A presentation of the kaspersky portofolio for business. The antivirus package of kaspersky Endpoints, can secure your mobiles, desktops, servers and more.
3. 3
WHAT IS NEEDED TO SECURE YOUR BUSINESS?
Security
Intelligence
A comprehensive
security platform that
leverages all three
Multi-layered protection
against know, unknown
and advanced threats
Innovative
Technology
4. 5
GLOBAL RESEARCH AND ANALYSIS TEAM
WORLD’S LEADING THREAT RESEARCH
EXPERTS
THREAT DISCOVERY
CULTURE
ACCUMULATED
KNOWLEDGE
AUTOMATED
SYSTEMS
5. 5
KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION*
5
0%
20%
40%
60%
80%
100%
20 40 60 80 100
N of independent tests/reviews
ScoreofTOP3places
Bitdefender
Sophos
G DATA
Symantec
F-Secure
Intel Security (McAfee)
Trend Micro
Avira
Avast
BullGuard
AVG
ESET
AhnLab
Microsoft
Panda Security
In 2014 Kaspersky Lab products participated in 93
independent tests and reviews. Our products were
awarded 51 firsts and received 66 top-three finishes.
* Notes:
• According to summary results of independent
tests in 2014 for corporate, consumer and
mobile products.
• Summary includes tests conducted by the
following independent test labs and magazines:
Test labs: AV-Comparatives, AV-Test, Dennis
Technology Labs, MRG Effitas, NSS Labs, PC
Security Labs, VirusBulletin
• The size of the bubble reflects the number of 1st
places achieved.
ThreatTrack (VIPRE)
Qihoo 360
Kingsoft
Tencent
Kaspersky Lab
1st places – 51
Participation in 93
tests/reviews
TOP 3 = 71%
7. 7
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Internet GatewayCollaboration MailTOTAL
Inventories & License
Control
Software
Distribution OS deployment SIEM integration
Data Encryption
ADVANCED
Mobile Application
Management
Mobile
Device Management
Device
Control
Application
Control
Web
Control
File Server Security
Mobile
Security
SELECT
Anti-Malware + Firewall
Kaspersky
Security
Center
CORE
Cloud-enabled via the
Kaspersky Security Network (KSN) Endpoint Management Infrastructure
Vulnerability Assessment &
Patch Management
8. HIPS and Personal Firewall
System watcher
Automatic Exploit Prevention
Cloud-based protection
Heuristic scanning
4
MULTI-LAYERED PROTECTION
The best security foundation possible – Kaspersky Lab’s
industry-leading protection against known, unknown and advanced threats
Signature-based protection
Powerful multi-layered protection
from all forms of cyber-threat
KNOWN
UNKNOWN
ADVANCED
9. 5
POWERED BY GLOBAL INTELLIGENCE NETWORK
KASPERSKY SECURITY NETWORK
Continuously feeds new data to
protection components
Global security intelligence
Global cloud network -
threat related information
from 60 million+ users
KASPERSKY GLOBAL USERS
KASPERSKY
SECURITYNETWORK
11. UNAUTHRIZED
ACCESS TO
CORPORATE DATA
MOBILE
MALWARE
DEVICE
LOSS OR THEFT
EMM
ADMINISTRATION
COMPLEXITY
ONE MORE
SOLUTION TO
IMPLEMENT & MANAGE
MOBILE
SECURITY
MOBILE
DEVICE
MANAGEMENT
MOBILE
APPLICATION
MANAGEMENT
CENTRALIZED
MANAGEMENT
MOBILE SECURITY AND MANAGEMENT
12. 12
DATA ENCRYPTION
Simple Administration – Complex Capabilities
• File/folder (FLE)
• Full disk (FDE)
POWERFUL DATA
ENCRYPTION
• Application controls
• Device controls
RICH UNPARALLELED
INTEGRATION WITH
CONTROL TOOLS
• Transparent/single sign-on
• Minimized footprint
OPTIMIZED FOR MINIMAL
END-USER IMPACT
• Easy password recovery
• Remote management
STREAMLINED
ADMINISTRATION
• Pre-boot authentication
• Non-qwerty keyboards
• 2-factor authentication
via tokens or smart cards
AUTHENTICATION
FLEXIBLE
13. 13
KASPERSKY SYSTEMS MANAGEMENT
Enhance security and manage complexity
• Hardware & software inventories
• License management &
compliance
• Guest device policies
INVENTORIES &
LICENSE CONTROL
• Multicast technology supported
• Policies for automatic distribution
• Optional after-hours deployment
SOFTWARE
DISTRIBUTION
• Easy image creation & deployment
• Wake-on-LAN support
• Post-installation editing support
OPERATING SYSTEMS
DEPLOYMENT
• HP ArcSight & IBM QRadar
• Enterprise-level reporting
• Improved IT security
INTEGRATION
SIEM
• Remote troubleshooting
