SlideShare una empresa de Scribd logo
1 de 26
Introducing
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
1
Business drivers and their impact on IT
Move fast, be nimble and flexible
AGILITY
66% of business owners
identify business agility as a
priority
Cut costs
Consolidate and streamline
EFFICIENCY
54% of organisations say that
their business processes
could be improved
Maximise the value of existing resources
Do more with less
PRODUCTIVITY
81% of business owners cite
operational efficiencies as
their top strategic priority
IMPACT ON IT
IT complexity: more data, more systems, more technology
Pressure on resources and budgets
2
And then, there’s the rise of malware…
1999 2001 2003 2005 2007 2009 2011
Malware files in Kaspersky Lab collection Jan 2013 >100m
New Threats Every Day 200K
Malicious programs specifically targeting mobile devices >35K
2013
3
Malware
The impact on IT security
Mobile / BYOD
Your data is on
the move!
The #1 target:
applications!
YOUR DATA
Response:
Anti-malware plus
management tool / dashboard
Response:
Systems / patch
management
Response:
Data encryption
Response:
Mobile device
management (MDM)
4
The impact on IT security
Response:
Malware Anti-malware plus
management tool / dashboard
The #1 target: Response:
applications!
Systems / patch
management
Your data is on Response:
YOUR DATA
the move! Data encryption
Response:
Mobile / BYOD
Mobile device
management (MDM)
This is complexity
COMPLEXITY IS THE ENEMY OF IT SECURITY
5
Malware
What if?
Mobile / BYOD
Your data is on
the move!
The #1 target:
applications!
1
6
PLATFORM
MANAGEMENT CONSOLE
COST
Introducing . . .
KASPERSKY
ENDPOINT SECURITY
FOR BUSINESS
7
Kaspersky Endpoint Security for Business
This single platform contains:
Anti-malware
traditional & cloud-assisted
Mobile security
MDM plus mobile security
agent
Data encryption
file / folder,
full-disk
Endpoint
control tools:
application, device
and web control
Systems
management
including patch
management
8
Endpoint
control tools:
application, device
and web control
Systems
Management
including patch
management
Kaspersky Endpoint Security for Business
All managed through a single management console:
Kaspersky Security Center
Anti-malware
traditional & cloud-assisted
9
Mobile security
MDM plus mobile security
agent
Data encryption
file / folder,
full-disk
For the first time, you can:
Physical, virtual, mobile
Identify vulnerabilities
Inventory HW and SW
Take action with clear
reporting
SEE
Configure and deploy
Set and enforce IT policies
Manage employee-owned
devices
Prioritise patches
License Management
NAC
CONTROL
Evolve beyond anti-virus
Meet security demands
Protect data and devices
anywhere
Rely on Kaspersky
expertise
PROTECT
10
Bringing two benefits together
Deeper protection + seamless manageability
ENDPOINT / INFRASTRUCTURE
Anti-malware
Endpoint control tools
Encryption
Mail and internet gateway security
Collaboration
Smartphones
Tablets
Servers
Workstations
Laptops
KASPERSKY SECURITY CENTER
Mobile Device Management (MDM)
Systems Management
Security Policy Enforcement
Kaspersky
Security Center
11
Infrastructure
Anti-malware
The foundation of the platform
12
Kaspersky Anti-malware
Technology
Multi-point scanning
Cloud-assisted
Award-winning
Kaspersky
Security Center
DATA
ENCRYPTION
MobileSecurity
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
MobileSecurity SYSTEMS CONTROL Infrastructure
MANAGEMENT TOOLS
File / folder or full-disk
Transparent to end-users
13
Data encryption
Keeping your data safe, wherever it goes
Encryption features
Integrates with device
control and application
control
DATA
ENCRYPTION
ANTI
MALWARE
Inside the Network Outside the Network
Transparent encryption
and decryption
SYSTEMS CONTROL Infrastructure
MANAGEMENT TOOLS
Mobile security
14
Mobile endpoint + MDM
Microsoft
Exchange
ActiveSync
Apple MDM
Mobile Device
Management(MDM)
EndpointAgent for
Mobile Devices
*
*
Smartphones
Tablets
iOS devices
Two components
Kaspersky
Security Center
MDM
ANTI DATA
MALWARE ENCRYPTION
MobileSecurity
*
• Android
• Windows
• Symbian
• Blackberry
Infrastructure
Mobile solution features
Via SMS, email or tether
CONFIGURE/DEPLOY
Anti-malware
Anti-phishing
Anti-spam
SECURITY
GPS find
Remote block
ANTI-THEFT
Set password
Jailbreak / Root notice
Force settings
POLICY COMPLIANCE
Containerisation
Data access restriction
APPLICATIONS
Data Encryption
Remote wipe
DATAACCESS
15
DATA
ENCRYPTION
MobileSecurity
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
SYSTEMS CONTROL Infrastructure
MANAGEMENT TOOLS
16
The perfect solution for BYOD
Kaspersky
Security Center
Keeps corporate
data separate
Encrypted
Selectively wiped
Containerisation
Corporate
Personal Private ‘App’Portal
ANTI DATA
MALWARE ENCRYPTION
MobileSecurity

