Kaspersky’s award- security breach. • Real-time cloud-assisted anti- programs. • O ptimized, intelligent scanning traffic (TMG only).
winning anti-malware engine, spam scanning of all messages technology.
supported in real time by the SIMPLE, FLEXIBLE on Microsoft ® Exchange servers, PERFORMANCE EFFICIENCY • Email traffic protection (via POP3
cloud-assisted Kaspersky Security ADMINISTRATION including public folders, using THROUGH OPTIMIZATION • Real-time scanning of HTTP, and SMTP protocols).
Network, together with proactive User-friendly management and Kaspersky Security Network. Optimized, intelligent scanning HTTPS and FTP traffic from
exploit protection, and malicious reporting tools and flexible scan technology and load balancing published servers. • Backup storage (TMG only).
URL filtering. settings give you efficient control •O
 n-schedule scanning of emails reduce the load on resources,
of your mail and document security, and Lotus Domino databases. helping to preserve valuable • Protection for Squid, the most
ANTI-SPAM PROTECTION helping to reduce the total cost bandwidth without compromising popular Linux proxy server.
For Microsoft Exchange and Linux®- of ownership. • S canning of messages, on security performance.
based mail servers, Kaspersky’s databases and other objects on • Convenient tools for installation,
cloud-assisted anti-spam engine has IBM® Domino ® servers. MULTIPLE PLATFORM SUPPORT management and updates.
been proven to block up to 99.96% FEATURES Support for the latest platforms
of time- and resource-wasting spam, • Message filtering by recognized and servers, including proxy • Flexible scanning tools and
with minimal false positives. •R
 eal-time anti-malware protection attachment format, size and name. servers, ideal for heavy network incident response scenarios.
supported by the cloud-assisted traffic volumes in heterogeneous
DATA LOSS PROTECTION Kaspersky Security Network. • Easy and convenient anti- environments. Microsoft® Forefront® • Load balancing of server
AND CONTROL (MICROSOFT malware and anti-spam database TMG support extends to corporate processors.
EXCHANGE SERVERS)* • Immediate protection against update process. mail as well as web gateway
By identifying the inclusion of unknown exploits and even zero- protection. • Scalability and fault tolerance.
business, financial, personal and day vulnerabilities. • Backup storage of data prior to
other sensitive data in outgoing disinfection or deletion. STRAIGHTFORWARD • Comprehensive reporting on
emails and attachments on • Advanced protection against MANAGEMENT AND REPORTING network protection status.
Microsoft Exchange servers, spam — Kaspersky Lab’s anti- • S calability and fault tolerance. Simple, user-friendly management
and controlling the flow of this spam engine blocks more than tools, flexible scan settings and
information, Kaspersky Security 99% of unwanted email traffic. • Easy installation and flexible protection status reporting systems.
for Mail Servers keeps your and integrated administration.
your employees’ confidential data • Data Leakage Protection
secure, and in compliance with data (Microsoft Exchange Servers)*. • Powerful notification system.
protection legislation. Sophisticated Detection of confidential
analytical techniques, including information in emails and • C omprehensive reports on Kaspersky Security for Mail Server and Kaspersky Security for Internet Gateway are included in
structured data searches and attachments, through categories network protection status.
Kaspersky Total Security for Business, and are also available to purchase separately as Targeted
*When purchasing this product, the option to prevent confidential data loss or leakage is sold separately. Solutions.

24 25
KASPERSKY SECURITY KASPERSKY SECURITY
FOR COLLABORATION FOR STORAGE

Data protection and control for collaboration platforms, including SharePoint farms. High-Performance Protection for EMC, NetApp, Hitachi and IBM® Storages.

