KasperskyTotal security for business delivers the most complete platform of protection and management offered in the industry today. Kaspersky Total Security for Business secures every layer of user’s network and includes powerful configuration tools to ensure users are productive and free from the threat of malware, regardless of device or location
Kaspersky Total Security for Business combines multiple technologies to protect all devices and environments against a constantly evolving cyber-threat landscape. Security controls along with Automatic Exploit Prevention, Host-Based Intrusion Prevention System and others significantly reduce the probability of a malware intrusion. A host of other technologies and processes detect and identify the malware at endpoint to stop it in its tracks and roll-back its actions.
Millions of Kaspersky customers worldwide voluntarily provide anonymized threat data from their devices to Kaspersky Security Network (KSN). This cloud-based threat lab gathers and stores massive volumes of metadata from suspicious files that enable it to make rapid, accurate decisions about the safety of files and URLs without having to completely analyze their content. This enables protection from unknown threats.
It’s not unusual for businesses to run a variety of server platforms across their IT infrastructure, from Windows-and Linux cluster servers to Microsoft and Citrix terminal servers. Kaspersky protects them all, and optimized scanning processes mean minimal impact on server performance. Should one of your file servers develop a fault, our technologies automatically re-launch when the file server restarts.
Mobile devices are used in every business today, opening up a potential route into your corporate network. Kaspersky Endpoint Security for Business Select protects mobile devices against the latest mobile threats; anti-phishing technology protects against websites that try to steal information; and anti-spam filters out unwanted calls and texts. Containerization technology separates corporate data and applications from a user’s personal data, keeping corporate data safe if a device goes missing. Remotely operated protection features can delete the corporate container safely without affecting personal data and settings.
There are thousands of new applications on the market, and the number is growing every day. Keeping track of which are potentially dangerous and which aren’t is a challenge. Kaspersky’s dynamic whitelisting approach allows system administrators to activate a Default Deny policy that blocks all applications – unless they’re on your whitelist. Our in-house whitelisting lab constantly checks applications for security issues, adding them to the database of whitelisted applications (this database includes over 1.3 billion unique files – with 1 million files being added every day). Kaspersky customers have access to this database for use as is, or to adapt to their specific business requirements. Test mode ensures that no accidental blocking of business-critical applications takes place and there is no unwanted impact on functionality.
To prevent unauthorized devices gaining access to your network, Kaspersky’s device controls enable you to set up controls based on time of day, geographical location or type of device. You can align the controls with Active Directory for granular administration and policy assignment and employ masks in the creation of Device Control rules and whitelist multiple devices if required. Kaspersky Total Security for Business also logs all ‘delete and copy’ operations performed on removable USB devices, and manages user rights for file ‘read and write’ operations on CD/DVDs.
With more and more time spent online, including at work, Kaspersky’s web control tools let you set up Internet access policies and monitor Internet usage. It’s easy to prohibit, limit, allow and audit users’ activities on individual websites and/or categories of sites, such as games websites, social networks or gambling sites. Geographic and time-of-day controls can be aligned with Active Directory to help administrate and set policies.
KKaspersky Endpoint Security for Business Advanced uses the AES-256 encryption algorithm to deliver strong encryption to protect confidential information. If files or systems are lost or stolen, unauthorized users can’t access the encrypted data. Our encryption is fully FIPS 140-2 compliant.
Data encryption is easy to configure and can be managed from the same management console that you use to control all other Kaspersky Lab endpoint security technologies running on your network. Our encryption technologies have been developed in-house from a unified code base, making it easier to apply encryption settings in line with the same policies that cover your anti-malware defenses, endpoint controls and other endpoint security technologies.
Full Disk Encryption (FDE) operates on the physical sectors of the disk and makes it easy to run an ‘encrypt everything at once’ strategy. File-Level Encryption (FLE) enables the secure sharing of data across your network. For additional security – when a file is encrypted – the original, unencrypted file can be wiped from the hard drive.
By checking all documents against lists of prohibited content – including explicit words / phrases and the use of offensive language – content filtering helps to control and assign internal collaboration policies. With pre-installed dictionaries / categories – as well as the ability to create your own list of prohibited words and phrases – it’s easy to configure content filtering according to your requirements.
Kaspersky Total Security for Business analyzes the content of documents stored in Microsoft SharePoint Server and automatically registers and blocks anything that holds confidential or sensitive data. It scans for words in pre-installed glossaries – or custom glossaries – as well as for structured data.*
Rs. 650.00 ( Per Year )
Rs. 63870.00 ( Per Year )
Kaspersky Endpoint Security for Business Select
Symantec Endpoint Encryption
K7 Enterprise Security
Quick Heal AntiVirus Pro
Sophos Endpoint Protection
Check Point Advanced Endpoint Security
F Secure Business Suite
--Questions not available--
Search Software Easily