SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Introducing
1
New Breath of Security Solutions for Business Users
Kaspersky Lab – Endpoint Security for Business
Dragan Martinović
Managing Director South Eastern Europe
dragan.martinovic@kaspersky.com
About Us
• Founded in 1997, Headquarters in Moscow,
Russia
• Over 2,800 employees worldwide (950 just in
R&D)
• Licensed technologies to around 100 IHVs and
ISVs worldwide
• One of the fastest-growing security software
companies
• Largest privately-owned security software
company
• Global presence:
• Operations in almost 200 countries
• Territory offices in 29 countries
• Over 300 million users around the globe
• Over 200 thousand corporate clients world-
wide
PAGE 2 |2
Where We Are on a Global Scale
USA
Canada
Brazil
Mexico
Argentina
Germany
France
UK
Benelux
Poland
Spain
Italy
Romania
Sweden
Austria
China
Korea
Japan
Malaysia
Australia
Hong Kong
India
Russia
Ukraine
Latvia
Kazakhstan
Turkey
UAE
South Africa
PAGE 3 |3
Kaspersky Lab – Partners
International Awards and Recognitions
• Leaders in different magic quadrants by:
• Recognition and other awards from around the world:
McAfee
TOP 3 = 21%
N of tests - 55
1st places - 1
Trend Micro
TOP 3 = 21%
54 tests
1st places - 3
Eset
TOP 3 = 29%
51 tests
1st places - 2
Sophos
TOP 3 = 39%
28 tests
1st places - 1
Kaspersky
TOP 3 = 87%
73 tests
1st places – (!)
31
Avira
TOP 3 = 35%
49 tests
1st places - 2
Symantec
TOP 3 = 58%
46 tests
1st places - 9
Bitdefender
TOP 3 = 75%
53 tests
1st places - 1210
20
30
Nof1stplaces
10 20 30 40 50 60 70 80
Tests participated
G-Data
TOP 3 = 41%
41 tests
1st places - 3
TOP3 SCORE RESULTS COMPARISON
Introducing . . .
KASPERSKY
ENDPOINT SECURITY
FOR BUSINESS
7
8
Kaspersky Endpoint Security for Business
This single platform contains:
Anti-malware
traditional & cloud-assisted
Mobile security
MDM plus mobile security
agent
Data encryption
file / folder,
full-disk
Endpoint
control tools:
application, device
and web control
Systems
management
including patch
management
Endpoint
control tools:
application, device
and web control
Systems
Management
including patch
management
9
Kaspersky Endpoint Security for Business
All managed through a single management console:
Kaspersky Security Center
Anti-malware
traditional & cloud-assisted
Mobile security
MDM plus mobile security
agent
Data encryption
file / folder,
full-disk
For the first time, you can:
10
Physical, virtual, mobile
Identify vulnerabilities
Inventory HW and SW
Take action with clear
reporting
SEE
Configure and deploy
Set and enforce IT policies
Manage employee-owned
devices
Prioritise patches
License Management
NAC
CONTROL
Evolve beyond anti-virus
Meet security demands
Protect data and devices
anywhere
Rely on Kaspersky
expertise
PROTECT
Bringing two benefits together
11
Deeper protection + seamless manageability
Anti-malware
Endpoint control tools
Encryption
Mail and internet gateway security
Collaboration
ENDPOINT / INFRASTRUCTURE
Smartphones
Tablets
Servers
Workstations
Laptops
Mobile Device Management (MDM)
Systems Management
Security Policy Enforcement
KASPERSKY SECURITY CENTER
Kaspersky
Security Center
Infrastructure
Anti-malware
12
The foundation of the platform
Kaspersky Anti-malware
Technology
Multi-point scanning
Cloud-assisted
Award-winning
Kaspersky
Security Center
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
Infrastructure
Encryption features
File / folder or full-disk
Transparent to end-users
13
Data encryption
Keeping your data safe, wherever it goes
Integrates with device
control and application
control
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
Inside the Network Outside the Network
Transparent encryption
and decryption
Infrastructure
Mobile security
14
Mobile endpoint + MDM
Microsoft
Exchange
ActiveSync
Apple MDM
Mobile Device
Management (MDM)
Endpoint Agent for
Mobile Devices
*
*
Smartphones
Tablets
iOS devices
Two components
Kaspersky
Security Center
MDM
DATA
ENCRYPTION Mobile
Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
*
• Android
• Windows
• Symbian
• Blackberry
Infrastructure
Mobile solution features
Via SMS, email or tether
CONFIGURE/DEPLOY
Anti-malware
Anti-phishing
Anti-spam
SECURITY
GPS find
Remote block
ANTI-THEFT
Set password
Jailbreak / Root notice
Force settings
POLICY COMPLIANCE
Containerisation
Data access restriction
APPLICATIONS
Data Encryption
Remote wipe
DATA ACCESS
15
DATA
ENCRYPTION Mobile
Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
Infrastructure
16
The perfect solution for BYOD
Kaspersky
Security Center
Keeps corporate
data separate
Encrypted
Selectively wiped
Containerisation
Corporate
Personal Private ‘App’ Portal
DATA
ENCRYPTION Mobile
Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE

App

App

App

App

App

App

App

App
Infrastructure
Systems management
17
Staying up-to-date just got faster and easier
DATA
ENCRYPTION
Mobile Security SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
HW and SW inventory
Multiple vulnerability
databases
VULNERABILITY
SCANNING
Install applications
Update applications
Troubleshoot
REMOTE TOOLS
Track usage
Manage renewals
Manage licence
compliance
LICENCE MANAGEMENT
Guest policy
management
Guest portal
NETWORK ADMISSION
CONTROL (NAC)
Automated prioritisation
Reboot options
ADVANCED PATCHING
Create images
Store and update
Deploy
SYSTEM PROVISIONING
Control tools
18
Applications, devices and web
DEVICE CONTROL
WEB CONTROL
APPLICATION CONTROL
WITH DYNAMIC WHITELISTING
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
Infrastructure
Mail, Internet gateway and collaboration
19
Comprehensive infrastructure protection
Microsoft Exchange
Lotus Notes/Domino
Linux Mail Servers
Security
for Mail
Microsoft ISA/TMG
Squid
Firewall
Security
For Internet Gateways
Microsoft SharePoint
servers
Security
For Collaboration
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
Infrastructure
Supported and powered by the Kaspersky
Security Network
Global cloud network
of millions of users
Dynamic reputation of
applications and websites
Improves performance
and reduces false positives
Tightly integrated with
protection features
20
KASPERSKY GLOBAL USERS
Kaspersky Endpoint Security for Business:
Progressive, feature-rich tiers
ANTI-MALWARE
APP, DEVICE,
WEB CONTROL
MOBILE
SECURITY
DATA
ENCRYPTION
SYSTEMS
MANAGEMENT
MAIL, WEB AND
COLLABORATION
21
TOTAL
ADVANCED
CORE
SELECT
Application Control
Vulnerability ScanPatch ManagementSystem Provisioning
In detail
Internet GatewayCollaboration Mail
Core
Select
Advanced
Total
Endpoint Management Infrastructure
22
Cloud-enabled via the
Kaspersky Security Network (KSN)
Software InstallationNetwork Admission (NAC)Licence Management
Mobile Endpoint Security
Data Encryption
Mobile Device Management (MDM)
File Server Security
Device Control Web Control
Anti-malware + Firewall
KasperskySecurityCenter
Plus: additional targeted solutions
23
Kaspersky Security for...
File
Servers
Systems
Management Storage Mail
Mobile Virtualization Collaboration Internet
Gateways
24
Summary: a unique set of benefits
Deeper
protection
Unified
management
REDUCE BUSINESS RISK, WITH MAXIMUM
BUSINESS EFFICIENCY
– WITH KASPERSKY, NOW YOU CAN
SEE CONTROL PROTECT
IT
efficiency
Why Kaspersky for your business?
KASPERSKY INSIDE
Over 80 IT, networking security and communications vendors have
chosen to embed Kaspersky Lab anti-malware technology inside their
own solutions, including Microsoft, IBM, Checkpoint and Juniper.
AWARD-WINNING ANTI-MALWARE
BUILT, NOT BOUGHT We do not acquire technologies and then try to integrate them.
Every feature and function is built up from the same, single code base.
25
Chose the technological partner,
not the marketing one
27
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 Derek Harp
 
Как автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOCКак автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOCDenis Batrankov, CISSP
 
TI Safe ICS Cybersecurity Training
TI Safe ICS Cybersecurity TrainingTI Safe ICS Cybersecurity Training
TI Safe ICS Cybersecurity TrainingTI Safe
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Оборудование Huawei в сетях АСУ ТП
Оборудование Huawei в сетях АСУ ТПОборудование Huawei в сетях АСУ ТП
Оборудование Huawei в сетях АСУ ТПАйдар Гилязов
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасностиАльбина Минуллина
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...Alexander Kravchenko
 