• Role-Based Access Control
• Control of all IT security areas
across the corporate network
CENTRALIZED
MANAGEMENT
• Vulnerability detection &
prioritization
• Distribution of patches & updates
• Patch delivery status reports
VULNERABILITY ASSESSMENT
AND PATCH MANAGEMENT
14. 14
KASPERSKY TOTAL SECURITY FOR BUSINESS
Comprehensive infrastructure protection beyond the endpoint
Security for Mail Server
• Kaspersky Security for
Linux Mail Server
• Kaspersky Security for
Microsoft Exchange Servers
• Kaspersky Anti-Virus
for Lotus Notes/Domino
Security for Internet Gateway
• Kaspersky Anti-Virus
for Proxy Server
• Kaspersky Anti-Virus
for Microsoft ISA Server and
Forefront TMG
Security for Collaboration
• Kaspersky Security
for Microsoft
SharePoint Server
14
15. IT SECURITY MANAGEMENT
15
Endpoint security technologies built into this single platform
All managed through a single management console: Kaspersky Security Center
KASPERSKY
SECURITY
CENTER
DESKTOPS
VIRTUAL
DESKTOPS
SERVERS
TABLETS
LAPTOPS
SMART-
PHONES
17. 17
KASPERSKY ENDPOINT SECURITY FOR
BUSINESS
Powerful multi-layered protection against known,
unknown and advanced threats, designed and built
by the industry’s leading security experts. Kaspersky
Endpoint Security for Business, backed by world-
renowned threat intelligence, provides unequalled IT
security and control
The Power to Protect Your Organization
Kaspersky Endpoint Security for Business portfolio
Every business, regardless of size, is at risk from malware threats. Kaspersky Lab is in a unique position to see and discover many of these threats.
And the threat level is escalating. New malware targeting individuals and businesses now exceeds 325,000 unique threats– every day. At Kaspersky Lab, we are concerned about these threats and the risk they pose to businesses — that’s why we are advising organizations to ensure that their IT security strategy meets key criteria: protection against known, unknown & advanced threats, based on superior threat intelligence and addressing every platform in your organization, whether it’s physical, mobile or virtual.
Kaspersky solutions are designed with the flexibility to align with your business objectives. This means we are always on standby to protect your organization against threats to your physical and virtual endpoints, your mobile devices, your mail systems, servers, gateways, and SharePoint portals.
Every business, regardless of size is at risk from malware threats. Kaspersky Lab is in a unique position to see and discover many of these threats – during the latter half of 2014, we discovered and reported on many key targeted attacks including“the Mask (Careto)”, “Crouching Yeti”, “Epic Turla”, as well as an attack on the clients of a large European bank that resulted in the theft of half a million euros in just one week. We named this 'Luuuk‘. And few business travelers can forget the threat discovered at the end of 2014 called “Dark Hotel”, infecting hotel guests logging into public Wi-Fi networks.
We see the continued exploitation of unpatched vulnerabilities. This remains one of the key mechanisms used by cybercriminals to install malicious code on victims' computers. This relies on the existence of vulnerabilities in widely-used software and the failure of individuals or businesses to patch applications.
The number of mobile malware attacks per month increased tenfold – from 69,000 per month in August 2013 to 644,000 in March 2014. Even on a straight line graph, this number could be in the millions by the end of 2015!
Apple’s “closed-by-default” operating system makes it harder for malware to successfully take hold of the platform, but there remains a risk if users disable Mac OS X security measures – especially people who use pirated software. This is a problem as we continue to see malicious software being pushed via torrents and pirated software packages.
And, sadly we see the growth of malware to exceed 325,000 unique threats targeting individuals and businesses like yours – every day.