App

App

App

App

App

App

App

App
CONTROL Infrastructure
TOOLS
Systems management
17
Staying up-to-date just got faster and easier
ANTI DATA
MALWARE ENCRYPTION
MobileSecurity
SYSTEMS
MANAGEMENT
VULNERABILITY
SCANNING
HW and SW inventory
Multiple vulnerability
databases
REMOTE TOOLS
Install applications
Update applications
Troubleshoot
LICENCE MANAGEMENT
Track usage
Manage renewals
Manage licence
compliance
NETWORKADMISSION
CONTROL (NAC)
Guest policy
management
Guest portal
ADVANCED PATCHING
Automated prioritisation
Reboot options
SYSTEM PROVISIONING
Create images
Store and update
Deploy
Control tools
Applications, devices and web
18
DEVICE CONTROL
WEB CONTROL
APPLICATION CONTROL
WITH DYNAMIC WHITELISTING
ANTI DATA SYSTEMS
MALWARE ENCRYPTION
MobileSecurity
MANAGEMENT
CONTROL
TOOLS
Infrastructure
Mail, Internet gateway and collaboration
Comprehensive infrastructure protection
Security
for Mail
Microsoft Exchange
Lotus Notes/Domino
Linux Mail Servers
Security
For Internet Gateways
Microsoft ISA/TMG
Squid
Firewall
Security
For Collaboration
Microsoft SharePoint
servers
DATA SYSTEMS CONTROL
ENCRYPTION
MobileSecurity
MANAGEMENT TOOLS
Infrastructure
19
Supported and powered by the Kaspersky
Security Network
Global cloud network
of millions of users
Dynamic reputation of
applications and websites
Improves performance
and reduces false positives
Tightly integrated with
protection features
KASPERSKYGLOBALUSERS
20
Kaspersky Endpoint Security for Business:
Progressive, feature-rich tiers
ANTI-MALWARE
APP, DEVICE,
WEB CONTROL
MOBILE
SECURITY
DATA
ENCRYPTION
SYSTEMS
MANAGEMENT
MAIL, WEB AND
COLLABORATION
TOTAL
ADVANCED
SELECT
CORE
21
Collaboration Mail Internet Gateway
Licence Management Network Admission (NAC) Software Installation
Kaspersky
Security
Center
System Provisioning Patch Management Vulnerability Scan
Data Encryption
Mobile Endpoint Security Mobile Device Management (MDM)
File Server Security
Application Control Device Control Web Control
Anti-malware + Firewall
In detail
Core
Select
Total
Advanced
Endpoint Management Infrastructure
Cloud-enabled via the
Kaspersky Security Network (KSN)
22
Plus: additional targeted solutions
Kaspersky Security for...
File
Servers
Systems
Management Storage Mail
Mobile Virtualization Collaboration
Internet
Gateways
23
Summary: a unique set of benefits
Deeper
protection
Unified
management
REDUCE BUSINESS RISK, WITH MAXIMUM
BUSINESS EFFICIENCY
– WITH KASPERSKY, NOW YOU CAN
SEE CONTROL PROTECT
IT
efficiency
24
Why Kaspersky for your business?
KASPERSKY INSIDE
Over 80 IT, networking security and communications vendors have
chosen to embed Kaspersky Lab anti-malware technology inside their
own solutions, including Microsoft, IBM, Checkpoint and Juniper.
AWARD-WINNING ANTI-MALWARE
BUILT, NOT BOUGHT We do not acquire technologies and then try to integrate them.
Every feature and function is built up from the same, single code base.
25
www.kaspersky.com/business
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
26