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISECHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISEAlexander Kravchenko
 
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...Alexander Kravchenko
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking PointMUK Extreme
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?S&T Consulting Hungary
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityChris Sistrunk
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
 

Was ist angesagt? (20)

SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
Как автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOCКак автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOC
 
TI Safe ICS Cybersecurity Training
TI Safe ICS Cybersecurity TrainingTI Safe ICS Cybersecurity Training
TI Safe ICS Cybersecurity Training
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Оборудование Huawei в сетях АСУ ТП
Оборудование Huawei в сетях АСУ ТПОборудование Huawei в сетях АСУ ТП
Оборудование Huawei в сетях АСУ ТП
 
CV Steve Shawcross
CV Steve ShawcrossCV Steve Shawcross
CV Steve Shawcross
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
 
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISECHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
CHECK POINT 5900 NEXT GENERATION SECURITY GATEWAY FOR THE MID-SIZE ENTERPRISE
 
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
CHECK POINT 5100 NEXT GENERATION SECURITY GATEWAY FOR THE SMALL ENTERPRISE AN...
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking Point
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
Fortinet Broşür
Fortinet BroşürFortinet Broşür
Fortinet Broşür
 

Andere mochten auch

Opencast Admin UI - Tools and development setup
Opencast Admin UI - Tools and development setupOpencast Admin UI - Tools and development setup
Opencast Admin UI - Tools and development setupbuttyx
 
Connect to Community Old Town
Connect to Community Old TownConnect to Community Old Town
Connect to Community Old Townaruban21
 
ອາຊ່ຽນ
ອາຊ່ຽນອາຊ່ຽນ
ອາຊ່ຽນmikkoIT
 
Government resources
Government resourcesGovernment resources
Government resourcesKatie Avery
 
Want to know how to find a reliable locksmith
Want to know how to find a reliable locksmith Want to know how to find a reliable locksmith
Want to know how to find a reliable locksmith ninzmiller
 
Iping, England team 5
Iping, England team 5Iping, England team 5
Iping, England team 5KKmck
 
civic engagement
civic engagementcivic engagement
civic engagementkatiess07
 
Iping, england (team 5) final copy
Iping, england (team 5)  final copyIping, england (team 5)  final copy
Iping, england (team 5) final copyKKmck
 
Team 5 Website Presentation Rough Draft.
Team 5 Website Presentation Rough Draft.Team 5 Website Presentation Rough Draft.
Team 5 Website Presentation Rough Draft.KKmck
 

Andere mochten auch (12)

Opencast Admin UI - Tools and development setup
Opencast Admin UI - Tools and development setupOpencast Admin UI - Tools and development setup
Opencast Admin UI - Tools and development setup
 
Connect to Community Old Town
Connect to Community Old TownConnect to Community Old Town
Connect to Community Old Town
 
Sueldo final
Sueldo finalSueldo final
Sueldo final
 
Lesson02
Lesson02Lesson02
Lesson02
 
Analisis Kasus Benhan
Analisis Kasus BenhanAnalisis Kasus Benhan
Analisis Kasus Benhan
 
ອາຊ່ຽນ
ອາຊ່ຽນອາຊ່ຽນ
ອາຊ່ຽນ
 
Government resources
Government resourcesGovernment resources
Government resources
 
Want to know how to find a reliable locksmith
Want to know how to find a reliable locksmith Want to know how to find a reliable locksmith
Want to know how to find a reliable locksmith
 
Iping, England team 5
Iping, England team 5Iping, England team 5
Iping, England team 5
 
civic engagement
civic engagementcivic engagement
civic engagement
 
Iping, england (team 5) final copy
Iping, england (team 5)  final copyIping, england (team 5)  final copy
Iping, england (team 5) final copy
 
Team 5 Website Presentation Rough Draft.
Team 5 Website Presentation Rough Draft.Team 5 Website Presentation Rough Draft.
Team 5 Website Presentation Rough Draft.
 

Ähnlich wie Kaspersky Kesb ep10 no_cm_v01a

Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overviewsferinga
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overviewsferinga
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxfrancis578223
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCristian Garcia G.
 
