SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
Introducing
    KASPERSKY ENDPOINT SECURITY FOR BUSINESS




1
Business drivers and their impact on IT
                                                                         66% of business owners
        AGILITY             Move fast, be nimble and flexible          identify business agility as a
                                                                                  priority


                            Cut costs                                  54% of organisations say that
     EFFICIENCY                                                          their business processes
                            Consolidate and streamline                      could be improved


                            Maximise the value of existing resources   81% of business owners cite
    PRODUCTIVITY                                                        operational efficiencies as
                            Do more with less                            their top strategic priority




    IMPACT ON IT
    IT complexity: more data, more systems, more technology
    Pressure on resources and budgets
2
And then, there’s the rise of malware…

                                                          New Threats Every Day   200K




                      Malicious programs specifically targeting mobile devices    >35K




                             Malware files in Kaspersky Lab collection Jan 2013   >100m




        1999   2001   2003      2005      2007     2009        2011    2013


3
The impact on IT security
                                             Response:
           Malware                           Anti-malware plus
                                             management tool / dashboard


                                Response:
        The #1 target:          Systems / patch
        applications!           management


                                                              YOUR DATA
        Your data is on         Response:
          the move!             Data encryption


                                             Response:
                                             Mobile device
        Mobile / BYOD                        management (MDM)




4
The impact on IT security
                                                       Response:
           Malware                                     Anti-malware plus
                                                       management tool / dashboard


                                              Response:
        The #1 target:           This is complexity / patch
                                              Systems
        applications!COMPLEXITY IS THE ENEMY OF IT SECURITY
                                              management


                                                                        YOUR DATA
        Your data is on                   Response:
          the move!                       Data encryption


                                                       Response:
                                                       Mobile device
        Mobile / BYOD                                  management (MDM)




5
What if?

           Malware




                          1
        The #1 target:
        applications!     PLATFORM
                          MANAGEMENT CONSOLE
                          COST YOUR DATA
        Your data is on
          the move!



        Mobile / BYOD




6
Introducing . . .


              KASPERSKY
            ENDPOINT SECURITY
            FOR BUSINESS



7
Kaspersky Endpoint Security for Business
    This single platform contains:




                                     Anti-malware                 Mobile security
                              traditional & cloud-assisted      MDM plus mobile security
                                                                        agent


                                 Systems
                                management                          Data encryption
                                 including patch                         file / folder,
                                  management                                full-disk
                                                     Endpoint
                                                   control tools:
                                                   application, device
                                                    and web control



8
Kaspersky Endpoint Security for Business
    All managed through a single management console:
    Kaspersky Security Center




                                Anti-malware                    Mobile security
                            traditional & cloud-assisted      MDM plus mobile security
                                                                      agent


                               Systems
                              Management                          Data encryption
                               including patch                         file / folder,
                                management                                full-disk
                                                   Endpoint
                                                 control tools:
                                                 application, device
                                                  and web control



9
For the first time, you can:
                 SEE                    CONTROL                      PROTECT
      Physical, virtual, mobile   Configure and deploy          Evolve beyond anti-virus
      Identify vulnerabilities    Set and enforce IT policies   Meet security demands
      Inventory HW and SW         Manage employee-owned         Protect data and devices
      Take action with clear      devices                       anywhere
      reporting                   Prioritise patches            Rely on Kaspersky
                                  License Management            expertise

                                  NAC




10
Bringing two benefits together
     Deeper protection + seamless manageability

           ENDPOINT / INFRASTRUCTURE               KASPERSKY SECURITY CENTER
           Anti-malware                             Mobile Device Management (MDM)
           Endpoint control tools                   Systems Management
           Encryption                               Security Policy Enforcement
           Mail and internet gateway security
           Collaboration

                                                                 Kaspersky
                                                               Security Center




           Smartphones              Servers
           Tablets                  Workstations
                                    Laptops




11
Anti-malware
     The foundation of the platform



                                Multi-point scanning


                                                                                      Kaspersky Anti-malware
                                         Cloud-assisted
                                                                                           Technology

                                         Award-winning


                                                                                                Kaspersky
                                                                                              Security Center




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
12
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
Data encryption
     Keeping your data safe, wherever it goes
     Encryption features
        File / folder or full-disk                                                    Integrates with device
        Transparent to end-users                                                      control and application
                                                                                      control


                                                   Inside the Network                                           Outside the Network




                                                      Transparent encryption
                                                          and decryption




