SlideShare una empresa de Scribd logo
1 de 26
Introducing
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
1
Business drivers and their impact on IT
Move fast, be nimble and flexible
AGILITY
66% of business owners
identify business agility as a
priority
Cut costs
Consolidate and streamline
EFFICIENCY
54% of organisations say that
their business processes
could be improved
Maximise the value of existing resources
Do more with less
PRODUCTIVITY
81% of business owners cite
operational efficiencies as
their top strategic priority
IMPACT ON IT
IT complexity: more data, more systems, more technology
Pressure on resources and budgets
2
And then, there’s the rise of malware…
1999 2001 2003 2005 2007 2009 2011
Malware files in Kaspersky Lab collection Jan 2013 >100m
New Threats Every Day 200K
Malicious programs specifically targeting mobile devices >35K
2013
3
Malware
The impact on IT security
Mobile / BYOD
Your data is on
the move!
The #1 target:
applications!
YOUR DATA
Response:
Anti-malware plus
management tool / dashboard
Response:
Systems / patch
management
Response:
Data encryption
Response:
Mobile device
management (MDM)
4
The impact on IT security
Response:
Malware Anti-malware plus
management tool / dashboard
The #1 target: Response:
applications!
Systems / patch
management
Your data is on Response:
YOUR DATA
the move! Data encryption
Response:
Mobile / BYOD
Mobile device
management (MDM)
This is complexity
COMPLEXITY IS THE ENEMY OF IT SECURITY
5
Malware
What if?
Mobile / BYOD
Your data is on
the move!
The #1 target:
applications!
1
6
PLATFORM
MANAGEMENT CONSOLE
COST
Introducing . . .
KASPERSKY
ENDPOINT SECURITY
FOR BUSINESS
7
Kaspersky Endpoint Security for Business
This single platform contains:
Anti-malware
traditional & cloud-assisted
Mobile security
MDM plus mobile security
agent
Data encryption
file / folder,
full-disk
Endpoint
control tools:
application, device
and web control
Systems
management
including patch
management
8
Endpoint
control tools:
application, device
and web control
Systems
Management
including patch
management
Kaspersky Endpoint Security for Business
All managed through a single management console:
Kaspersky Security Center
Anti-malware
traditional & cloud-assisted
9
Mobile security
MDM plus mobile security
agent
Data encryption
file / folder,
full-disk
For the first time, you can:
Physical, virtual, mobile
Identify vulnerabilities
Inventory HW and SW
Take action with clear
reporting
SEE
Configure and deploy
Set and enforce IT policies
Manage employee-owned
devices
Prioritise patches
License Management
NAC
CONTROL
Evolve beyond anti-virus
Meet security demands
Protect data and devices
anywhere
Rely on Kaspersky
expertise
PROTECT
10
Bringing two benefits together
Deeper protection + seamless manageability
ENDPOINT / INFRASTRUCTURE
Anti-malware
Endpoint control tools
Encryption
Mail and internet gateway security
Collaboration
Smartphones
Tablets
Servers
Workstations
Laptops
KASPERSKY SECURITY CENTER
Mobile Device Management (MDM)
Systems Management
Security Policy Enforcement
Kaspersky
Security Center
11
Infrastructure
Anti-malware
The foundation of the platform
12
Kaspersky Anti-malware
Technology
Multi-point scanning
Cloud-assisted
Award-winning
Kaspersky
Security Center
DATA
ENCRYPTION
MobileSecurity
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
MobileSecurity SYSTEMS CONTROL Infrastructure
MANAGEMENT TOOLS
File / folder or full-disk
Transparent to end-users
13
Data encryption
Keeping your data safe, wherever it goes
Encryption features
Integrates with device
control and application
control
DATA
ENCRYPTION
ANTI
MALWARE
Inside the Network Outside the Network
Transparent encryption
and decryption
SYSTEMS CONTROL Infrastructure
MANAGEMENT TOOLS
Mobile security
14
Mobile endpoint + MDM
Microsoft
Exchange
ActiveSync
Apple MDM
Mobile Device
Management(MDM)
EndpointAgent for
Mobile Devices
*
*
Smartphones
Tablets
iOS devices
Two components
Kaspersky
Security Center
MDM
ANTI DATA
MALWARE ENCRYPTION
MobileSecurity
*
• Android
• Windows
• Symbian
• Blackberry
Infrastructure
Mobile solution features
Via SMS, email or tether
CONFIGURE/DEPLOY
Anti-malware
Anti-phishing
Anti-spam
SECURITY
GPS find
Remote block
ANTI-THEFT
Set password
Jailbreak / Root notice
Force settings
POLICY COMPLIANCE
Containerisation
Data access restriction
APPLICATIONS
Data Encryption
Remote wipe
DATAACCESS
15
DATA
ENCRYPTION
MobileSecurity
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
SYSTEMS CONTROL Infrastructure
MANAGEMENT TOOLS
16
The perfect solution for BYOD
Kaspersky
Security Center
Keeps corporate
data separate
Encrypted
Selectively wiped
Containerisation
Corporate
Personal Private ‘App’Portal
ANTI DATA
MALWARE ENCRYPTION
MobileSecurity