HIGHLIGHTS • Integration with Kaspersky in, regularly updated thematic HIGHLIGHTS intelligence, provides proactive (DAS) protection also helps promote
Security Network — providing dictionaries and against protection against emerging and the use of low cost storage solutions.
FULLY SECURING YOUR real-time cloud-assisted protection customized dictionaries. POWERFUL, REAL-TIME ANTI- potential threats using smart
SHAREPOINT PLATFORM against even zero-day threats. • Structured data search — if infor- MALWARE PROTECTION technologies for enhanced detection. SUPPORT FOR ALL MAIN
Powerful protection against known, mation presented in specific struc- ‘Always-on’ proactive protection for PROTOCOLS
unknown and advanced threats SUPPORTS YOUR ORGANIZATION’S tures is found in a message, it will be network attached storage (NAS) solu- AUTOMATIC UPDATES Kaspersky Security for Storage
is provided through the cloud- COMMUNICATION POLICIES treated as potentially confidential, tions. Kaspersky’s powerful anti-mal- Anti-malware databases update supports the main protocols utilised
supported Kaspersky Security •F ile filtering — helps enforce doc- ensuring control over sensitive data, ware engine scans every file launched automatically with no disruption by different storage systems: CAVA
Network, while anti-phishing ument storage policies and reduce such as customer databases, held in or modified for all forms of malware to scanning, ensuring continuous agent, RPC and ICAP.
technology protects against web- the demands placed on storage de- complex arrays. including viruses, worms and Trojans. protection, and minimizing
based threats to collaborative data. vices. By analyzing real file formats, Advanced heuristic analysis identifies administrator workload. VIRTUAL SYSTEMS AND TERMINAL
regardless of the extension name, FLEXIBLE MANAGEMENT even new and unknown threats. SERVER PROTECTION
PREVENTING CONFIDENTIAL the application ensures that users • Ease of management — an EXEMPTED PROCESSES AND Flexible security includes protection
DATA LEAKAGE* cannot use a banned file type in entire server farm can be centrally OPTIMIZED PERFORMANCE TRUSTED ZONES for virtual (guest) operating systems
Using pre-installed or custom diction- violation of the security policy. managed from a single console. High performance scanning, featuring Scan performance can be fine-tuned in Hyper-V and VMware virtual
aries and data categories, Kaspersky • Protection for wikis/blogs — An intuitive interface includes optimized scan technology and flexible by created ‘trusted zones’ which, environments, and for Microsoft®
Security for Collaboration checks protects all SharePoint repositories, all the most commonly used exemption settings, delivers maximum together with defined file formats and and Citrix terminal infrastructures.
every document placed on SharePoint including wikis and blogs. administrative scenarios. protection while minimizing the impact processes such as data backups, can
servers for sensitive information, • Content filtering — prevents the • Single dashboard — a clearly laid on the system’s performance. be exempted from scanning.
word by word and phrase by phrase. storage of files that include inap- out dashboard provides real-time ADMINISTRATION
propriate content. The content of access to the current product sta- RELIABLE AUTORUN OBJECT SCANNING
ENFORCING COMMUNICATION each file is analyzed based on key tus, database version and license Exceptional fault-tolerance is achieved For increased server protection, CENTRALIZED INSTALLATION AND