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
13
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
Mobile security
     Mobile endpoint + MDM                                                                                       Kaspersky
                                                                                                               Security Center
                                                                        Mobile Device
                                                                      Management (MDM)
                                                                                                                  MDM



                                                                                              Microsoft
         Two components                                                                      Exchange                             Apple MDM
                                                                                             ActiveSync




                                                                        Endpoint Agent for
                                                                                                  *
                                                                         Mobile Devices
                                                                                         *                 *
                                                                                             Smartphones                         iOS devices
                                                                                             Tablets
                                                                                              •   Android
                                                                                              •   Windows
                                                                                              •   Symbian
       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure           •   Blackberry
14   MALWARE   ENCRYPTION
                            Mobile Security
                                              MANAGEMENT    TOOLS
Mobile solution features
                CONFIGURE/DEPLOY                                                           SECURITY                 ANTI-THEFT

                Via SMS, email or tether                                              Anti-malware              GPS find
                                                                                      Anti-phishing             Remote block
                                                                                      Anti-spam




               POLICY COMPLIANCE                                                         APPLICATIONS              DATA ACCESS

                Set password                                                          Containerisation          Data Encryption
                Jailbreak / Root notice                                               Data access restriction   Remote wipe
                Force settings




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
15
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
The perfect solution for BYOD
     Containerisation                                                                         Private ‘App’ Portal

                                                                                                          
                                                                                                  App     App
               Corporate

                                  Personal



                                                                  Keeps corporate                         
                                                                                                  App     App
                                                                  data separate                                        Kaspersky
                                                                                                                     Security Center
                                                                  Encrypted                               
                                                                                                  App     App
                                                                  Selectively wiped
                                                                                                          
                                                                                                  App     App




       ANTI             DATA                           SYSTEMS     CONTROL   Infrastructure
16
                                   Mobile Security
     MALWARE         ENCRYPTION                      MANAGEMENT     TOOLS
Systems management
     Staying up-to-date just got faster and easier
               SYSTEM PROVISIONING                                                    LICENCE MANAGEMENT            REMOTE TOOLS

                Create images                                                          Track usage                Install applications
                Store and update                                                       Manage renewals            Update applications
                Deploy                                                                 Manage licence             Troubleshoot
                                                                                       compliance




                  VULNERABILITY                                                       ADVANCED PATCHING           NETWORK ADMISSION
                      SCANNING                                                                                      CONTROL (NAC)
                HW and SW inventory                                                    Automated prioritisation   Guest policy
                Multiple vulnerability                                                 Reboot options             management
                databases                                                                                         Guest portal




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
17
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
Control tools
     Applications, devices and web


          DEVICE CONTROL




          WEB CONTROL




          APPLICATION CONTROL
          WITH DYNAMIC WHITELISTING



       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
18   MALWARE   ENCRYPTION
                            Mobile Security
                                              MANAGEMENT    TOOLS
Mail, Internet gateway and collaboration
     Comprehensive infrastructure protection

                          Security                                                     Security             Security
                          for Mail                                              For Internet Gateways   For Collaboration
               Microsoft Exchange                                                 Microsoft ISA/TMG     Microsoft SharePoint
                                                                                  Squid                 servers
               Lotus Notes/Domino
               Linux Mail Servers                                                 Firewall




            DATA                          SYSTEMS    CONTROL   Infrastructure
19       ENCRYPTION
                      Mobile Security
                                        MANAGEMENT    TOOLS
Supported and powered by the Kaspersky
     Security Network

           Global cloud network
            of millions of users


          Dynamic reputation of
         applications and websites


          Improves performance
        and reduces false positives


          Tightly integrated with
           protection features
                                      KASPERSKY GLOBAL USERS


20
Kaspersky Endpoint Security for Business:
     Progressive, feature-rich tiers

                                APP, DEVICE,    MOBILE       DATA        SYSTEMS     MAIL, WEB AND
                ANTI-MALWARE   WEB CONTROL     SECURITY   ENCRYPTION   MANAGEMENT   COLLABORATION


        TOTAL


     ADVANCED


       SELECT


        CORE




21
In detail
            Total
                       Collaboration                       Mail                     Internet Gateway

        Advanced    Licence Management         Network Admission (NAC)            Software Installation

                    System Provisioning             Patch Management               Vulnerability Scan




                                                                                                          Kaspersky Security Center
                                                     Data Encryption

