Kaspersky Total Security for Business

Kaspersky Endpoint Security Cloud provides protection for desktops and laptops running Windows, Linux and Mac. This protection is based on a multi-layered security architecture that includes the following elements: - An advanced anti-malware engine that combines signature-based security, heuristic and behavioral analysis, and cloud-based techniques. - This engine protects your organization against known, unknown and advanced threats. - The security features cover all possible combinations of Mac, Linux and Windows desktops and laptops to en...
£84.46 *

Prices incl. VAT plus shipping costs

Free of shipping costs!

Ready to ship today,
Delivery time appr. 1-3 workdays

Lizenz Typ:

Jahr(e):

User:

  • 241821621
  • 1 year
Kaspersky Endpoint Security Cloud provides protection for desktops and laptops running Windows,... more

Kaspersky Endpoint Security Cloud provides protection for desktops and laptops running Windows, Linux and Mac.

This protection is based on a multi-layered security architecture that includes the following elements:

- An advanced anti-malware engine that combines signature-based security, heuristic and behavioral analysis, and cloud-based techniques.
- This engine protects your organization against known, unknown and advanced threats.
- The security features cover all possible combinations of Mac, Linux and Windows desktops and laptops to ensure comprehensive security coverage.

Here is an overview of the Kaspersky Endpoint Security Cloud features:

  • Simplified security management from a single console.
  • Automated EDR capabilities to defend against the latest cyberthreats.
  • Increased business productivity through spam protection.
  • Protect email and web traffic at the gateway.
  • Reduce the risk of attacks by increasing the security of corporate workstations.
  • Encrypting data to prevent the loss of confidential information.
  • Eliminate vulnerabilities and block points of attack.
  • Support your regulatory compliance efforts.

More efficient security updates

Kaspersky Lab offers more efficient security updates to ensure protection against the ever-changing and more complex threats from cybercriminals. Compared to many other security vendors, Kaspersky Lab provides database updates more frequently. In addition, the company uses advanced security technologies that significantly improve detection rates while reducing the size of update files. This ensures that more bandwidth is available on your network for other tasks. To ensure protection against unknown and advanced threats, Kaspersky Lab's technologies and threat analysis are constantly evolving. This ensures that your organization is protected against even the most sophisticated new threats.

Detect suspicious behavior

The activity monitor in the security solution monitors the behavior of programs within your corporate network. If a program exhibits a suspicious behavior pattern, it is automatically blocked by the Activity Monitor. In addition, the activity monitor keeps a dynamic log of activities in the operating system and in the registry as well as in other system areas. This makes it possible to automatically undo malicious actions performed by malware before it was blocked. This helps to protect your network from the effects of malware, even if it has already become active.

Protection against exploits

Kaspersky Lab's Automatic Exploit Prevention (AEP) technology provides protection against exploits by ensuring that vulnerabilities in your operating system or other programs in use cannot be exploited by malware. AEP monitors frequently attacked programs such as Microsoft Office, Internet Explorer, Adobe Reader, Java and others. It provides additional protection and monitoring against unknown threats by countering potentially harmful exploit activity and preventing them from causing damage. This helps to make your system more secure against attacks.

User control over programs and connections

Although some programs are not directly classified as malicious, they are often considered particularly risky. In such cases, it is advisable to restrict the activities of these applications. Our Host-Based Intrusion Prevention System (HIPS) limits the activities on the endpoint, depending on the trust level assigned to a program. HIPS works in close cooperation with our personal firewall, which regulates and restricts network activity.

Defense against network attacks

The Network Attack Blocker detects and monitors suspicious activity on your corporate network and allows you to determine your system's response to such suspicious behavior.

The power of the cloud for enhanced security

Millions of Kaspersky users have chosen to allow the cloud-based Kaspersky Security Network (KSN) to collect data on malware and suspicious behavior on their computers. Your organization can also benefit from enhanced protection against the latest threats. Thanks to this real-time data flow, we can react extremely quickly to new malware and at the same time reduce the number of false positives.

*Some features are not supported on certain platforms.

Protection for your file servers

Our award-winning security technologies provide protection for file servers, regardless of whether they are running Windows, Linux or FreeBSD. Scanning processes are optimized to minimize the impact on your servers' performance. We also offer protection for cluster servers as well as Citrix and Microsoft terminal servers.

Reliable protection

If an error occurs on one of your file servers, our security technologies will automatically restart when the file server is restarted.

Significantly improved administration

Every minute spent on administration and reporting could be better spent on more strategic activities. That's why we provide a single console from which you can manage security on all your endpoints - file servers, workstations and mobile devices - and easily generate detailed reports.

Robust protection for mobile devices

By combining leading technologies in the industry, we provide effective protection against the latest threats to mobile devices. Our phishing protection guards against fraudulent websites targeting your data and personal information. Spam protection keeps unwanted calls and SMS messages at bay. Flexible control tools prevent the execution of unauthorized programs and access to dangerous websites. Rooting and jailbreaking attempts are automatically detected and the affected devices are blocked.

Securing company data and personal data

Special technologies enable the creation of application containers on all your devices. In these containers, company applications are stored securely isolated from users' personal data. You have the option of enforcing encryption of all data within the container and preventing it from being copied or moved outside the container. Furthermore, additional user authentication layers may be required to launch an application from the container. If an employee leaves the company, you can remotely remove the corporate container using the selective wipe feature without affecting the device owner's personal data and settings.