POLICIES words. Customers can also create status of all protected servers. through a straightforward architecture autorun file and operating system MANAGEMENT
Content and filtering features help their own custom dictionaries for • Backup of modified files — in the using unified components designed scans can be run to prevent Remote installation, configuration
enforce your communication policies content filtering. event of any incident, the original and built to work together flawlessly. malware from launching during and administration including
and standards, identifying and files can be restored if required, The result is a stable, resilient solution system start-up. notifications, updates and flexible
blocking inappropriate content while CONFIDENTIAL DATA LOSS and detailed back-up information which, if forced to shut down, will reporting are handled through the
preventing the wasteful storage of PREVENTION* about modified files can be used to restart automatically for reliable and FLEXIBLE SCANNING FOR intuitive Kaspersky Security Center.
inappropriate files and file formats. • Document scanning for support investigations. continuous protection. OPTIMIZED PERFORMANCE Command line management is also
confidential information. • Integration with Active Reduces scanning and configuration available if preferred.
The solution integrates modules Directory® — enables the EASY TO ADMINISTER time and promotes load balancing,
FEATURES that identify specific types of data, authentication of Active Servers are remotely installed and helping to optimize server CONTROL OVER ADMINISTRATOR
confirming that it meets relevant Directory users. protected ‘out-of-the-box’ with performance. The administrator PRIVILEGES
ANTI-MALWARE PROTECTION legal standards — for example, no reboots and are administered can specify and control the depth, Different privilege levels can be as-
• On-access scan — files are personal data (defined by regulatory together through a simple, intuitive breadth and timing of scan activity, signed to each server’s administrator,
scanned in real time, while uploading compliances, such as HIPAA or central console — Kaspersky defining which file types and areas enabling compliance with specific
or downloading. EU Directive 95/46EC) or PCI DSS Security Center — along with your must be scanned. On-demand corporate IT security policies.
• Background scan — files stored standard data (Payment Card other Kaspersky security solutions. scanning can be scheduled for
on the server are regularly checked Industry Data Security Standard). periods of low server activity. FLEXIBLE REPORTING
using the latest malware signatures. Data is scanned against built- Reporting can be delivered via
FEATURES PROTECTS HSM AND DAS graphical reports or through
SOLUTIONS reviewing Microsoft Windows ® or
Kaspersky Security for Collaboration is included in Kaspersky Total Security for Business, and is ALWAYS-ON, PROACTIVE SECURITY Supports offline scan modes for the Kaspersky Security Center’s event
Kaspersky’s industry-leading effective protection of Hierarchical logs. Search and filtering tools
also available to purchase separately as a Targeted Solution.
anti-malware scanning engine, Storage Management (HSM) provide quick access to data in
*When purchasing this product, the option to prevent confidential data loss or leakage is sold separately. built by the world experts in threat systems. Direct Attached Storage large-volume logs.