           Select        Mobile Endpoint Security                     Mobile Device Management (MDM)

                                                    File Server Security

                    Application Control              Device Control                  Web Control

            Core                                Anti-malware + Firewall

                                          Endpoint             Management             Infrastructure

                       Cloud-enabled via the
                       Kaspersky Security Network (KSN)



22
Plus: additional targeted solutions
     Kaspersky Security for...


          File           Systems           Storage         Mail
         Servers        Management


         Mobile         Virtualization   Collaboration    Internet
                                                         Gateways




23
Summary: a unique set of benefits
                 SEE           CONTROL          PROTECT




               Deeper                IT           Unified
              protection        efficiency      management



                   REDUCE BUSINESS RISK, WITH MAXIMUM
                           BUSINESS EFFICIENCY
                     – WITH KASPERSKY, NOW YOU CAN




24
Why Kaspersky for your business?


      AWARD-WINNING ANTI-MALWARE



                           Over 80 IT, networking security and communications vendors have
      KASPERSKY INSIDE    chosen to embed Kaspersky Lab anti-malware technology inside their
                            own solutions, including Microsoft, IBM, Checkpoint and Juniper.



                             We do not acquire technologies and then try to integrate them.
      BUILT, NOT BOUGHT   Every feature and function is built up from the same, single code base.




25
KASPERSKY ENDPOINT SECURITY FOR BUSINESS




     www.kaspersky.com/business
26

Mais conteúdo relacionado

Mais procurados

Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXZivaro Inc
 
OpenITSM - IT Service Management with Open Source
OpenITSM - IT Service Management with Open SourceOpenITSM - IT Service Management with Open Source
OpenITSM - IT Service Management with Open SourceJulian Hein
 
Cyber Security Operations Center (C-SOC)
Cyber Security Operations Center (C-SOC) Cyber Security Operations Center (C-SOC)
Cyber Security Operations Center (C-SOC) BGA Cyber Security
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
 
Meraki overview sales deck inside sales
Meraki overview sales deck inside salesMeraki overview sales deck inside sales
Meraki overview sales deck inside salesHaffizulla Rahman
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Syed Sabhi Haider
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018JoTechies
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpointsCisco Canada
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market OverviewOkta-Inc
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information SecurityCompTIA
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 

Mais procurados (20)

Knox Manage Sales Deck
Knox Manage Sales DeckKnox Manage Sales Deck
Knox Manage Sales Deck
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
 
OpenITSM - IT Service Management with Open Source
OpenITSM - IT Service Management with Open SourceOpenITSM - IT Service Management with Open Source
OpenITSM - IT Service Management with Open Source
 
Cyber Security Operations Center (C-SOC)
Cyber Security Operations Center (C-SOC) Cyber Security Operations Center (C-SOC)
Cyber Security Operations Center (C-SOC)
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Meraki overview sales deck inside sales
Meraki overview sales deck inside salesMeraki overview sales deck inside sales
Meraki overview sales deck inside sales
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market Overview
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 

Destaque

Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Kaspersky Security center 10 documentation
Kaspersky Security center 10  documentationKaspersky Security center 10  documentation
Kaspersky Security center 10 documentationTarek Amer
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentationShapeBlue
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Onwubiko Emmanuel
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentKaspersky
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training GameFFFOD
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...UNIDEES Algérie
 

Destaque (15)

Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Kaspersky Security center 10 documentation
Kaspersky Security center 10  documentationKaspersky Security center 10  documentation
Kaspersky Security center 10 documentation
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training Game
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...
 

Semelhante a Introducing New Kaspersky Endpoint Security for Business - ENGLISH

KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxfrancis578223
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overviewsferinga
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overviewsferinga
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityarms8586
 
Advocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureAdvocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureJon Prete
 
Advocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 

Semelhante a Introducing New Kaspersky Endpoint Security for Business - ENGLISH (20)

KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
Advocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureAdvocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management Brochure
 
Advocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device Management
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Renovo CE IT Overview
Renovo CE IT OverviewRenovo CE IT Overview
Renovo CE IT Overview
 

Mais de Kirill Kertsenbaum

PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANPHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANKirill Kertsenbaum
 
vForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANvForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANKirill Kertsenbaum
 
IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...Kirill Kertsenbaum
 
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANIntroducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANKirill Kertsenbaum
 
Kaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKirill Kertsenbaum
 
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...Kirill Kertsenbaum
 
Kaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKirill Kertsenbaum
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKirill Kertsenbaum
 
Cybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANCybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANKirill Kertsenbaum
 
Russian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANRussian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANKirill Kertsenbaum
 
Russian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANRussian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANKirill Kertsenbaum
 

Mais de Kirill Kertsenbaum (12)

PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANPHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
 
vForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANvForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIAN
 
IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...
 