App

App

App

App

App

App

App

App
CONTROL Infrastructure
TOOLS
Systems management
17
Staying up-to-date just got faster and easier
ANTI DATA
MALWARE ENCRYPTION
MobileSecurity
SYSTEMS
MANAGEMENT
VULNERABILITY
SCANNING
HW and SW inventory
Multiple vulnerability
databases
REMOTE TOOLS
Install applications
Update applications
Troubleshoot
LICENCE MANAGEMENT
Track usage
Manage renewals
Manage licence
compliance
NETWORKADMISSION
CONTROL (NAC)
Guest policy
management
Guest portal
ADVANCED PATCHING
Automated prioritisation
Reboot options
SYSTEM PROVISIONING
Create images
Store and update
Deploy
Control tools
Applications, devices and web
18
DEVICE CONTROL
WEB CONTROL
APPLICATION CONTROL
WITH DYNAMIC WHITELISTING
ANTI DATA SYSTEMS
MALWARE ENCRYPTION
MobileSecurity
MANAGEMENT
CONTROL
TOOLS
Infrastructure
Mail, Internet gateway and collaboration
Comprehensive infrastructure protection
Security
for Mail
Microsoft Exchange
Lotus Notes/Domino
Linux Mail Servers
Security
For Internet Gateways
Microsoft ISA/TMG
Squid
Firewall
Security
For Collaboration
Microsoft SharePoint
servers
DATA SYSTEMS CONTROL
ENCRYPTION
MobileSecurity
MANAGEMENT TOOLS
Infrastructure
19
Supported and powered by the Kaspersky
Security Network
Global cloud network
of millions of users
Dynamic reputation of
applications and websites
Improves performance
and reduces false positives
Tightly integrated with
protection features
KASPERSKYGLOBALUSERS
20
Kaspersky Endpoint Security for Business:
Progressive, feature-rich tiers
ANTI-MALWARE
APP, DEVICE,
WEB CONTROL
MOBILE
SECURITY
DATA
ENCRYPTION
SYSTEMS
MANAGEMENT
MAIL, WEB AND
COLLABORATION
TOTAL
ADVANCED
SELECT
CORE
21
Collaboration Mail Internet Gateway
Licence Management Network Admission (NAC) Software Installation
Kaspersky
Security
Center
System Provisioning Patch Management Vulnerability Scan
Data Encryption
Mobile Endpoint Security Mobile Device Management (MDM)
File Server Security
Application Control Device Control Web Control
Anti-malware + Firewall
In detail
Core
Select
Total
Advanced
Endpoint Management Infrastructure
Cloud-enabled via the
Kaspersky Security Network (KSN)
22
Plus: additional targeted solutions
Kaspersky Security for...
File
Servers
Systems
Management Storage Mail
Mobile Virtualization Collaboration
Internet
Gateways
23
Summary: a unique set of benefits
Deeper
protection
Unified
management
REDUCE BUSINESS RISK, WITH MAXIMUM
BUSINESS EFFICIENCY
– WITH KASPERSKY, NOW YOU CAN
SEE CONTROL PROTECT
IT
efficiency
24
Why Kaspersky for your business?
KASPERSKY INSIDE
Over 80 IT, networking security and communications vendors have
chosen to embed Kaspersky Lab anti-malware technology inside their
own solutions, including Microsoft, IBM, Checkpoint and Juniper.
AWARD-WINNING ANTI-MALWARE
BUILT, NOT BOUGHT We do not acquire technologies and then try to integrate them.
Every feature and function is built up from the same, single code base.
25
www.kaspersky.com/business
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
26

Más contenido relacionado

Similar a KASPERSKY Description, Ease of Performance and conformity Guide.pptx

Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
Ozgur Gercek
 

Similar a KASPERSKY Description, Ease of Performance and conformity Guide.pptx (20)

Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Information Security
Information SecurityInformation Security
Information Security
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdf
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 

Último

Último (20)

Novo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMsNovo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMs
 
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with GraphGraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Era
 
Navigation in flutter – how to add stack, tab, and drawer navigators to your ...
Navigation in flutter – how to add stack, tab, and drawer navigators to your ...Navigation in flutter – how to add stack, tab, and drawer navigators to your ...
Navigation in flutter – how to add stack, tab, and drawer navigators to your ...
 
Transformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksTransformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with Links
 
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
 
Your Ultimate Web Studio for Streaming Anywhere | Evmux
Your Ultimate Web Studio for Streaming Anywhere | EvmuxYour Ultimate Web Studio for Streaming Anywhere | Evmux
Your Ultimate Web Studio for Streaming Anywhere | Evmux
 
Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...
Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...
Abortion Pill Prices Germiston ](+27832195400*)[ 🏥 Women's Abortion Clinic in...
 
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptxFrom Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
 
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
 
Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?
 
From Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST APIFrom Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST API
 
Software Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements EngineeringSoftware Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements Engineering
 
BusinessGPT - Security and Governance for Generative AI
BusinessGPT  - Security and Governance for Generative AIBusinessGPT  - Security and Governance for Generative AI
BusinessGPT - Security and Governance for Generative AI
 
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
 
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
 
Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...
Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...
Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...
 
The Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationThe Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test Automation
 
Abortion Pill Prices Turfloop ](+27832195400*)[ 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Turfloop ](+27832195400*)[ 🏥 Women's Abortion Clinic in ...Abortion Pill Prices Turfloop ](+27832195400*)[ 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Turfloop ](+27832195400*)[ 🏥 Women's Abortion Clinic in ...
 

KASPERSKY Description, Ease of Performance and conformity Guide.pptx

  • 2. Business drivers and their impact on IT Move fast, be nimble and flexible AGILITY 66% of business owners identify business agility as a priority Cut costs Consolidate and streamline EFFICIENCY 54% of organisations say that their business processes could be improved Maximise the value of existing resources Do more with less PRODUCTIVITY 81% of business owners cite operational efficiencies as their top strategic priority IMPACT ON IT IT complexity: more data, more systems, more technology Pressure on resources and budgets 2
  • 3. And then, there’s the rise of malware… 1999 2001 2003 2005 2007 2009 2011 Malware files in Kaspersky Lab collection Jan 2013 >100m New Threats Every Day 200K Malicious programs specifically targeting mobile devices >35K 2013 3
  • 4. Malware The impact on IT security Mobile / BYOD Your data is on the move! The #1 target: applications! YOUR DATA Response: Anti-malware plus management tool / dashboard Response: Systems / patch management Response: Data encryption Response: Mobile device management (MDM) 4
  • 5. The impact on IT security Response: Malware Anti-malware plus management tool / dashboard The #1 target: Response: applications! Systems / patch management Your data is on Response: YOUR DATA the move! Data encryption Response: Mobile / BYOD Mobile device management (MDM) This is complexity COMPLEXITY IS THE ENEMY OF IT SECURITY 5
  • 6. Malware What if? Mobile / BYOD Your data is on the move! The #1 target: applications! 1 6 PLATFORM MANAGEMENT CONSOLE COST
  • 7. Introducing . . . KASPERSKY ENDPOINT SECURITY FOR BUSINESS 7
  • 8. Kaspersky Endpoint Security for Business This single platform contains: Anti-malware traditional & cloud-assisted Mobile security MDM plus mobile security agent Data encryption file / folder, full-disk Endpoint control tools: application, device and web control Systems management including patch management 8
  • 9. Endpoint control tools: application, device and web control Systems Management including patch management Kaspersky Endpoint Security for Business All managed through a single management console: Kaspersky Security Center Anti-malware traditional & cloud-assisted 9 Mobile security MDM plus mobile security agent Data encryption file / folder, full-disk
  • 10. For the first time, you can: Physical, virtual, mobile Identify vulnerabilities Inventory HW and SW Take action with clear reporting SEE Configure and deploy Set and enforce IT policies Manage employee-owned devices Prioritise patches License Management NAC CONTROL Evolve beyond anti-virus Meet security demands Protect data and devices anywhere Rely on Kaspersky expertise PROTECT 10