Support for common MDM platforms

Enhanced Mobile Device Management (MDM) capabilities make it extremely easy to apply MDM group policies or individual policies to devices running Microsoft Exchange ActiveSync and iOS MDM, all from a single console. In addition, support for Samsung KNOX provides the ability to manage various settings for Samsung devices.

Lock, wipe and locate lost devices

Thanks to remote security features, business data on lost devices can be protected. Administrators and users have the ability to remotely lock the device, erase business data and locate the lost device. Even if a thief replaces the SIM card, the SIM Control feature will transfer the new phone number so you can continue to use the anti-theft features. Support for Google Cloud Messaging (GCM) ensures that Android devices receive the anti-theft commands immediately.

Self-service portal for activating personal mobile devices

Our dedicated self-service portal facilitates the integration of personal mobile devices into the corporate network. It also gives users access to key anti-theft features to quickly respond to the loss of a device and minimize the risk of data loss without putting additional strain on administrators.

Less effort for IT administrators

By using a single centralized console, IT administrators can manage the security of their mobile devices and other endpoints and set consistent policies across different mobile platforms. With our web-based console, they have the ability to manage the security of mobile devices and other endpoints from anywhere they have access to the internet. This simplifies management and significantly reduces the workload for IT administrators.

*Not all features are available on some of the supported mobile device platforms.

Control over programs, devices and internet usage
Dynamic whitelisting for added security

Our program control is one of the most comprehensive in the industry. We even operate our own whitelisting lab where programs are checked for security risks. Our database of safe programs contains over 1.3 billion individual files and grows by one million files every day. By combining program control and dynamic whitelisting, you can use a default deny approach where all programs are blocked unless they are on your whitelist. With our new test mode, you can check your default deny policy in a test environment before implementing it in your organization. This allows you to carefully configure the policy to avoid unwanted effects.

Avoid access by unauthorized devices

Device control tools provide an easy way to control access to your network. You can specify which devices are allowed access and do so based on various criteria such as time, location or device type. In addition, you can integrate these controls with Active Directory to enable efficient and fine-grained policy management and assignment. Administrators can also use masks to create device control rules, making device whitelisting simple and straightforward.

Monitoring and control of Internet access

With our web control tools, you have the ability to monitor and control Internet access. You can create internet access policies and monitor internet usage. This allows you to block, restrict, allow or monitor activities on certain websites or website categories, such as social networks or gaming and gambling websites. Control options can be based on location and time of day and can be combined with information from Active Directory to facilitate policy management and configuration.

Centralization of management processes

Kaspersky Endpoint Security for Business | Select security features are managed from a central console called Kaspersky Security Center. This console provides a unified interface that allows you to oversee and control the security of file servers and other Kaspersky Lab endpoint security solutions on your network. With Kaspersky Security Center, you can conveniently manage security for mobile devices, laptops, desktops, file servers, virtual machines and more from a single central management console.

A higher level of integration

By developing all our endpoint technologies in-house by our own teams, we achieve a higher level of integration. This leads to greater security, better performance and easier manageability. As all our endpoint security features are based on a common code base, compatibility issues are eliminated from the outset. This means you benefit from seamlessly integrated security technologies that provide excellent protection for your IT environment, while saving time through centralized management.
 

System requirements

  • Processor: 1 GHz processor for workstations (1.4 GHz for servers) that supports the SSE2 instruction set.
  • Memory: 1 GB for a 32-bit operating system (2 GB for a 64-bit operating system or server)
  • Hard disk space: At least 2 GB free disk space.
Included applications: Firewall, Serverschutz, Virus protection
Betriebssystem: Android, Android 10 (Android Q), Android 11 (Red Velvet Cake), Android 12 (Snow Cone), Android 13 (Tiramisu), Android 14 (Upside Down Cake), Arch Linux, CentOS, Debian, Fedora, iOS, iOS 14, iOS 15, Linux, macOS, macOS Sequoia, macOS Sonoma, macOS Tahoe, macOS Big Sur, macOS Catalina, macOS Mojave, macOS Monterey, macOS Ventura, openSUSE Leap, openSUSE Tumbleweed, Red Hat Enterprise, SUSE Linux Enterprise Server, Ubuntu, Windows, Windows 7, Windows 8.1, Windows 10, Windows 11, Windows Server , Windows Server 2008, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022
Related links to "Kaspersky Total Security for Business"
Read, write and discuss reviews... more
Customer evaluation for "Kaspersky Total Security for Business"
Write an evaluation
Evaluations will be activated after verification.
Please enter these characters in the following text field.

The fields marked with * are required.

I have read the data protection information.

Kaspersky Internet Security for Android
Kaspersky Kaspersky Internet Security for Android Kaspersky Internet Security for Android: More ...
£7.03 *
Artikel: 241821000
NEW
Kaspersky Total Security
Kaspersky Kaspersky Total Security 2026 Upgrade Kaspersky Total Security Upgrade: A new level ...
From £16.82 *
Artikel: 241820240
Kaspersky Internet Security 2024 Upgrade
Kaspersky Kaspersky Internet Security 2026 Upgrade Features of Kaspersky Internet Security Upgrad...
From £15.93 *
Artikel: 241820239
NEW
Kaspersky Total Security 2024
Kaspersky Kaspersky Total Security 2026 When your family is online, we make sure they'...
From £17.71 *
Artikel: SW03102
Kaspersky Internet Security 2026
Kaspersky Kaspersky Internet Security 2026 Kaspersky Internet Security: The guardian of y...
From £15.93 *
Artikel: 241820142
Viewed