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANIntroducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
 
Kaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIAN
 
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
 
Kaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIAN
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
 
Cybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANCybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIAN
 
DLP in global view - RUSSIAN
DLP in global view - RUSSIANDLP in global view - RUSSIAN
DLP in global view - RUSSIAN
 
Russian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANRussian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIAN
 
Russian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANRussian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIAN
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

Introducing New Kaspersky Endpoint Security for Business - ENGLISH

  • 1. Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1
  • 2. Business drivers and their impact on IT 66% of business owners AGILITY Move fast, be nimble and flexible identify business agility as a priority Cut costs 54% of organisations say that EFFICIENCY their business processes Consolidate and streamline could be improved Maximise the value of existing resources 81% of business owners cite PRODUCTIVITY operational efficiencies as Do more with less their top strategic priority IMPACT ON IT IT complexity: more data, more systems, more technology Pressure on resources and budgets 2
  • 3. And then, there’s the rise of malware… New Threats Every Day 200K Malicious programs specifically targeting mobile devices >35K Malware files in Kaspersky Lab collection Jan 2013 >100m 1999 2001 2003 2005 2007 2009 2011 2013 3
  • 4. The impact on IT security Response: Malware Anti-malware plus management tool / dashboard Response: The #1 target: Systems / patch applications! management YOUR DATA Your data is on Response: the move! Data encryption Response: Mobile device Mobile / BYOD management (MDM) 4
  • 5. The impact on IT security Response: Malware Anti-malware plus management tool / dashboard Response: The #1 target: This is complexity / patch Systems applications!COMPLEXITY IS THE ENEMY OF IT SECURITY management YOUR DATA Your data is on Response: the move! Data encryption Response: Mobile device Mobile / BYOD management (MDM) 5
  • 6. What if? Malware 1 The #1 target: applications! PLATFORM MANAGEMENT CONSOLE COST YOUR DATA Your data is on the move! Mobile / BYOD 6
  • 7. Introducing . . . KASPERSKY ENDPOINT SECURITY FOR BUSINESS 7
  • 8. Kaspersky Endpoint Security for Business This single platform contains: Anti-malware Mobile security traditional & cloud-assisted MDM plus mobile security agent Systems management Data encryption including patch file / folder, management full-disk Endpoint control tools: application, device and web control 8
  • 9. Kaspersky Endpoint Security for Business All managed through a single management console: Kaspersky Security Center Anti-malware Mobile security traditional & cloud-assisted MDM plus mobile security agent Systems Management Data encryption including patch file / folder, management full-disk Endpoint control tools: application, device and web control 9
  • 10. For the first time, you can: SEE CONTROL PROTECT Physical, virtual, mobile Configure and deploy Evolve beyond anti-virus Identify vulnerabilities Set and enforce IT policies Meet security demands Inventory HW and SW Manage employee-owned Protect data and devices Take action with clear devices anywhere reporting Prioritise patches Rely on Kaspersky License Management expertise NAC 10
  • 11. Bringing two benefits together Deeper protection + seamless manageability ENDPOINT / INFRASTRUCTURE KASPERSKY SECURITY CENTER Anti-malware Mobile Device Management (MDM) Endpoint control tools Systems Management Encryption Security Policy Enforcement Mail and internet gateway security Collaboration Kaspersky Security Center Smartphones Servers Tablets Workstations Laptops 11
