SlideShare ist ein Scribd-Unternehmen logo
1 von 18
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Cyber
Incidents
Investigation
2
Threat
reportsTargeted attacks
and malware
campaigns
Continued
Exploitation of
Vulnerabilities in
3rd party software
325,000
New Endpoint
Threats per day
Increased
Threats to Mac
machines
Exponential
growth of mobile
malware
WHAT WE SEE TODAY
3
WHAT IS NEEDED TO SECURE YOUR BUSINESS?
Security
Intelligence
A comprehensive
security platform that
leverages all three
Multi-layered protection
against know, unknown
and advanced threats
Innovative
Technology
5
GLOBAL RESEARCH AND ANALYSIS TEAM
WORLD’S LEADING THREAT RESEARCH
EXPERTS
THREAT DISCOVERY
CULTURE
ACCUMULATED
KNOWLEDGE
AUTOMATED
SYSTEMS
5
KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION*
5
0%
20%
40%
60%
80%
100%
20 40 60 80 100
N of independent tests/reviews
ScoreofTOP3places
Bitdefender
Sophos
G DATA
Symantec
F-Secure
Intel Security (McAfee)
Trend Micro
Avira
Avast
BullGuard
AVG
ESET
AhnLab
Microsoft
Panda Security
In 2014 Kaspersky Lab products participated in 93
independent tests and reviews. Our products were
awarded 51 firsts and received 66 top-three finishes.
* Notes:
• According to summary results of independent
tests in 2014 for corporate, consumer and
mobile products.
• Summary includes tests conducted by the
following independent test labs and magazines:
Test labs: AV-Comparatives, AV-Test, Dennis
Technology Labs, MRG Effitas, NSS Labs, PC
Security Labs, VirusBulletin
• The size of the bubble reflects the number of 1st
places achieved.
ThreatTrack (VIPRE)
Qihoo 360
Kingsoft
Tencent
Kaspersky Lab
1st places – 51
Participation in 93
tests/reviews
TOP 3 = 71%
KASPERSKY LAB MULTILAYER SECURITY
Known
Threats
File Download File Start File Execution
29%70% 1%
Proactive TechnologiesReactive Technologies
Anti-Phishing
(emailtraffic)
HIPS&Firewall
(networktraffic)
URLFiltering
(webtraffic)
Anti-Spam
(emailtraffic)
Blacklisting
Unknown
Threats
Heuristics
Whitelisting
AppControl
Advanced
Threats
BSS
AEP
Systems
Watcher
Kaspersky
Security Network
Vulnerability
Assessment &
Patch Management
6
7
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Internet GatewayCollaboration MailTOTAL
Inventories & License
Control
Software
Distribution OS deployment SIEM integration
Data Encryption
ADVANCED
Mobile Application
Management
Mobile
Device Management
Device
Control
Application
Control
Web
Control
File Server Security
Mobile
Security
SELECT
Anti-Malware + Firewall
Kaspersky
Security
Center
CORE
Cloud-enabled via the
Kaspersky Security Network (KSN) Endpoint Management Infrastructure
Vulnerability Assessment &
Patch Management
HIPS and Personal Firewall
System watcher
Automatic Exploit Prevention
Cloud-based protection
Heuristic scanning
4
MULTI-LAYERED PROTECTION
The best security foundation possible – Kaspersky Lab’s
industry-leading protection against known, unknown and advanced threats
Signature-based protection
Powerful multi-layered protection
from all forms of cyber-threat
KNOWN
UNKNOWN
ADVANCED
5
POWERED BY GLOBAL INTELLIGENCE NETWORK
KASPERSKY SECURITY NETWORK
