Kaspersky Endpoint Security For Business: ADVANCED
Security tools combined with IT optimization features abound in this valuble arry of solutions from Kaspersky Lab
Kaspersky's ADVANCED tier delivers the protection and management solutionn for your organization needs to enforce IT policy, keep users free , prevent data loss, and enhance IT efficiency
KEY FEATURES
Powerful Encryption Technology
Full disk and folder AES 256-bit encryption protects lost or stolen data, and allows secure data sharing via removable devices, email, network or web, all with transparency to the user.
Systems Configuration And Patch Management
Operating systems image creation and deployment, vulnerability scanning, automated patch management, Network Admission control, inventories and license management combine to provide a fully integrated toolkit administered through a single, user-friendly central console.
Mobile Deployment And Security For Smartphones And Tablets
Agent-based mobile endpoint security, and remote device and software policy management through Kaspersky MDM.
Powerful Endppoint Anti-Malware And Flexible Controls
Kaspersky's cloud-assissted 'best of breed', anti-malware and granular applications, web and device control tools.
INTRODUCING IN THIS TIER
ENCRYPTION AND DATA PROTECTION: Comprehensive Encryption Choose from full-disk or file level, backed by Advanced Encryption Standard (AES) with 256-bit encryption, to secure critical business information in the event of device theft or loss. Secure Data sharing Create encrypted and self-extracting packages to ensure data is protected when sharing removable devices, email, network or web. Support For Removable Devices increases your security through policies that enforce the encryption of data on removable devices. Transparency For End-Users Kaspersky's encryption solution is seamless and invisible to users, and has no adverse impact on productivity. No impact on application settings or updates, either.
|
SYSTEMS CONFIGURATION AND PATCH MANAGEMENT: Patch Management Advanced in-depth scanning for vulnerabilities combined with the automated distribution of patches. Operating System and application Image Deployment Easy creation, storage and eployment of system images from a central location. Perfect for a migarion to Microsoft Windows 8. Remote Deployment Of Software Central deployment of software to client machines, even to branch offices. Network Admission Control (NAC) With Network AdmissionControl (NAC), you can create a network 'guest' policy. Guest devices (including mobile devices) are automatically recognized and sent to a corporate portal where the correct identification password enables them to use the resources you've approved. Hardware, Software And License Control Hardware and software inventory reports help keep control over software liocenses obligations. So you can save on costs by centrally provisioning software rights. |