KasperskyEndpoint Security for BusinessSELECT
Protection and control you can trust – for every endpoint
With more of your business operations going digital, you need to protect every server, laptop and mobile device on your network. Select tier combines multi-layered technologies with flexible cloud management and centralized application, web and device controls to protect your sensitive data on every endpoint.
- Protects against the latest security threats, including fileless threats
- Reduces your exposure to cyberattacks with endpoint hardening
- Helps boost productivity and keeps employees safe with cloud-enabled controls
- Protects endpoints without impacting on performance
- Secures diverse environments – PC, Mac, Linux, iOS & Android
- Simplifies security management with a unified console
Enter number of desktops and servers 0 to 0
Performance & multi-layered protection
Security shouldn’t slow you down, so our security has minimal impact on system performance. And if you’re attacked, the Remediation Engine undoes most malicious actions, so users can keep working without interruption.
Agile protection technologies
Delivering world-class security – including post execution Behavior Detection and Machine Learning technologies – to help reduce your attack risk and keep all your endpoints safe and secure, with less need to download frequent updates.
‘Best of both worlds’ management console
In the cloud, on-premises or both? You decide - and we’ll provide unified management via the cloud console or traditional console deployment on-premise, in AWS or Azure cloud environments. Deploy security and policies quickly and easily, using any of our preconfigured scenarios.
Straightforward migration
Provides straightforward migration from third-party endpoint protection, helping to make your transition error-free. Our post-deployment quality assurance audit service will ensure optimum configuration.
Whether your IT is on-site or outsourced, it’s easy to scale, giving you the freedom to change any pre-defined settings and decide when to adopt additional functionality.
Multiple endpoint protection technologies, including malware outbreak policy, vulnerability assessment and mobile threat defense, in a single product. One product - and one license - is all you need to protect user devices.
With 900 patents under our belt, we’re one of only six IT corporations recognized as Derwent Top 100 Global Innovators. All our core technologies are developed in-house – for efficient, integrated protection.
Don’t just take our word for it – our products have participated in more customer surveys and independent tests and achieved more first places than any other vendor.
TIER COMPARISON
Choose the best option for your business. Want to add more functionality? Just upgrade to the next tier.
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for application and terminal servers
Defense for application and terminal servers
Defense for application and terminal servers
Defense for application and terminal servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Behavior Detection, Remediation Engine
Behavior Detection, Remediation Engine
Behavior Detection, Remediation Engine
Behavior Detection, Remediation Engine
Vulnerability Assessment & Exploit Prevention
Vulnerability Assessment & Exploit Prevention
Vulnerability Assessment & Exploit Prevention
Vulnerability Assessment & Exploit Prevention
Environment variable permissions and HIPS
Environment variable permissions and HIPS
Environment variable permissions and HIPS
Environment variable permissions and HIPS
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Advanced SIEM integration, OS & third-party software installation
Advanced SIEM integration, OS & third-party software installation
Advanced SIEM integration, OS & third-party software installation
Advanced SIEM integration, OS & third-party software installation
Additional Information
ADDING MORE SECURITY AS YOU NEED IT
- Minimize IT security risks
- Automate vulnerability assessment
- Distribute patches, updates & applications
- Scans incoming, outgoing & stored mail
- Intelligent spam filtering reduces traffic
- Prevents the loss of confidential data
- Scans HTTP(s), FTP, SMTP & POP3 traffic
- Regulates internet usage
- Protects multiple infrastructures through a multi-tenancy architecture
- Detects and responds to evasive threats
- Real-time situational awareness and control
- Fast, scalable turnkey deployment
Applications Inside
System Requirements
Not sure which security solution is right for your business?