Cybersecurity can be complex, but getting answers shouldn’t be. If you have any questions about our products, services or how we can support your business, don’t hesitate to contact us
Contact UsNo Product Description Yet
Next-gen adaptive endpoint protection and hardening Technology drives and supports your business. But you have to secure it against cyberthreats. We help you build a safe foundation to enable and support your digital transformation in a robust and simple way.
Your business holds sensitive data that must be kept safe, which is why we do more than just protect every endpoint. Adaptive Security detects advanced threats, while server hardening enhances high-performance protection with additional application, web and device controls, to prevent the theft of corporate and financial information.
Detects and patches vulnerabilities to reduce attack entry-points
Saves time by automating OS and software deployment tasks
Streamlines centralized security management with a cloud or web console
Encrypts data to prevent damage from data leakage on a lost device
This tier includes all the functionality delivered by Kaspersky Endpoint Security for Business Select, plus additional advanced technologies that do even more to protect your business.
Security shouldn’t slow you down, so our security has minimal impact on system performance. And if you’re attacked, the Remediation Engine undoes most malicious actions, so users can keep working without interruption.
Security shouldn’t slow you down, so our security has minimal impact on system performance. And if you’re attacked, the Remediation Engine undoes most malicious actions, so users can keep working without interruption.
Endpoint detection and response capabilities that identify abnormal behavior, automatically detecting and remediating targeted ransomware and in particular fileless threats which try to mimic common behavior like PowerShell script execution.
Endpoint detection and response capabilities that identify abnormal behavior, automatically detecting and remediating targeted ransomware and in particular fileless threats which try to mimic common behavior like PowerShell script execution.
Our Linux and Windows Server security has been developed specifically for application and terminal servers. Encryption functions – plus OS-embedded firewall and encryption management – guard corporate and customer information to help you achieve key compliance goals, including GDPR.
Our Linux and Windows Server security has been developed specifically for application and terminal servers. Encryption functions – plus OS-embedded firewall and encryption management – guard corporate and customer information to help you achieve key compliance goals, including GDPR.
Automates software tasks including the creation, storage and cloning of system images – saving you time whenever you need to roll out new systems or update software on existing systems.
Automates software tasks including the creation, storage and cloning of system images – saving you time whenever you need to roll out new systems or update software on existing systems.
We’re pioneers in providing the highest levels of transparency and data sovereignty, as well as neutrality. We process core data in geopolitically neutral Switzerland, where our partners can review our source code.
We’re pioneers in providing the highest levels of transparency and data sovereignty, as well as neutrality. We process core data in geopolitically neutral Switzerland, where our partners can review our source code.
We are recognized for innovation – and have identified more advanced threats than any other vendor. Whether your IT is on-site or outsourced, our security adapts to protect you from new threats.
We are recognized for innovation – and have identified more advanced threats than any other vendor. Whether your IT is on-site or outsourced, our security adapts to protect you from new threats.
Because we include multiple security technologies – including Adaptive Anomaly Control – you only need buy one EPP product. And you don’t need a dedicated IT security team to use it.
Because we include multiple security technologies – including Adaptive Anomaly Control – you only need buy one EPP product. And you don’t need a dedicated IT security team to use it.
Security shouldn’t slow you down. The unique cloud mode for endpoint components and global threat intelligence delivers powerful defenses with minimal impact on PC resources.
Security shouldn’t slow you down. The unique cloud mode for endpoint components and global threat intelligence delivers powerful defenses with minimal impact on PC resources.
Don’t just take our word for it – over the years, our products have participated in more customer surveys and independent tests – and have achieved more first places - than any other vendor.
Don’t just take our word for it – over the years, our products have participated in more customer surveys and independent tests – and have achieved more first places - than any other vendor.
Our role-based model helps you divide responsibilities across teams. The management console can be configured to ensure that each administrator can only access the tools and data they need.
Our role-based model helps you divide responsibilities across teams. The management console can be configured to ensure that each administrator can only access the tools and data they need.
A new enterprise-grade SaaS console means your team stays focused on important tasks like event processing, rather than being distracted by on-premises maintenance tasks.
A new enterprise-grade SaaS console means your team stays focused on important tasks like event processing, rather than being distracted by on-premises maintenance tasks.
Kaspersky Endpoint Security for BusinessFeatures |
Kaspersky Endpoint Security for BusinessSelect |
Kaspersky Endpoint Security for BusinessAdvance |
Kaspersky Endpoint Security for BusinessTotal |
|
---|---|---|---|---|
Defense for PC, Linux, Mac Android, iOS |
||||
Defense for application and terminal servers |
||||
Defense for web gateways and emails servers |
||||
Mobile Threat Defense |
||||
Application, Web & Device Controls for PCs |
||||
Behavior Detection, Remediation Engine |
||||
Vulnerability Assessment & Exploit Prevention |
||||
Environment variable permissions and HIPS |
||||
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration |
||||
Kaspersky Sandbox and Kaspersky EDR Optimum integration |
||||
Web, Email threat protections and controls for servers |
||||
Adaptive Anomaly Control and Patch Management |
||||
Encryption and OD-built-in encryption management |
||||
Advanced SIEM integration, OS & Third-party filtering software installation |
||||
Inbound and outbound content filtering |
||||
Anti-spam protection gateway level |
||||
Web traffic security and web controls at gateway level |