Más contenido relacionado

Similar a KASPERSKY Description, Ease of Performance and conformity Guide.pptx

Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceDean Iacovelli
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)Iftikhar Ali Iqbal
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate BrochureQualys
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDNUG e.V.
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMIftikhar Ali Iqbal
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud ServicesOzgur Gercek
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
 

Similar a KASPERSKY Description, Ease of Performance and conformity Guide.pptx (20)

Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Information Security
Information SecurityInformation Security
Information Security
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdf
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 

Último

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 

Último (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 

KASPERSKY Description, Ease of Performance and conformity Guide.pptx

  • 2. Business drivers and their impact on IT Move fast, be nimble and flexible AGILITY 66% of business owners identify business agility as a priority Cut costs Consolidate and streamline EFFICIENCY 54% of organisations say that their business processes could be improved Maximise the value of existing resources Do more with less PRODUCTIVITY 81% of business owners cite operational efficiencies as their top strategic priority IMPACT ON IT IT complexity: more data, more systems, more technology Pressure on resources and budgets 2
  • 3. And then, there’s the rise of malware… 1999 2001 2003 2005 2007 2009 2011 Malware files in Kaspersky Lab collection Jan 2013 >100m New Threats Every Day 200K Malicious programs specifically targeting mobile devices >35K 2013 3
  • 4. Malware The impact on IT security Mobile / BYOD Your data is on the move! The #1 target: applications! YOUR DATA Response: Anti-malware plus management tool / dashboard Response: Systems / patch management Response: Data encryption Response: Mobile device management (MDM) 4
  • 5. The impact on IT security Response: Malware Anti-malware plus management tool / dashboard The #1 target: Response: applications! Systems / patch management Your data is on Response: YOUR DATA the move! Data encryption Response: Mobile / BYOD Mobile device management (MDM) This is complexity COMPLEXITY IS THE ENEMY OF IT SECURITY 5
  • 6. Malware What if? Mobile / BYOD Your data is on the move! The #1 target: applications! 1 6 PLATFORM MANAGEMENT CONSOLE COST
  • 7. Introducing . . . KASPERSKY ENDPOINT SECURITY FOR BUSINESS 7
  • 8. Kaspersky Endpoint Security for Business This single platform contains: Anti-malware traditional & cloud-assisted Mobile security MDM plus mobile security agent Data encryption file / folder, full-disk Endpoint control tools: application, device and web control Systems management including patch management 8
  • 9. Endpoint control tools: application, device and web control Systems Management including patch management Kaspersky Endpoint Security for Business All managed through a single management console: Kaspersky Security Center Anti-malware traditional & cloud-assisted 9 Mobile security MDM plus mobile security agent Data encryption file / folder, full-disk
  • 10. For the first time, you can: Physical, virtual, mobile Identify vulnerabilities Inventory HW and SW Take action with clear reporting SEE Configure and deploy Set and enforce IT policies Manage employee-owned devices Prioritise patches License Management NAC CONTROL Evolve beyond anti-virus Meet security demands Protect data and devices anywhere Rely on Kaspersky expertise PROTECT 10
  • 11. Bringing two benefits together Deeper protection + seamless manageability ENDPOINT / INFRASTRUCTURE Anti-malware Endpoint control tools Encryption Mail and internet gateway security Collaboration Smartphones Tablets Servers Workstations Laptops KASPERSKY SECURITY CENTER Mobile Device Management (MDM) Systems Management Security Policy Enforcement Kaspersky Security Center 11
  • 12. Infrastructure Anti-malware The foundation of the platform 12 Kaspersky Anti-malware Technology Multi-point scanning Cloud-assisted Award-winning Kaspersky Security Center DATA ENCRYPTION MobileSecurity SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE
  • 13. MobileSecurity SYSTEMS CONTROL Infrastructure MANAGEMENT TOOLS File / folder or full-disk Transparent to end-users 13 Data encryption Keeping your data safe, wherever it goes Encryption features Integrates with device control and application control DATA ENCRYPTION ANTI MALWARE Inside the Network Outside the Network Transparent encryption and decryption
  • 14. SYSTEMS CONTROL Infrastructure MANAGEMENT TOOLS Mobile security 14 Mobile endpoint + MDM Microsoft Exchange ActiveSync Apple MDM Mobile Device Management(MDM) EndpointAgent for Mobile Devices * * Smartphones Tablets iOS devices Two components Kaspersky Security Center MDM ANTI DATA MALWARE ENCRYPTION MobileSecurity * • Android • Windows • Symbian • Blackberry
  • 15. Infrastructure Mobile solution features Via SMS, email or tether CONFIGURE/DEPLOY Anti-malware Anti-phishing Anti-spam SECURITY GPS find Remote block ANTI-THEFT Set password Jailbreak / Root notice Force settings POLICY COMPLIANCE Containerisation Data access restriction APPLICATIONS Data Encryption Remote wipe DATAACCESS 15 DATA ENCRYPTION MobileSecurity SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE
  • 16. SYSTEMS CONTROL Infrastructure MANAGEMENT TOOLS 16 The perfect solution for BYOD Kaspersky Security Center Keeps corporate data separate Encrypted Selectively wiped Containerisation Corporate Personal Private ‘App’Portal ANTI DATA MALWARE ENCRYPTION MobileSecurity  App  App  App  App  App  App  App  App
  • 17. CONTROL Infrastructure TOOLS Systems management 17 Staying up-to-date just got faster and easier ANTI DATA MALWARE ENCRYPTION MobileSecurity SYSTEMS MANAGEMENT VULNERABILITY SCANNING HW and SW inventory Multiple vulnerability databases REMOTE TOOLS Install applications Update applications Troubleshoot LICENCE MANAGEMENT Track usage Manage renewals Manage licence compliance NETWORKADMISSION CONTROL (NAC) Guest policy management Guest portal ADVANCED PATCHING Automated prioritisation Reboot options SYSTEM PROVISIONING Create images Store and update Deploy
  • 18. Control tools Applications, devices and web 18 DEVICE CONTROL WEB CONTROL APPLICATION CONTROL WITH DYNAMIC WHITELISTING ANTI DATA SYSTEMS MALWARE ENCRYPTION MobileSecurity MANAGEMENT CONTROL TOOLS Infrastructure
  • 19. Mail, Internet gateway and collaboration Comprehensive infrastructure protection Security for Mail Microsoft Exchange Lotus Notes/Domino Linux Mail Servers Security For Internet Gateways Microsoft ISA/TMG Squid Firewall Security For Collaboration Microsoft SharePoint servers DATA SYSTEMS CONTROL ENCRYPTION MobileSecurity MANAGEMENT TOOLS Infrastructure 19
  • 20. Supported and powered by the Kaspersky Security Network Global cloud network of millions of users Dynamic reputation of applications and websites Improves performance and reduces false positives Tightly integrated with protection features KASPERSKYGLOBALUSERS 20
  • 21. Kaspersky Endpoint Security for Business: Progressive, feature-rich tiers ANTI-MALWARE APP, DEVICE, WEB CONTROL MOBILE SECURITY DATA ENCRYPTION SYSTEMS MANAGEMENT MAIL, WEB AND COLLABORATION TOTAL ADVANCED SELECT CORE 21
  • 22. Collaboration Mail Internet Gateway Licence Management Network Admission (NAC) Software Installation Kaspersky Security Center System Provisioning Patch Management Vulnerability Scan Data Encryption Mobile Endpoint Security Mobile Device Management (MDM) File Server Security Application Control Device Control Web Control Anti-malware + Firewall In detail Core Select Total Advanced Endpoint Management Infrastructure Cloud-enabled via the Kaspersky Security Network (KSN) 22
  • 23. Plus: additional targeted solutions Kaspersky Security for... File Servers Systems Management Storage Mail Mobile Virtualization Collaboration Internet Gateways 23
  • 24. Summary: a unique set of benefits Deeper protection Unified management REDUCE BUSINESS RISK, WITH MAXIMUM BUSINESS EFFICIENCY – WITH KASPERSKY, NOW YOU CAN SEE CONTROL PROTECT IT efficiency 24
  • 25. Why Kaspersky for your business? KASPERSKY INSIDE Over 80 IT, networking security and communications vendors have chosen to embed Kaspersky Lab anti-malware technology inside their own solutions, including Microsoft, IBM, Checkpoint and Juniper. AWARD-WINNING ANTI-MALWARE BUILT, NOT BOUGHT We do not acquire technologies and then try to integrate them. Every feature and function is built up from the same, single code base. 25