Continuously feeds new data to
protection components
Global security intelligence
Global cloud network -
threat related information
from 60 million+ users
KASPERSKY GLOBAL USERS
KASPERSKY
SECURITYNETWORK
10
ENDPOINT CONTROL
DEVICE CONTROL
APPLICATION CONTROL
WITH DYNAMIC WHITELISTING
WEB CONTROL
UNAUTHRIZED
ACCESS TO
CORPORATE DATA
MOBILE
MALWARE
DEVICE
LOSS OR THEFT
EMM
ADMINISTRATION
COMPLEXITY
ONE MORE
SOLUTION TO
IMPLEMENT & MANAGE
MOBILE
SECURITY
MOBILE
DEVICE
MANAGEMENT
MOBILE
APPLICATION
MANAGEMENT
CENTRALIZED
MANAGEMENT
MOBILE SECURITY AND MANAGEMENT
12
DATA ENCRYPTION
Simple Administration – Complex Capabilities
• File/folder (FLE)
• Full disk (FDE)
POWERFUL DATA
ENCRYPTION
• Application controls
• Device controls
RICH UNPARALLELED
INTEGRATION WITH
CONTROL TOOLS
• Transparent/single sign-on
• Minimized footprint
OPTIMIZED FOR MINIMAL
END-USER IMPACT
• Easy password recovery
• Remote management
STREAMLINED
ADMINISTRATION
• Pre-boot authentication
• Non-qwerty keyboards
• 2-factor authentication
via tokens or smart cards
AUTHENTICATION
FLEXIBLE
13
KASPERSKY SYSTEMS MANAGEMENT
Enhance security and manage complexity
• Hardware & software inventories
• License management &
compliance
• Guest device policies
INVENTORIES &
LICENSE CONTROL
• Multicast technology supported
• Policies for automatic distribution
• Optional after-hours deployment
SOFTWARE
DISTRIBUTION
• Easy image creation & deployment
• Wake-on-LAN support
• Post-installation editing support
OPERATING SYSTEMS
DEPLOYMENT
• HP ArcSight & IBM QRadar
• Enterprise-level reporting
• Improved IT security
INTEGRATION
SIEM
• Remote troubleshooting
• Role-Based Access Control
• Control of all IT security areas
across the corporate network
CENTRALIZED
MANAGEMENT
• Vulnerability detection &
prioritization
• Distribution of patches & updates
• Patch delivery status reports
VULNERABILITY ASSESSMENT
AND PATCH MANAGEMENT
14
KASPERSKY TOTAL SECURITY FOR BUSINESS
Comprehensive infrastructure protection beyond the endpoint
Security for Mail Server
• Kaspersky Security for
Linux Mail Server
• Kaspersky Security for
Microsoft Exchange Servers
• Kaspersky Anti-Virus
for Lotus Notes/Domino
Security for Internet Gateway
• Kaspersky Anti-Virus
for Proxy Server
• Kaspersky Anti-Virus
for Microsoft ISA Server and
Forefront TMG
Security for Collaboration
• Kaspersky Security
for Microsoft
SharePoint Server
14
IT SECURITY MANAGEMENT
15
Endpoint security technologies built into this single platform
All managed through a single management console: Kaspersky Security Center
KASPERSKY
SECURITY
CENTER
DESKTOPS
VIRTUAL
DESKTOPS
SERVERS
TABLETS
LAPTOPS
SMART-
PHONES
16
TARGETED SOLUTIONS
File Servers Systems
Management
Mobile Mail Servers
Virtualization Collaboration Storage Internet Gateways
17
KASPERSKY ENDPOINT SECURITY FOR
BUSINESS
Powerful multi-layered protection against known,
unknown and advanced threats, designed and built
by the industry’s leading security experts. Kaspersky
Endpoint Security for Business, backed by world-
renowned threat intelligence, provides unequalled IT
security and control
LET'S TALK?
VISIT US AT WWW.DATAUNIT.BE