26 27
KASPERSKY SECURITY
FOR VIRTUALIZATION

Kaspersky Security for Virtualization is a flexible solution which delivers both protection FLEXIBLE LICENSING MULTIPLE PLATFORMS:
SINGLE COST
and performance for your environment. Depending on your needs,
Kaspersky Security for A single license of Kaspersky
Virtualization is available in the Security for Virtualization
LIGHT AGENT FOR ADVANCED KEY PRODUCT FEATURES following license options: includes support for virtual
PROTECTION Light Agent Security Virtual
• Deep scanning Appliance • Machine-based licensing: environments based on Citrix,
Kaspersky Security for Virtualization • Protection from • Anti-malware databases • Centralized management via – Per desktop Microsoft ® and VMware.
includes a powerful but lightweight network threats • Centralized file scanning
Kaspersky Security Center – Per server
• Controls
agent which is deployed on each • Resource-based licensing:
virtual machine. This allows for the • Centralized SVA based VM – Per core.
activation of advanced endpoint protection
security features. These include
vulnerability monitoring, application, • Advanced anti-malware SECURITY VIRTUAL Kaspersky Lab’s Security Virtual INTEGRATION WITH PLATFORM
device and web controls, antivirus APPLIANCE (SVA) Appliance (SVA) centrally scans ARCHITECTURE
protection for instant messaging, • Host-based Intrusion Prevention Kaspersky Lab provides two all VMs in the host environment. Kaspersky Security for
mail and web, plus advanced (HIPS) and firewall compelling solutions in this space, This architecture provides efficient Virtualization supports VMware,
heuristics. The result is powerful, Kaspersky Security both of which rely on a Security VM protection without sacrificing Microsoft ® Hyper-V® and Citrix
multi-layered security combined for Virtualization • Endpoint controls for Virtual Appliance. endpoint resources, eliminating Xen platforms and their core
with efficient performance. Light agent configuration applications, web access AV scanning, update ‘storms’ and technologies.
and peripherals ‘instant-on’ gaps, and generating
greater consolidation ratios.
OPTIONAL AGENTLESS Every virtual Security Virtual • Cloud-assisted security via
CONFIGURATION FOR VMWARE machine gets Appliance Kaspersky Security Network
basic anti-malware
ENVIRONMENTS protection • Anti-malware
databases
Tight integration levels with automatically
without any •C  entralized file • Network attack blocker VMware Microsoft Hyper-V Citrix Xen
VMware technologies mean additional software scanning