At Kaspersky Lab, we are concerned about these threats and the risk they pose to your business – that’s why we feel there are three things required to safeguard your organization against them.
The first requirement is having superior threat intelligence. This is a deep understanding of what a threat looks like – how it is written and compiled. It’s important to investigate propagation methods and scour malware hot zones around the globe to see what’s coming next.
Security for your business must utilize innovative tools and techniques to detect and eliminate known, unknown and advanced malware. Your security software must minimize the burden on your systems and maintain fast scanning times so as not to disrupt your business. Because you have a complex environment, this technology must extend across multiple platforms whether physical, mobile or virtual.
Only Kaspersky can offer both the Threat Intelligence your company needs and the technology to put it to work. No other vendor can provide a comprehensive security platform built from technology that leverages our world-leading threat intelligence.
Kaspersky solutions are designed to be flexible, because your business is unlike any other. This mean we are prepared to protect your organization against threats to your physical, mobile and virtual endpoints, your mail systems, collaboration servers, internet gateway, android and iOS devices.
The threat intelligence that informs all our work and helps make Kasperky Lab solutions so powerful is supported by our GReAT team and their colleagues in Kaspersky Lab’s R and D laboratories the researchers and analysts – led, of course by one of our most dedicated and passionate technical experts, who also happens to be our Chief Executive – Eugene Kaspersky.
The levels of IT security achievable by this unique combination of threat intelligence, innovative technology and a single integrated security platform has led to Kaspersky Lab being recognised as an industry leader– with independent tests continuing to award more ‘top scores’ to Kaspersky Lab, compared with any other vendor.
In calendar year 2013, we participated in 79 independent tests and reviews. Our next-closest competitor (McAfee), participated in 65. In the results of these tests and reviews, Kaspersky was rated in the “top-3” 61 times. Our next-closest competitor, 35 times. And Kaspersky was rated #1st place 41 times. Our next-closest competitor, 27.
So you see, none of the other leading security vendors can come even close to Kaspersky Lab in terms of the most critical aspect of any security system – its ability to detect and neuralise malware threats.
Kaspersky Lab’s security elements work together to observe every file minutely through its whole lifecycle – starting from the very moment it is introduced into your system.
The file’s origins, reputation, internal structure and its behavioral peculiarities – all are taken into account. The more sophisticated the threat; the more advanced the technologies required for its successful neutralization. But this doesn’t mean that earlier phase technologies are useless, even against APT components. While the names may be familiar, the have, in Kaspersky Lab’s case at least, been subject to ongoing innovation, constantly fine-tuning their performance. And the flow of security intelligence directly from Kaspersky Security Network ensures that all security elements are continuously up-to-date and fully armed.
And remember, that final 1% of highly advanced malware detected by technologies unique to Kaspersky Lab may include the attack that could bring down your organization.
Across 4 broad tiers, Kaspersky Endpoint Security for Business evolves layer by layer – providing a scalable model through which our customers can better address the challenges that are facing them today.
The tools and features that Kaspersky offers in these 4 tiers deliver the protection and value IT managers around the globe been looking for.
The tiers of Kaspersky endpoint security for business begin with Kaspersky’s award-winning and powerful Anti-Malware technology in the Core tier.
But, we know anti-malware by itself isn’t enough to deal with today’s threats.
For that reason, in the Select tier, we’ve added Application Whitelisting and Control, Device control and Web control to the protection roster. Also included at this tier is Kaspersky Lab’s mobile security solution.
Moving to the Advanced tier – this is where we include data protection in the form of Encryption. Here we also find the IT efficiency features of Kaspersky Systems Management. You’ll experience an immense amount of value in this broad set of features.
Our final Tier – Kaspersky Total Security for Business adds the power of Kaspersky Collaboration Server protection - and our popular mail and web gateway security products. This is the perfect solution for organizations with broad security requirements who demand the best protection for each network area.
Kaspersky Lab’s integrated security platform has been built from the ground up, based on the best possible foundation. That foundation is our industry leading anti-malware engine; layer upon layer of powerful, streamlined protection working together to provide unrivalled anti-threat protection.
Each layer of security addresses cyber-threats from a different perspective, that providing security that is deep and wide through tightly interlocking technologies Cloud-assisted real-time anti-malware intelligence and Automatic Exploit Prevention, together with signature databases and advanced heuristics, provide multi-layered security against known, unknown and advanced threats, including APT malicious components.