Weitere ähnliche Inhalte

Was ist angesagt?

Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
MindRiver Group
 

Was ist angesagt? (20)

Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Ransomeware Recovery by Veeam
Ransomeware Recovery by VeeamRansomeware Recovery by Veeam
Ransomeware Recovery by Veeam
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
What is SASE
What is SASEWhat is SASE
What is SASE
 
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected VehiclesWebinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Présentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo WazuhPrésentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo Wazuh
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Fortinet Tanıtım
Fortinet TanıtımFortinet Tanıtım
Fortinet Tanıtım
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
SIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security Framework
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
 

Ähnlich wie Kaspersky endpoint security business presentation

Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
sferinga
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
sferinga
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
CTI Group
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 

Ähnlich wie Kaspersky endpoint security business presentation (20)

Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcomm
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Kaspersky endpoint security business presentation

  • 2. Cyber Incidents Investigation 2 Threat reportsTargeted attacks and malware campaigns Continued Exploitation of Vulnerabilities in 3rd party software 325,000 New Endpoint Threats per day Increased Threats to Mac machines Exponential growth of mobile malware WHAT WE SEE TODAY
  • 3. 3 WHAT IS NEEDED TO SECURE YOUR BUSINESS? Security Intelligence A comprehensive security platform that leverages all three Multi-layered protection against know, unknown and advanced threats Innovative Technology
  • 4. 5 GLOBAL RESEARCH AND ANALYSIS TEAM WORLD’S LEADING THREAT RESEARCH EXPERTS THREAT DISCOVERY CULTURE ACCUMULATED KNOWLEDGE AUTOMATED SYSTEMS
  • 5. 5 KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION* 5 0% 20% 40% 60% 80% 100% 20 40 60 80 100 N of independent tests/reviews ScoreofTOP3places Bitdefender Sophos G DATA Symantec F-Secure Intel Security (McAfee) Trend Micro Avira Avast BullGuard AVG ESET AhnLab Microsoft Panda Security In 2014 Kaspersky Lab products participated in 93 independent tests and reviews. Our products were awarded 51 firsts and received 66 top-three finishes. * Notes: • According to summary results of independent tests in 2014 for corporate, consumer and mobile products. • Summary includes tests conducted by the following independent test labs and magazines: Test labs: AV-Comparatives, AV-Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, VirusBulletin • The size of the bubble reflects the number of 1st places achieved. ThreatTrack (VIPRE) Qihoo 360 Kingsoft Tencent Kaspersky Lab 1st places – 51 Participation in 93 tests/reviews TOP 3 = 71%
  • 6. KASPERSKY LAB MULTILAYER SECURITY Known Threats File Download File Start File Execution 29%70% 1% Proactive TechnologiesReactive Technologies Anti-Phishing (emailtraffic) HIPS&Firewall (networktraffic) URLFiltering (webtraffic) Anti-Spam (emailtraffic) Blacklisting Unknown Threats Heuristics Whitelisting AppControl Advanced Threats BSS AEP Systems Watcher Kaspersky Security Network Vulnerability Assessment & Patch Management 6
  • 7. 7 KASPERSKY ENDPOINT SECURITY FOR BUSINESS Internet GatewayCollaboration MailTOTAL Inventories & License Control Software Distribution OS deployment SIEM integration Data Encryption ADVANCED Mobile Application Management Mobile Device Management Device Control Application Control Web Control File Server Security Mobile Security SELECT Anti-Malware + Firewall Kaspersky Security Center CORE Cloud-enabled via the Kaspersky Security Network (KSN) Endpoint Management Infrastructure Vulnerability Assessment & Patch Management