that Kaspersky Security for • Anti-phishing


Virtualization can also be very High availability Dynamic memory Dynamic memory control
easily deployed and managed • Anti-virus for IM, mail and vCenter integration Cluster shared volumes VM protection & recovery (VMPR)
on this platform in an agentless Internet traffic
security configuration. All security
activity is concentrated in the vMotion – host DRS Live backup Xenmotion (live migration)
• No additional installation
Security Virtual Appliance, or reboots for new VMs** Horizon view
interfacing with vShield for Live migration Multi-stream ICA
(full clones and linked clones)
instant automatic virtual machine Kaspersky Security
protection and with vCloud for for Virtualization Citrix receiver
network protection. Agentless configuration*

Personal vdisk

* Advanced security features such as file quarantine, HIPS, vulnerability scanning and endpoint controls are not available in this configuration.
** For non-persistent VMs, instant protection is available after including the light agent into the VM’s image. For persistent VMs, the administrator
must deploy the light agent manually during installation.

28 29
KASPERSKY SECURITY KASPERSKY
INTELLIGENCE SERVICES ENTERPRISE SOLUTIONS

As a CISO/senior-level security professional, it is your responsibility to protect your DDOS PROTECTION — TOTAL KASPERSKY FRAUD CRITICAL INFRASTRUCTURE
DEFENSE AND MITIGATION PREVENTION — FOR BANKS PROTECTION
organization against today’s threats, and to anticipate the dangers that lie ahead in the AND FINANCIAL INSTITUTIONS
coming years. This demands a level of strategic security intelligence that very few Taking care of every stage Securing industrial control
companies have the resources to develop in-house. necessary to defend your A comprehensive, highly tailored systems and networks
business from Distributed Denial and easy-to-use technology
of Service attacks. platform addressing fraud risks Kaspersky Endpoint Security
Kaspersky Lab is a valuable business partner, always available to share up-to-the- for online and mobile financial for Business delivers effective
Kaspersky DDoS Protection transactions. ‘industrial mode’ protection,
minute intelligence via different channels, helping your SOC/IT security team remain provides everything your business guarding ICS/SCADA endpoints from
fully equipped to protect the organization from any online threat. needs to defend against — and Kaspersky Fraud Prevention the threats and vulnerabilities that
mitigate the effects of — all types protects customers of financial form the backdoor of choice for many
of DDoS attack. This includes organizations regardless of the criminals targeting critical systems.
CYBERSECURITY EDUCATION MALWARE ANALYSIS; BOTNET THREAT TRACKING continuous analysis of all of your type of device they us to access
Kaspersky Lab’s Cybersecurity DIGITAL FORENSICS; Kaspersky Lab’s expert solution online traffic, alerting you to the these services: PC, laptop, Working with leading industrial
Education program has been INCIDENT RESPONSE tracks the activity of botnets and possible presence of an attack smartphone or tablet. The platform automation vendors such as
developed specifically for any Kaspersky Lab’s Investigation provides rapid (within 20 minutes) and then receiving your redirected also includes a bank-side software Emerson, Rockwell Automation
organization looking to promote Services can help organizations notification of threats associated traffic, cleaning your traffic and component that detects malware and Siemens, Kaspersky Lab has
the role of cybersecurity in order to formulate their defense strategies with the users of individual online returning ‘clean’ traffic to you. and automatically identifies established many specialized
better protect its infrastructure and though providing in-depth payment and banking systems. abnormal behavior patterns in procedures to ensure approval
intellectual property. threat analysis and advising on You can use this information to individual customers’ transactions. and compatibility with customer
appropriate steps toward resolution advise and inform your customers, Even if Kaspersky Fraud Prevention operational technology. This
The program covers everything from of the incident. security services providers and for Endpoints has not been enables us to guarantee
security fundamentals to advanced local law enforcement agencies installed, the Clientless Engine can effective protection for critical
digital forensics and malware Three levels of investigation are about current threats. prevent fraudulent transactions. infrastructures without impacting
analysis, helping customers offered: on operational continuity and
to improve their cybersecurity INTELLIGENCE REPORTS consistency.
knowledge in three main areas: • Malware Analysis — helping you Kaspersky Lab’s Intelligence BGP ― DDoS
Kaspersky Monitoring
Protection —
to understand the behavior and Reports gives access to up-to- Monitoring in BGP Mode.
Internet
• Fundamental knowledge of objectives of specific malware the-minute, relevant information KASPERSKY LAB
the topic files that are targeting your based on more than 80 million Kaspersky DDoS PROFESSIONAL SERVICES
organization. user statistics gathered across Protection Infrastructure Your network
• Digital Forensics and Incident 200 countries, increasing your For customers with complex
Response • Digital Forensics — providing a awareness and knowledge of the IT installations, Kaspersky
ISP
complete picture of the incident threats your organization faces. Professional Deployment and
• Malware Analysis & Reverse and how your organization is Cleaning
Center
Switch
Upgrade, Training and Health
Virtual
Engineering affected. Kaspersky Lab’s knowledge, 1
tunnels
Check services are designed to
experience and deep ensure that Kaspersky Security for
THREAT DATA FEEDS • Incident Response — a full intelligence o has made it the Border Router
Business solutions are correctly
Web Server
Kaspersky Lab’s Threat Data Feeds cycle incident investigation that trusted partner of the world’s Virtual
tunnels
SPAN
configured, deployed and managed
are designed to integrate up-to- includes an on-site visit from premier law enforcement and to deliver optimum performance.
Cleaning
the-minute security intelligence Kaspersky Lab’s experts. government agencies. You can Center
2
Statistics
KDP Sensor
into existing Security Information leverage this intelligence in your
and Event Management (SIEM) organization today.
systems, providing an additional
layer of protection.