Tight integration through a single code-base means that all these technologies and more can be layered together seamlessly for maximum protection with minimum impact on endpoint performance.
Our cloud-based reputation system (the Kaspersky Security Network) is one of the key elements in our platform.
Over 60 million users of Kaspersky Lab security around the world to provide snapshots of suspicious activity on their systems.
This powerful technology provides Kaspersky Lab with data about new and emerging malware threats in real time, so that we can immediately apply protection against these threats to the systems of all our users world-wide.
Control tools add a powerful additional layer of protection, allowing the administrator to deploy and enforce policies about how hardware, software and internet connectivity can be accessed and used by different groups of employees, or even single individuals.
Device control, for example, allow usage policies to be set right down to the level of a single portable device, identified by serial number, keeping downloaded materials secure and preventing malware from being inadvertently introduced onto the network.
Web control protect users from dangerous and from inappropriate sites, supporting compliance with employee protection legislation and, through restricting access to social media during working hours, supporting productivity.
Kaspersky Lab’s Applications Control and Whitelisting is different in a number of ways from that offered by other security companies, so it’s worth looking a bit more closely at this area on the next slide.
Data encryption technology ensures that confidential corporate data becomes useless in the wrong hands. If a user misplaces a USB storage device, their laptop is stolen, or an email attachment is intercepted by a third party, encrypted data remains safe from being exploited by unauthorized third parties.
Because data encryption is just one integrated, centrally managed component of the overall security platform, it becomes straightforward to create combined policies for mandating, for example, encryption for specific applications or on specified portable devices.
This is a major time saver, making the IT administrator’s life so much easier.
Confidential data can be encrypted at file/folder, full disk or portable device level, and the use of a token or smart card for 2-factor authentication is just one option for secure user authorization.
Data encryption technology ensures that confidential corporate data becomes useless in the wrong hands. If a user misplaces a USB storage device, their laptop is stolen, or an email attachment is intercepted by a third party, encrypted data remains safe from being exploited by unauthorized third parties.
Because data encryption is just one integrated, centrally managed component of the overall security platform, it becomes straightforward to create combined policies for mandating, for example, encryption for specific applications or on specified portable devices.
This is a major time saver, making the IT administrator’s life so much easier.
Confidential data can be encrypted at file/folder, full disk or portable device level, and the use of a token or smart card for 2-factor authentication is just one option for secure user authorization.
Finally Kaspersky Total Security for Business offers all the endpoint products and technologies incorporated into the other tiers of Kaspersky Endpoint Security for business.
But now we add three further layers of server and gateway protection, building into the most powerful and comprehensive integrated security solution offered in the industry today :
Kaspersky Security for Mail servers
Kaspersky Security for Internet Gateways, and
Kaspersky Security for Collaboration
Kaspersky Endpoint Security for Business is a complete endpoint protection, control and management solution integrated into a single platform. These security components include, reading clockwise from the top:
Anti-malware protection. Kaspersky's award-winning multi-layered technology incorporating protection against emerging and even unknown advanced threats.
Granular applications ,device and web controls augmented by Dynamic Whitelisting and applications privilege control technologies
Mobile Security –endpoint security, plus device and applications management for Android, iOS and Windows based mobile phones and tablets, including a self-service user portal.
Powerful data encryption fully integrated so that joint control and encryption policies, for example, can be developed, ensuring confidential data is safe even if it falls into the wrong hands.
A systems management toolkit, including vulnerability assessment and automated patch management, as well as systems provisioning, inventories and license management
Because everyone’s network is different, Kaspersky offers these “ad-hoc” or “targeted” solutions. These solutions address the security needs of certain network infrastructure areas.
Some solutions, like Kaspersky Security for Virtualization and Kaspersky Security for Storage, are offered only as ‘stand-alone’ solutions, and not as part of Kaspersky Endpoint Security for Business. They are, however, built in-house and able to integrate tightly with all other Kaspersky Security for Business solutions – Kaspersky Security for Virtualization, for example, is managed through the same single Kaspersky Security Center console.
Other targeted solutions are also included in Kaspersky Endpoint Security for Business are available to allow customers to ‘mix-and-match’ components. For example, if a customer requires only the components of the Select tier, but also needs Mail security – the right solutions can be created by combining the two.