  • 8. HIPS and Personal Firewall System watcher Automatic Exploit Prevention Cloud-based protection Heuristic scanning 4 MULTI-LAYERED PROTECTION The best security foundation possible – Kaspersky Lab’s industry-leading protection against known, unknown and advanced threats Signature-based protection Powerful multi-layered protection from all forms of cyber-threat KNOWN UNKNOWN ADVANCED
  • 9. 5 POWERED BY GLOBAL INTELLIGENCE NETWORK KASPERSKY SECURITY NETWORK Continuously feeds new data to protection components Global security intelligence Global cloud network - threat related information from 60 million+ users KASPERSKY GLOBAL USERS KASPERSKY SECURITYNETWORK
  • 10. 10 ENDPOINT CONTROL DEVICE CONTROL APPLICATION CONTROL WITH DYNAMIC WHITELISTING WEB CONTROL
  • 11. UNAUTHRIZED ACCESS TO CORPORATE DATA MOBILE MALWARE DEVICE LOSS OR THEFT EMM ADMINISTRATION COMPLEXITY ONE MORE SOLUTION TO IMPLEMENT & MANAGE MOBILE SECURITY MOBILE DEVICE MANAGEMENT MOBILE APPLICATION MANAGEMENT CENTRALIZED MANAGEMENT MOBILE SECURITY AND MANAGEMENT
  • 12. 12 DATA ENCRYPTION Simple Administration – Complex Capabilities • File/folder (FLE) • Full disk (FDE) POWERFUL DATA ENCRYPTION • Application controls • Device controls RICH UNPARALLELED INTEGRATION WITH CONTROL TOOLS • Transparent/single sign-on • Minimized footprint OPTIMIZED FOR MINIMAL END-USER IMPACT • Easy password recovery • Remote management STREAMLINED ADMINISTRATION • Pre-boot authentication • Non-qwerty keyboards • 2-factor authentication via tokens or smart cards AUTHENTICATION FLEXIBLE
  • 13. 13 KASPERSKY SYSTEMS MANAGEMENT Enhance security and manage complexity • Hardware & software inventories • License management & compliance • Guest device policies INVENTORIES & LICENSE CONTROL • Multicast technology supported • Policies for automatic distribution • Optional after-hours deployment SOFTWARE DISTRIBUTION • Easy image creation & deployment • Wake-on-LAN support • Post-installation editing support OPERATING SYSTEMS DEPLOYMENT • HP ArcSight & IBM QRadar • Enterprise-level reporting • Improved IT security INTEGRATION SIEM • Remote troubleshooting • Role-Based Access Control • Control of all IT security areas across the corporate network CENTRALIZED MANAGEMENT • Vulnerability detection & prioritization • Distribution of patches & updates • Patch delivery status reports VULNERABILITY ASSESSMENT AND PATCH MANAGEMENT
  • 14. 14 KASPERSKY TOTAL SECURITY FOR BUSINESS Comprehensive infrastructure protection beyond the endpoint Security for Mail Server • Kaspersky Security for Linux Mail Server • Kaspersky Security for Microsoft Exchange Servers • Kaspersky Anti-Virus for Lotus Notes/Domino Security for Internet Gateway • Kaspersky Anti-Virus for Proxy Server • Kaspersky Anti-Virus for Microsoft ISA Server and Forefront TMG Security for Collaboration • Kaspersky Security for Microsoft SharePoint Server 14
  • 15. IT SECURITY MANAGEMENT 15 Endpoint security technologies built into this single platform All managed through a single management console: Kaspersky Security Center KASPERSKY SECURITY CENTER DESKTOPS VIRTUAL DESKTOPS SERVERS TABLETS LAPTOPS SMART- PHONES
  • 16. 16 TARGETED SOLUTIONS File Servers Systems Management Mobile Mail Servers Virtualization Collaboration Storage Internet Gateways
  • 17. 17 KASPERSKY ENDPOINT SECURITY FOR BUSINESS Powerful multi-layered protection against known, unknown and advanced threats, designed and built by the industry’s leading security experts. Kaspersky Endpoint Security for Business, backed by world- renowned threat intelligence, provides unequalled IT security and control
  • 18. LET'S TALK? VISIT US AT WWW.DATAUNIT.BE