30 31
KASPERSKY SMALL KASPERSKY MAINTENANCE
OFFICE SECURITY AND SUPPORT AGREEMENTS

World-class Protection Made Easy for Small Businesses. High-quality support for incidents, configuration issues, incompatibilities and other IT security
headaches is critical for organizations looking for peace of mind as well as optimal uptime.
For your unique challenges: a unique solution. Powerful world-class protection that’s quicker and
easier than ever to use. Kaspersky Lab’s Maintenance and Support Agreements (MSAs) offer uptime assurances
• Specially designed for businesses with 25 users or less. and continuous quality care for your organization’s IT security networks. These agreements
• Easy to install and run — no training required.
• Web console for internet-based administration from anywhere.
provide superior support in the event of unexpected incidents, from improper configuration
to malware outbreaks, contributing to the stability and efficiency of the entire organization.
NO EXPERIENCE NEEDED MULTIPLE LAYERS OF PROTECTION • Anti-phishing technologies
Kaspersky Small Office Security Kaspersky Small Office Security to protect against fake Kaspersky Lab Maintenance and Support Agreements include coverage for
is designed for even the most applies layer upon layer of and malicious websites. the following issues:
non-technical person to install protection to your PCs and Macs,
and run with ease. It’s packed servers, tablets and smartphones. • Powerful spam filtering.
with straightforward ‘wizards’ to All the security tools your growing •  nexpected global virus outbreaks
U
automatically guide you through business needs, and more, are • S ecure password management.* • Severe downtimes due to complex infrastructure
things like: included. You can trust Kaspersky • Deployment optimization & customized fixes
Small Office Security to handle • Automatic back-up of your data • Network incompatibility issues
• S etup, including removing any your IT security, leaving you free to via Dropbox to prevent lost data. • Kaspersky Lab product upgrade process
existing anti-malware run your business.
HELPS SAVE YOU MONEY
• Malware incident investigation
• S etting the controls and choosing • Cloud-assisted, real- As well as protecting against • Product installation and configuration support*
the policies that work best for you time protection from new hacker attacks aimed at stealing • Patch and other update deployment*
and your business and emerging cyber-threats. your money, Kaspersky Small
Office Security helps you keep Whenever your team requires assistance, Kaspersky Lab specialists can be available through
• Automatically downloading these • S ecures Windows ® and Mac your employees more productive dedicated priority lines in local languages, in response windows tailored to your organization’s
changes onto several computers computers, Windows servers by regulating their web access and
at once and Android™ mobile devices. setting controls on when they can
needs. The matrix below describes available support options.
surf or message. Advanced security
Everything is administered through • Award-winning ‘Safe Money’ features like encryption assure Standard Support Extended Support
a web-based dashboard so that safeguards on-line financial your customers that their data
you, or anyone else you choose, transactions from online hackers is safe in your hands, increasing MSA Starter MSA Plus MSA Business MSA Enterprise
can manage your IT security and identity thieves. your sales potential and customer
Priority Phone Line Yes Yes Yes Yes
remotely through the internet. satisfaction.
• C ontrols to let you manage Technical Account Manager No No Yes Yes, Dedicated
Kaspersky Small Office Security employee web surfing and social
Local Language Support 8x5 8x5 8x5 24x7x365
delivers outstanding security, but networking.
runs so smoothly and efficiently Severity 1 Support 8x5 8x5 24x7x365 24x7x365
in the background that you almost • Encryption to protect confidential 8 6 4 30
forget it’s there. business and customer data. Severity 1 Response Time Working Hours Working Hours Hours Minutes
Severity 2 Support 8x5 8x5 8x5 24x7x365
Professional Service No No Free Health Check&
Consultation Custom Reporting
Incident Limitation 6 12 36 Unlimited

* Effective for 32 bit applications only. Includes Android and iOS devices. * Paid options for MSA Business Not available for MSA Starter and MSA Plus.

32 33
KASPERSKY LAB
WORLDWIDE

14
29
26 16 17
9
11 18
23 30
15 7 20
19
8
27 12 10 22
13 5
25
2
28
24 3
4

Kaspersky supports local and global


businesses from offices throughout the
1
world. To find out more about how to buy
21
Kaspersky Security for Business solutions,
please contact your local reseller.

www.kaspersky.com

APAC Europe Emerging Markets Japan North America Russia and CIS

1. Australia 7. Austria 17. Latvia 25. Japan (Tokyo) 26. Canada 29. Russia
2. China 8. France 18. Poland 27. United States of America 30. Kazakhstan
3. Hong Kong 9. Germany 19. Romania (Boston)
4. India 10. Italy 20. Slovenia 28. United States of America
5. Korea 11. Netherlands 21. South Africa (Miami)
6. Malaysia 12. Portugal 22. Turkey
13. Spain 23. Ukraine
14. Norway 24. United Arab Emirates
15. Switzerland
16. United Kingdom
Twitter.com/ Facebook.com/ Youtube.com/
Kaspersky Kaspersky Kaspersky

Kaspersky Lab, Moscow, Russia All about Internet security: Find a partner near you:
www.kaspersky.com www.securelist.com www.kaspersky.com/buyoffline

© 2015 Kaspersky Lab. All rights reserved. Registered trademarks and service marks are the property of their respective owners.
Mac is a registered trademark of Apple Inc. Cisco and iOS are registered trademarks or trademark of Cisco Systems, Inc. and/
or its affiliates in the U.S. and certain other countries. IBM and Domino are trademarks of International Business Machines
Corporation, registered in many jurisdictions worldwide. Linux is the registered trademark of Linus Torvalds in the U.S. and other
countries. Microsoft, Windows, Windows Server, Forefront and Hyper-V are registered trademarks of Microsoft Corporation in the
United States and other countries. Android™ is a trademark of Google, Inc.

Catalog_SP1/Feb15/Global

You might also like