  • 11. Bringing two benefits together Deeper protection + seamless manageability ENDPOINT / INFRASTRUCTURE Anti-malware Endpoint control tools Encryption Mail and internet gateway security Collaboration Smartphones Tablets Servers Workstations Laptops KASPERSKY SECURITY CENTER Mobile Device Management (MDM) Systems Management Security Policy Enforcement Kaspersky Security Center 11
  • 12. Infrastructure Anti-malware The foundation of the platform 12 Kaspersky Anti-malware Technology Multi-point scanning Cloud-assisted Award-winning Kaspersky Security Center DATA ENCRYPTION MobileSecurity SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE
  • 13. MobileSecurity SYSTEMS CONTROL Infrastructure MANAGEMENT TOOLS File / folder or full-disk Transparent to end-users 13 Data encryption Keeping your data safe, wherever it goes Encryption features Integrates with device control and application control DATA ENCRYPTION ANTI MALWARE Inside the Network Outside the Network Transparent encryption and decryption
  • 14. SYSTEMS CONTROL Infrastructure MANAGEMENT TOOLS Mobile security 14 Mobile endpoint + MDM Microsoft Exchange ActiveSync Apple MDM Mobile Device Management(MDM) EndpointAgent for Mobile Devices * * Smartphones Tablets iOS devices Two components Kaspersky Security Center MDM ANTI DATA MALWARE ENCRYPTION MobileSecurity * • Android • Windows • Symbian • Blackberry
  • 15. Infrastructure Mobile solution features Via SMS, email or tether CONFIGURE/DEPLOY Anti-malware Anti-phishing Anti-spam SECURITY GPS find Remote block ANTI-THEFT Set password Jailbreak / Root notice Force settings POLICY COMPLIANCE Containerisation Data access restriction APPLICATIONS Data Encryption Remote wipe DATAACCESS 15 DATA ENCRYPTION MobileSecurity SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE
  • 16. SYSTEMS CONTROL Infrastructure MANAGEMENT TOOLS 16 The perfect solution for BYOD Kaspersky Security Center Keeps corporate data separate Encrypted Selectively wiped Containerisation Corporate Personal Private ‘App’Portal ANTI DATA MALWARE ENCRYPTION MobileSecurity  App  App  App  App  App  App  App  App
  • 17. CONTROL Infrastructure TOOLS Systems management 17 Staying up-to-date just got faster and easier ANTI DATA MALWARE ENCRYPTION MobileSecurity SYSTEMS MANAGEMENT VULNERABILITY SCANNING HW and SW inventory Multiple vulnerability databases REMOTE TOOLS Install applications Update applications Troubleshoot LICENCE MANAGEMENT Track usage Manage renewals Manage licence compliance NETWORKADMISSION CONTROL (NAC) Guest policy management Guest portal ADVANCED PATCHING Automated prioritisation Reboot options SYSTEM PROVISIONING Create images Store and update Deploy
  • 18. Control tools Applications, devices and web 18 DEVICE CONTROL WEB CONTROL APPLICATION CONTROL WITH DYNAMIC WHITELISTING ANTI DATA SYSTEMS MALWARE ENCRYPTION MobileSecurity MANAGEMENT CONTROL TOOLS Infrastructure
  • 19. Mail, Internet gateway and collaboration Comprehensive infrastructure protection Security for Mail Microsoft Exchange Lotus Notes/Domino Linux Mail Servers Security For Internet Gateways Microsoft ISA/TMG Squid Firewall Security For Collaboration Microsoft SharePoint servers DATA SYSTEMS CONTROL ENCRYPTION MobileSecurity MANAGEMENT TOOLS Infrastructure 19
  • 20. Supported and powered by the Kaspersky Security Network Global cloud network of millions of users Dynamic reputation of applications and websites Improves performance and reduces false positives Tightly integrated with protection features KASPERSKYGLOBALUSERS 20
  • 21. Kaspersky Endpoint Security for Business: Progressive, feature-rich tiers ANTI-MALWARE APP, DEVICE, WEB CONTROL MOBILE SECURITY DATA ENCRYPTION SYSTEMS MANAGEMENT MAIL, WEB AND COLLABORATION TOTAL ADVANCED SELECT CORE 21
  • 22. Collaboration Mail Internet Gateway Licence Management Network Admission (NAC) Software Installation Kaspersky Security Center System Provisioning Patch Management Vulnerability Scan Data Encryption Mobile Endpoint Security Mobile Device Management (MDM) File Server Security Application Control Device Control Web Control Anti-malware + Firewall In detail Core Select Total Advanced Endpoint Management Infrastructure Cloud-enabled via the Kaspersky Security Network (KSN) 22
  • 23. Plus: additional targeted solutions Kaspersky Security for... File Servers Systems Management Storage Mail Mobile Virtualization Collaboration Internet Gateways 23
  • 24. Summary: a unique set of benefits Deeper protection Unified management REDUCE BUSINESS RISK, WITH MAXIMUM BUSINESS EFFICIENCY – WITH KASPERSKY, NOW YOU CAN SEE CONTROL PROTECT IT efficiency 24
  • 25. Why Kaspersky for your business? KASPERSKY INSIDE Over 80 IT, networking security and communications vendors have chosen to embed Kaspersky Lab anti-malware technology inside their own solutions, including Microsoft, IBM, Checkpoint and Juniper. AWARD-WINNING ANTI-MALWARE BUILT, NOT BOUGHT We do not acquire technologies and then try to integrate them. Every feature and function is built up from the same, single code base. 25