UserGate Proxy & Firewall
UserGate Proxy & FirewallUserGate Proxy & Firewall
UserGate Proxy & Firewallentensys
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud ServicesOzgur Gercek
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate BrochureQualys
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 

Ähnlich wie Kaspersky Kesb ep10 no_cm_v01a (20)

Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
UserGate Proxy & Firewall
UserGate Proxy & FirewallUserGate Proxy & Firewall
UserGate Proxy & Firewall
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 

Mehr von Igor Pandzic

Poslovanje u oblaku Bojan Vujić
Poslovanje u oblaku Bojan VujićPoslovanje u oblaku Bojan Vujić
Poslovanje u oblaku Bojan VujićIgor Pandzic
 
Info ars napredno google pretrazivanje
Info ars   napredno google pretrazivanjeInfo ars   napredno google pretrazivanje
Info ars napredno google pretrazivanjeIgor Pandzic
 
Info ars mailchimp
Info ars   mailchimpInfo ars   mailchimp
Info ars mailchimpIgor Pandzic
 
Info ars google drive
Info ars   google driveInfo ars   google drive
Info ars google driveIgor Pandzic
 
Horizon 2020 sm es-Zoran Dimitrijevic
Horizon 2020 sm es-Zoran DimitrijevicHorizon 2020 sm es-Zoran Dimitrijevic
Horizon 2020 sm es-Zoran DimitrijevicIgor Pandzic
 
Digitalna agenda Dalibor Drljača
Digitalna agenda Dalibor DrljačaDigitalna agenda Dalibor Drljača
Digitalna agenda Dalibor DrljačaIgor Pandzic
 
Regulatorni okvir i zahtjevi EU Dragana Kokot Gambiroža
Regulatorni okvir i zahtjevi EU Dragana Kokot GambirožaRegulatorni okvir i zahtjevi EU Dragana Kokot Gambiroža
Regulatorni okvir i zahtjevi EU Dragana Kokot GambirožaIgor Pandzic
 
Ikt prezentacija Srđan Puhalo
Ikt prezentacija Srđan PuhaloIkt prezentacija Srđan Puhalo
Ikt prezentacija Srđan PuhaloIgor Pandzic
 
Projekat web Igor Pandžić
Projekat web Igor PandžićProjekat web Igor Pandžić
Projekat web Igor PandžićIgor Pandzic
 
Ikt udruzenje Pk FBiH - 02-12-2014 - jahorina
Ikt udruzenje Pk FBiH - 02-12-2014 - jahorinaIkt udruzenje Pk FBiH - 02-12-2014 - jahorina
Ikt udruzenje Pk FBiH - 02-12-2014 - jahorinaIgor Pandzic
 
Ikt Slobodan Dragičević Konferencija jahorina 02122016
Ikt   Slobodan Dragičević Konferencija jahorina 02122016Ikt   Slobodan Dragičević Konferencija jahorina 02122016
Ikt Slobodan Dragičević Konferencija jahorina 02122016Igor Pandzic
 

Mehr von Igor Pandzic (13)

Program v2
Program v2Program v2
Program v2
 
Poslovanje u oblaku Bojan Vujić
Poslovanje u oblaku Bojan VujićPoslovanje u oblaku Bojan Vujić
Poslovanje u oblaku Bojan Vujić
 
Info ars napredno google pretrazivanje
Info ars   napredno google pretrazivanjeInfo ars   napredno google pretrazivanje
Info ars napredno google pretrazivanje
 
Info ars mailchimp
Info ars   mailchimpInfo ars   mailchimp
Info ars mailchimp
 
Info ars google drive
Info ars   google driveInfo ars   google drive
Info ars google drive
 
Horizon 2020 sm es-Zoran Dimitrijevic
Horizon 2020 sm es-Zoran DimitrijevicHorizon 2020 sm es-Zoran Dimitrijevic
Horizon 2020 sm es-Zoran Dimitrijevic
 
Digitalna agenda Dalibor Drljača
Digitalna agenda Dalibor DrljačaDigitalna agenda Dalibor Drljača
Digitalna agenda Dalibor Drljača
 
Regulatorni okvir i zahtjevi EU Dragana Kokot Gambiroža
Regulatorni okvir i zahtjevi EU Dragana Kokot GambirožaRegulatorni okvir i zahtjevi EU Dragana Kokot Gambiroža
Regulatorni okvir i zahtjevi EU Dragana Kokot Gambiroža
 
Ikt prezentacija Srđan Puhalo
Ikt prezentacija Srđan PuhaloIkt prezentacija Srđan Puhalo
Ikt prezentacija Srđan Puhalo
 
Col
ColCol
Col
 
Projekat web Igor Pandžić
Projekat web Igor PandžićProjekat web Igor Pandžić
Projekat web Igor Pandžić
 
