UA-100583368-1
Your browser version is outdated. We recommend that you update your browser to the latest version.

Kaspersky Endpoint Security For Business: ADVANCED 

Security tools combined with IT optimization features abound in this valuble arry of solutions from Kaspersky Lab

Kaspersky's ADVANCED tier delivers the protection and management solutionn for your organization needs to enforce IT policy, keep users free , prevent data loss, and enhance IT efficiency

KEY FEATURES

Powerful Encryption Technology

Full disk and folder AES 256-bit encryption protects lost or stolen data, and allows secure data sharing via removable devices, email, network or web, all with transparency to the user.

Systems Configuration And Patch Management

Operating systems image creation and deployment, vulnerability scanning, automated patch management, Network Admission control, inventories and license management combine to provide a fully integrated toolkit administered through a single, user-friendly central console.

Mobile Deployment And Security For Smartphones And Tablets

Agent-based mobile endpoint security, and remote device and software policy management through Kaspersky MDM.

Powerful Endppoint Anti-Malware And Flexible Controls

Kaspersky's cloud-assissted 'best of breed', anti-malware and granular applications, web and device control tools.

INTRODUCING IN THIS TIER

ENCRYPTION AND DATA PROTECTION:

Comprehensive Encryption

Choose from full-disk or file level, backed by Advanced Encryption Standard (AES) with 256-bit encryption, to secure critical business information in the event of device theft or loss.

Secure Data sharing

Create encrypted and self-extracting packages to ensure data is protected when sharing removable devices, email, network or web.

Support For Removable Devices

increases your security through policies that enforce the encryption of data on removable devices.

Transparency For End-Users

Kaspersky's encryption solution is seamless and invisible to users, and has no adverse impact on productivity. No impact on application settings or updates, either.

 

 

 

SYSTEMS CONFIGURATION AND PATCH MANAGEMENT:

Patch Management

Advanced in-depth scanning for vulnerabilities combined with the automated distribution of patches.

Operating System and application Image Deployment

Easy creation, storage and eployment of system images from a central location. Perfect for a migarion to Microsoft Windows 8.

Remote Deployment Of Software

Central deployment of software to client machines, even to branch offices.

Network Admission Control (NAC)

With Network AdmissionControl (NAC), you can create a network 'guest' policy. Guest devices (including mobile devices) are automatically recognized and sent to a corporate portal where the correct identification password enables them to use the resources you've approved.

Hardware, Software And License Control

Hardware and software inventory reports help keep control over software liocenses obligations. So you can save on costs by centrally provisioning software rights.