Hinweis der Redaktion

  1. The Power to Protect Your Organization Kaspersky Endpoint Security for Business portfolio   Every business, regardless of size, is at risk from malware threats. Kaspersky Lab is in a unique position to see and discover many of these threats.   And the threat level is escalating. New malware targeting individuals and businesses now exceeds 325,000 unique threats– every day. At Kaspersky Lab, we are concerned about these threats and the risk they pose to businesses — that’s why we are advising organizations to ensure that their IT security strategy meets key criteria: protection against known, unknown & advanced threats, based on superior threat intelligence and addressing every platform in your organization, whether it’s physical, mobile or virtual.   Kaspersky solutions are designed with the flexibility to align with your business objectives. This means we are always on standby to protect your organization against threats to your physical and virtual endpoints, your mobile devices, your mail systems, servers, gateways, and SharePoint portals.
  2. Every business, regardless of size is at risk from malware threats. Kaspersky Lab is in a unique position to see and discover many of these threats – during the latter half of 2014, we discovered and reported on many key targeted attacks including“the Mask (Careto)”, “Crouching Yeti”, “Epic Turla”, as well as an attack on the clients of a large European bank that resulted in the theft of half a million euros in just one week. We named this 'Luuuk‘. And few business travelers can forget the threat discovered at the end of 2014 called “Dark Hotel”, infecting hotel guests logging into public Wi-Fi networks. We see the continued exploitation of unpatched vulnerabilities. This remains one of the key mechanisms used by cybercriminals to install malicious code on victims' computers. This relies on the existence of vulnerabilities in widely-used software and the failure of individuals or businesses to patch applications. The number of mobile malware attacks per month increased tenfold – from 69,000 per month in August 2013 to 644,000 in March 2014. Even on a straight line graph, this number could be in the millions by the end of 2015! Apple’s “closed-by-default” operating system makes it harder for malware to successfully take hold of the platform, but there remains a risk if users disable Mac OS X security measures – especially people who use pirated software. This is a problem as we continue to see malicious software being pushed via torrents and pirated software packages. And, sadly we see the growth of malware to exceed 325,000 unique threats targeting individuals and businesses like yours – every day.
  3. At Kaspersky Lab, we are concerned about these threats and the risk they pose to your business – that’s why we feel there are three things required to safeguard your organization against them. The first requirement is having superior threat intelligence. This is a deep understanding of what a threat looks like – how it is written and compiled. It’s important to investigate propagation methods and scour malware hot zones around the globe to see what’s coming next. Security for your business must utilize innovative tools and techniques to detect and eliminate known, unknown and advanced malware. Your security software must minimize the burden on your systems and maintain fast scanning times so as not to disrupt your business. Because you have a complex environment, this technology must extend across multiple platforms whether physical, mobile or virtual. Only Kaspersky can offer both the Threat Intelligence your company needs and the technology to put it to work. No other vendor can provide a comprehensive security platform built from technology that leverages our world-leading threat intelligence. Kaspersky solutions are designed to be flexible, because your business is unlike any other. This mean we are prepared to protect your organization against threats to your physical, mobile and virtual endpoints, your mail systems, collaboration servers, internet gateway, android and iOS devices.
  4. The threat intelligence that informs all our work and helps make Kasperky Lab solutions so powerful is supported by our GReAT team and their colleagues in Kaspersky Lab’s R and D laboratories the researchers and analysts – led, of course by one of our most dedicated and passionate technical experts, who also happens to be our Chief Executive – Eugene Kaspersky.
  5. The levels of IT security achievable by this unique combination of threat intelligence, innovative technology and a single integrated security platform has led to Kaspersky Lab being recognised as an industry leader– with independent tests continuing to award more ‘top scores’ to Kaspersky Lab, compared with any other vendor. In calendar year 2013, we participated in 79 independent tests and reviews. Our next-closest competitor (McAfee), participated in 65. In the results of these tests and reviews, Kaspersky was rated in the “top-3” 61 times. Our next-closest competitor, 35 times. And Kaspersky was rated #1st place 41 times. Our next-closest competitor, 27. So you see, none of the other leading security vendors can come even close to Kaspersky Lab in terms of the most critical aspect of any security system – its ability to detect and neuralise malware threats.
  6. Kaspersky Lab’s security elements work together to observe every file minutely through its whole lifecycle – starting from the very moment it is introduced into your system. The file’s origins, reputation, internal structure and its behavioral peculiarities – all are taken into account. The more sophisticated the threat; the more advanced the technologies required for its successful neutralization. But this doesn’t mean that earlier phase technologies are useless, even against APT components. While the names may be familiar, the have, in Kaspersky Lab’s case at least, been subject to ongoing innovation, constantly fine-tuning their performance. And the flow of security intelligence directly from Kaspersky Security Network ensures that all security elements are continuously up-to-date and fully armed. And remember, that final 1% of highly advanced malware detected by technologies unique to Kaspersky Lab may include the attack that could bring down your organization.
  7. Across 4 broad tiers, Kaspersky Endpoint Security for Business evolves layer by layer – providing a scalable model through which our customers can better address the challenges that are facing them today. The tools and features that Kaspersky offers in these 4 tiers deliver the protection and value IT managers around the globe been looking for. The tiers of Kaspersky endpoint security for business begin with Kaspersky’s award-winning and powerful Anti-Malware technology in the Core tier. But, we know anti-malware by itself isn’t enough to deal with today’s threats. For that reason, in the Select tier, we’ve added Application Whitelisting and Control, Device control and Web control to the protection roster. Also included at this tier is Kaspersky Lab’s mobile security solution. Moving to the Advanced tier – this is where we include data protection in the form of Encryption. Here we also find the IT efficiency features of Kaspersky Systems Management. You’ll experience an immense amount of value in this broad set of features. Our final Tier – Kaspersky Total Security for Business adds the power of Kaspersky Collaboration Server protection - and our popular mail and web gateway security products. This is the perfect solution for organizations with broad security requirements who demand the best protection for each network area.