  • 12. Anti-malware The foundation of the platform Multi-point scanning Kaspersky Anti-malware Cloud-assisted Technology Award-winning Kaspersky Security Center ANTI DATA SYSTEMS CONTROL Infrastructure 12 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 13. Data encryption Keeping your data safe, wherever it goes Encryption features File / folder or full-disk Integrates with device Transparent to end-users control and application control Inside the Network Outside the Network Transparent encryption and decryption ANTI DATA SYSTEMS CONTROL Infrastructure 13 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 14. Mobile security Mobile endpoint + MDM Kaspersky Security Center Mobile Device Management (MDM) MDM Microsoft Two components Exchange Apple MDM ActiveSync Endpoint Agent for * Mobile Devices * * Smartphones iOS devices Tablets • Android • Windows • Symbian ANTI DATA SYSTEMS CONTROL Infrastructure • Blackberry 14 MALWARE ENCRYPTION Mobile Security MANAGEMENT TOOLS
  • 15. Mobile solution features CONFIGURE/DEPLOY SECURITY ANTI-THEFT Via SMS, email or tether Anti-malware GPS find Anti-phishing Remote block Anti-spam POLICY COMPLIANCE APPLICATIONS DATA ACCESS Set password Containerisation Data Encryption Jailbreak / Root notice Data access restriction Remote wipe Force settings ANTI DATA SYSTEMS CONTROL Infrastructure 15 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 16. The perfect solution for BYOD Containerisation Private ‘App’ Portal   App App Corporate Personal Keeps corporate   App App data separate Kaspersky Security Center Encrypted   App App Selectively wiped   App App ANTI DATA SYSTEMS CONTROL Infrastructure 16 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 17. Systems management Staying up-to-date just got faster and easier SYSTEM PROVISIONING LICENCE MANAGEMENT REMOTE TOOLS Create images Track usage Install applications Store and update Manage renewals Update applications Deploy Manage licence Troubleshoot compliance VULNERABILITY ADVANCED PATCHING NETWORK ADMISSION SCANNING CONTROL (NAC) HW and SW inventory Automated prioritisation Guest policy Multiple vulnerability Reboot options management databases Guest portal ANTI DATA SYSTEMS CONTROL Infrastructure 17 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 18. Control tools Applications, devices and web DEVICE CONTROL WEB CONTROL APPLICATION CONTROL WITH DYNAMIC WHITELISTING ANTI DATA SYSTEMS CONTROL Infrastructure 18 MALWARE ENCRYPTION Mobile Security MANAGEMENT TOOLS
  • 19. Mail, Internet gateway and collaboration Comprehensive infrastructure protection Security Security Security for Mail For Internet Gateways For Collaboration Microsoft Exchange Microsoft ISA/TMG Microsoft SharePoint Squid servers Lotus Notes/Domino Linux Mail Servers Firewall DATA SYSTEMS CONTROL Infrastructure 19 ENCRYPTION Mobile Security MANAGEMENT TOOLS
  • 20. Supported and powered by the Kaspersky Security Network Global cloud network of millions of users Dynamic reputation of applications and websites Improves performance and reduces false positives Tightly integrated with protection features KASPERSKY GLOBAL USERS 20
  • 21. Kaspersky Endpoint Security for Business: Progressive, feature-rich tiers APP, DEVICE, MOBILE DATA SYSTEMS MAIL, WEB AND ANTI-MALWARE WEB CONTROL SECURITY ENCRYPTION MANAGEMENT COLLABORATION TOTAL ADVANCED SELECT CORE 21
  • 22. In detail Total Collaboration Mail Internet Gateway Advanced Licence Management Network Admission (NAC) Software Installation System Provisioning Patch Management Vulnerability Scan Kaspersky Security Center Data Encryption Select Mobile Endpoint Security Mobile Device Management (MDM) File Server Security Application Control Device Control Web Control Core Anti-malware + Firewall Endpoint Management Infrastructure Cloud-enabled via the Kaspersky Security Network (KSN) 22
  • 23. Plus: additional targeted solutions Kaspersky Security for... File Systems Storage Mail Servers Management Mobile Virtualization Collaboration Internet Gateways 23
  • 24. Summary: a unique set of benefits SEE CONTROL PROTECT Deeper IT Unified protection efficiency management REDUCE BUSINESS RISK, WITH MAXIMUM BUSINESS EFFICIENCY – WITH KASPERSKY, NOW YOU CAN 24
  • 25. Why Kaspersky for your business? AWARD-WINNING ANTI-MALWARE Over 80 IT, networking security and communications vendors have KASPERSKY INSIDE chosen to embed Kaspersky Lab anti-malware technology inside their own solutions, including Microsoft, IBM, Checkpoint and Juniper. We do not acquire technologies and then try to integrate them. BUILT, NOT BOUGHT Every feature and function is built up from the same, single code base. 25
  • 26. KASPERSKY ENDPOINT SECURITY FOR BUSINESS www.kaspersky.com/business 26