Ikt udruzenje Pk FBiH - 02-12-2014 - jahorina
Ikt udruzenje Pk FBiH - 02-12-2014 - jahorinaIkt udruzenje Pk FBiH - 02-12-2014 - jahorina
Ikt udruzenje Pk FBiH - 02-12-2014 - jahorina
 
Ikt Slobodan Dragičević Konferencija jahorina 02122016
Ikt   Slobodan Dragičević Konferencija jahorina 02122016Ikt   Slobodan Dragičević Konferencija jahorina 02122016
Ikt Slobodan Dragičević Konferencija jahorina 02122016
 

Kürzlich hochgeladen

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Kürzlich hochgeladen (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Kaspersky Kesb ep10 no_cm_v01a

  • 1. Introducing 1 New Breath of Security Solutions for Business Users Kaspersky Lab – Endpoint Security for Business Dragan Martinović Managing Director South Eastern Europe dragan.martinovic@kaspersky.com
  • 2. About Us • Founded in 1997, Headquarters in Moscow, Russia • Over 2,800 employees worldwide (950 just in R&D) • Licensed technologies to around 100 IHVs and ISVs worldwide • One of the fastest-growing security software companies • Largest privately-owned security software company • Global presence: • Operations in almost 200 countries • Territory offices in 29 countries • Over 300 million users around the globe • Over 200 thousand corporate clients world- wide PAGE 2 |2
  • 3. Where We Are on a Global Scale USA Canada Brazil Mexico Argentina Germany France UK Benelux Poland Spain Italy Romania Sweden Austria China Korea Japan Malaysia Australia Hong Kong India Russia Ukraine Latvia Kazakhstan Turkey UAE South Africa PAGE 3 |3
  • 4. Kaspersky Lab – Partners
  • 5. International Awards and Recognitions • Leaders in different magic quadrants by: • Recognition and other awards from around the world:
  • 6. McAfee TOP 3 = 21% N of tests - 55 1st places - 1 Trend Micro TOP 3 = 21% 54 tests 1st places - 3 Eset TOP 3 = 29% 51 tests 1st places - 2 Sophos TOP 3 = 39% 28 tests 1st places - 1 Kaspersky TOP 3 = 87% 73 tests 1st places – (!) 31 Avira TOP 3 = 35% 49 tests 1st places - 2 Symantec TOP 3 = 58% 46 tests 1st places - 9 Bitdefender TOP 3 = 75% 53 tests 1st places - 1210 20 30 Nof1stplaces 10 20 30 40 50 60 70 80 Tests participated G-Data TOP 3 = 41% 41 tests 1st places - 3 TOP3 SCORE RESULTS COMPARISON
  • 7. Introducing . . . KASPERSKY ENDPOINT SECURITY FOR BUSINESS 7
  • 8. 8 Kaspersky Endpoint Security for Business This single platform contains: Anti-malware traditional & cloud-assisted Mobile security MDM plus mobile security agent Data encryption file / folder, full-disk Endpoint control tools: application, device and web control Systems management including patch management
  • 9. Endpoint control tools: application, device and web control Systems Management including patch management 9 Kaspersky Endpoint Security for Business All managed through a single management console: Kaspersky Security Center Anti-malware traditional & cloud-assisted Mobile security MDM plus mobile security agent Data encryption file / folder, full-disk
  • 10. For the first time, you can: 10 Physical, virtual, mobile Identify vulnerabilities Inventory HW and SW Take action with clear reporting SEE Configure and deploy Set and enforce IT policies Manage employee-owned devices Prioritise patches License Management NAC CONTROL Evolve beyond anti-virus Meet security demands Protect data and devices anywhere Rely on Kaspersky expertise PROTECT
  • 11. Bringing two benefits together 11 Deeper protection + seamless manageability Anti-malware Endpoint control tools Encryption Mail and internet gateway security Collaboration ENDPOINT / INFRASTRUCTURE Smartphones Tablets Servers Workstations Laptops Mobile Device Management (MDM) Systems Management Security Policy Enforcement KASPERSKY SECURITY CENTER Kaspersky Security Center
  • 12. Infrastructure Anti-malware 12 The foundation of the platform Kaspersky Anti-malware Technology Multi-point scanning Cloud-assisted Award-winning Kaspersky Security Center DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE
  • 13. Infrastructure Encryption features File / folder or full-disk Transparent to end-users 13 Data encryption Keeping your data safe, wherever it goes Integrates with device control and application control DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE Inside the Network Outside the Network Transparent encryption and decryption