  8. Kaspersky Lab’s integrated security platform has been built from the ground up, based on the best possible foundation. That foundation is our industry leading anti-malware engine; layer upon layer of powerful, streamlined protection working together to provide unrivalled anti-threat protection. Each layer of security addresses cyber-threats from a different perspective, that providing security that is deep and wide through tightly interlocking technologies Cloud-assisted real-time anti-malware intelligence and Automatic Exploit Prevention, together with signature databases and advanced heuristics, provide multi-layered security against known, unknown and advanced threats, including APT malicious components. Tight integration through a single code-base means that all these technologies and more can be layered together seamlessly for maximum protection with minimum impact on endpoint performance.
  9. Our cloud-based reputation system (the Kaspersky Security Network) is one of the key elements in our platform. Over 60 million users of Kaspersky Lab security around the world to provide snapshots of suspicious activity on their systems. This powerful technology provides Kaspersky Lab with data about new and emerging malware threats in real time, so that we can immediately apply protection against these threats to the systems of all our users world-wide.
  10. Control tools add a powerful additional layer of protection, allowing the administrator to deploy and enforce policies about how hardware, software and internet connectivity can be accessed and used by different groups of employees, or even single individuals. Device control, for example, allow usage policies to be set right down to the level of a single portable device, identified by serial number, keeping downloaded materials secure and preventing malware from being inadvertently introduced onto the network. Web control protect users from dangerous and from inappropriate sites, supporting compliance with employee protection legislation and, through restricting access to social media during working hours, supporting productivity. Kaspersky Lab’s Applications Control and Whitelisting is different in a number of ways from that offered by other security companies, so it’s worth looking a bit more closely at this area on the next slide.
  11. Data encryption technology ensures that confidential corporate data becomes useless in the wrong hands. If a user misplaces a USB storage device, their laptop is stolen, or an email attachment is intercepted by a third party, encrypted data remains safe from being exploited by unauthorized third parties. Because data encryption is just one integrated, centrally managed component of the overall security platform, it becomes straightforward to create combined policies for mandating, for example, encryption for specific applications or on specified portable devices. This is a major time saver, making the IT administrator’s life so much easier. Confidential data can be encrypted at file/folder, full disk or portable device level, and the use of a token or smart card for 2-factor authentication is just one option for secure user authorization.
  12. Data encryption technology ensures that confidential corporate data becomes useless in the wrong hands. If a user misplaces a USB storage device, their laptop is stolen, or an email attachment is intercepted by a third party, encrypted data remains safe from being exploited by unauthorized third parties. Because data encryption is just one integrated, centrally managed component of the overall security platform, it becomes straightforward to create combined policies for mandating, for example, encryption for specific applications or on specified portable devices. This is a major time saver, making the IT administrator’s life so much easier. Confidential data can be encrypted at file/folder, full disk or portable device level, and the use of a token or smart card for 2-factor authentication is just one option for secure user authorization.
  13. Finally Kaspersky Total Security for Business offers all the endpoint products and technologies incorporated into the other tiers of Kaspersky Endpoint Security for business. But now we add three further layers of server and gateway protection, building into the most powerful and comprehensive integrated security solution offered in the industry today : Kaspersky Security for Mail servers Kaspersky Security for Internet Gateways, and Kaspersky Security for Collaboration
  14. Kaspersky Endpoint Security for Business is a complete endpoint protection, control and management solution integrated into a single platform. These security components include, reading clockwise from the top: Anti-malware protection. Kaspersky's award-winning multi-layered technology incorporating protection against emerging and even unknown advanced threats. Granular applications ,device and web controls augmented by Dynamic Whitelisting and applications privilege control technologies Mobile Security –endpoint security, plus device and applications management for Android, iOS and Windows based mobile phones and tablets, including a self-service user portal. Powerful data encryption fully integrated so that joint control and encryption policies, for example, can be developed, ensuring confidential data is safe even if it falls into the wrong hands. A systems management toolkit, including vulnerability assessment and automated patch management, as well as systems provisioning, inventories and license management
  15. Because everyone’s network is different, Kaspersky offers these “ad-hoc” or “targeted” solutions. These solutions address the security needs of certain network infrastructure areas. Some solutions, like Kaspersky Security for Virtualization and Kaspersky Security for Storage, are offered only as ‘stand-alone’ solutions, and not as part of Kaspersky Endpoint Security for Business. They are, however, built in-house and able to integrate tightly with all other Kaspersky Security for Business solutions – Kaspersky Security for Virtualization, for example, is managed through the same single Kaspersky Security Center console. Other targeted solutions are also included in Kaspersky Endpoint Security for Business are available to allow customers to ‘mix-and-match’ components. For example, if a customer requires only the components of the Select tier, but also needs Mail security – the right solutions can be created by combining the two.