KASPERSKY ENDPOINT SECURITY FOR BUSINESS – Advanced

Gambar KASPERSKY ENDPOINT SECURITY FOR BUSINESS Advanced

 

Security tools combined with IT optimization features abound in this valuable array of solutions from Kaspersky Lab.

Kaspersky’s Advanced tier delivers the protection and management solution your organization needs to enforce IT policy, keep users free from malware, prevent data loss, and enhance IT efficiency.

The Protection and Management Capabilities You Need.
Kaspersky has built powerful enterprise-class features into the progressive tiers of our offerings, but we’ve made the technology uncomplicated and simple enough for any sized business.

Which Tier is Right for You?
• CORE
• SELECT
• ADVANCED
• TOTAL

ADVANCED Features included :
• Anti-Malware
• Firewall
• Cloud-Assisted Protection via Kaspersky Security Network
• Application Control
• Application Whitelisting
• Web Control
• Device Control
• File Server Protection
• Mobile Device Management (MDM)
• Mobile Endpoint Security (for tablets and smartphones)
• Encryption
• Systems Configuration and Deployment
• NETWORK ADMISSION CONTROL
• Advanced Vulnera bility Scanning
• Patch Management

The industry’s only true security platform

One Management Console
From one ‘single pane of glass’, the administrator can view and manage the entire security scene — virtual machines, physical and mobile devices alike.

One Security Platform
Kaspersky Lab developed our console, security modules and tools in-house rather than acquiring them from other companies. This means the same programmers working from the same codebase have developed technologies that talk together and work together. The result is stability, integrated policies, useful reporting and intuitive tools.

One Cost
All tools are from one vendor, delivered in one installation — so you don’t have to go through a new budgeting and justification process to bring your security risks in line with your business objectives.

Encryption and Data Protection :

Comprehensive Encryption
Choose from full-disk or file level, backed by Advanced Encryption Standard (AES) with 256 bit encryption to secure critical business information in the event of device theft or loss.

Support for Removable Devices
Increases your security through policies that enforce the encryption of data on removable devices.

Secure Data Sharing
Means users can easily create encrypted and selfextracting packages to ensure data is protected when sharing via removable devices, email, network or web.

Transparency for End-users
Kaspersky’s encryption solution is seamless and invisible to users, and has no adverse impact on productivity. No impact on application settings or updates, either.

Endpoint Controls:

Application Control
Enables IT administrators to set policies that allow, block or regulate applications (or application categories).

Device Control
Allows users to set, schedule and enforce data policies with removable storage and other peripheral device controls — connected to USB or any other bus type.

Web Control
Means that endpoint-based surfing controls follow the user — whether on the corporate network or roaming.

Dynamic Whitelisting
Real-time file reputations delivered by the Kaspersky Security Network ensure your approved applications are malware free and help maximize user productivity.

Endpoint PROTECTION FEATURES:

Superior Endpoint Anti-Malware
Industry-proven traditional signature-based, proactive and cloud based methods for detecting malware threats.

Cloud-Ass isted Protection
The Kaspersky Security Network (KSN) provides a response to suspected threats, much faster than traditional methods of protection. KSN’s response time to a malware threat can be as little as 0.02 seconds!

Systems Configuration and Patch Management :

Patch Management
Advanced in-depth scanning for vulnerabilities combined with the automated distribution of patches.

Remote Deployment of Software
Central deployment of software to client machines, even to branch offices.

Network Admission Control (NAC)
With Network Admission Control (NAC), you can create a network ‘guest’ policy. Guest devices (including mobile devices) are automatically recognized and sent to a corporate portal where the correct identification password enables them to use the resources you’ve approved.

Operating System and Application Image Deployment
Easy creation, storage and deployment of system images from a central location. Perfect for migration to Microsoft®
Windows® 8.

Hardware, Software and License Management
Hardware and software inventory reports help keep control over software license obligations. So you can save on costs by centrally provisioning software rights.

Mobile SECURITY FEATURES:

Innovative Anti-Malware Technologies
Combined signature-based, proactive and cloud-assisted detection results in real-time protection. A safe browser and anti-spam increase the security.

Deployment with Over The Air (OTA) Provisioning
Preconfigure and deploy applications centrally using SMS, email and PC.

Remote Anti-Theft Tools
SIM-Watch, Remote Lock, Wipe and Find all prevent unauthorized access to corporate data if a mobile device is lost or stolen.

Application Control for Mobile Devices
Monitors applications installed on a mobile device according to the pre-defined group policies. Includes a “Mandatory Application” group.

Support for Employee Owned Devices
BYOD initiative? Corporate data and applications are isolated in encrypted containers which are transparent to the user. This data can be wiped separately.

Important Keywords :

kes for business advanced,
kes for business advanced adalah,
kes for business advanced download,
kes for business advanced jakarta,
kes for business advanced english