  • 14. Infrastructure Mobile security 14 Mobile endpoint + MDM Microsoft Exchange ActiveSync Apple MDM Mobile Device Management (MDM) Endpoint Agent for Mobile Devices * * Smartphones Tablets iOS devices Two components Kaspersky Security Center MDM DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE * • Android • Windows • Symbian • Blackberry
  • 15. Infrastructure Mobile solution features Via SMS, email or tether CONFIGURE/DEPLOY Anti-malware Anti-phishing Anti-spam SECURITY GPS find Remote block ANTI-THEFT Set password Jailbreak / Root notice Force settings POLICY COMPLIANCE Containerisation Data access restriction APPLICATIONS Data Encryption Remote wipe DATA ACCESS 15 DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE
  • 16. Infrastructure 16 The perfect solution for BYOD Kaspersky Security Center Keeps corporate data separate Encrypted Selectively wiped Containerisation Corporate Personal Private ‘App’ Portal DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE  App  App  App  App  App  App  App  App
  • 17. Infrastructure Systems management 17 Staying up-to-date just got faster and easier DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE HW and SW inventory Multiple vulnerability databases VULNERABILITY SCANNING Install applications Update applications Troubleshoot REMOTE TOOLS Track usage Manage renewals Manage licence compliance LICENCE MANAGEMENT Guest policy management Guest portal NETWORK ADMISSION CONTROL (NAC) Automated prioritisation Reboot options ADVANCED PATCHING Create images Store and update Deploy SYSTEM PROVISIONING
  • 18. Control tools 18 Applications, devices and web DEVICE CONTROL WEB CONTROL APPLICATION CONTROL WITH DYNAMIC WHITELISTING DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE Infrastructure
  • 19. Mail, Internet gateway and collaboration 19 Comprehensive infrastructure protection Microsoft Exchange Lotus Notes/Domino Linux Mail Servers Security for Mail Microsoft ISA/TMG Squid Firewall Security For Internet Gateways Microsoft SharePoint servers Security For Collaboration DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS Infrastructure
  • 20. Supported and powered by the Kaspersky Security Network Global cloud network of millions of users Dynamic reputation of applications and websites Improves performance and reduces false positives Tightly integrated with protection features 20 KASPERSKY GLOBAL USERS
  • 21. Kaspersky Endpoint Security for Business: Progressive, feature-rich tiers ANTI-MALWARE APP, DEVICE, WEB CONTROL MOBILE SECURITY DATA ENCRYPTION SYSTEMS MANAGEMENT MAIL, WEB AND COLLABORATION 21 TOTAL ADVANCED CORE SELECT
  • 22. Application Control Vulnerability ScanPatch ManagementSystem Provisioning In detail Internet GatewayCollaboration Mail Core Select Advanced Total Endpoint Management Infrastructure 22 Cloud-enabled via the Kaspersky Security Network (KSN) Software InstallationNetwork Admission (NAC)Licence Management Mobile Endpoint Security Data Encryption Mobile Device Management (MDM) File Server Security Device Control Web Control Anti-malware + Firewall KasperskySecurityCenter
  • 23. Plus: additional targeted solutions 23 Kaspersky Security for... File Servers Systems Management Storage Mail Mobile Virtualization Collaboration Internet Gateways
  • 24. 24 Summary: a unique set of benefits Deeper protection Unified management REDUCE BUSINESS RISK, WITH MAXIMUM BUSINESS EFFICIENCY – WITH KASPERSKY, NOW YOU CAN SEE CONTROL PROTECT IT efficiency
  • 25. Why Kaspersky for your business? KASPERSKY INSIDE Over 80 IT, networking security and communications vendors have chosen to embed Kaspersky Lab anti-malware technology inside their own solutions, including Microsoft, IBM, Checkpoint and Juniper. AWARD-WINNING ANTI-MALWARE BUILT, NOT BOUGHT We do not acquire technologies and then try to integrate them. Every feature and function is built up from the same, single code base. 25
  • 26. Chose the technological partner, not the marketing one
  • 27. 27 KASPERSKY ENDPOINT SECURITY FOR BUSINESS Thank you

Hinweis der Redaktion

  1. TOP3 scores Kaspersky participated in all 73 tests/reviews, 31 times on 1st place, TOP3 in 87% Symantec – 45 tests, 9 first places, TOP3 score - 58% Sophos – 28 tests, 1, 39% Trend Micro – 54 tests, 3, 21% McAfee – 55 tests, 1, 21% Bitdefender – 53 tests, 12, 75% Eset – 51 tests, 2, 29%