kaspersky endpoint security business presentation
Post on 12-Jan-2017
426 Views
Preview:
TRANSCRIPT
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Cyber Incidents Investigati
on
2
Threat reportsTargeted
attacks and malware
campaigns
Continued Exploitation of
Vulnerabilities in 3rd party software
325,000New Endpoint Threats per
day
Increased Threats to Mac
machines
Exponential growth of mobile
malware
WHAT WE SEE TODAY
3
WHAT IS NEEDED TO SECURE YOUR BUSINESS?
Security Intelligence
A comprehensive security platform that leverages all
three
Multi-layered protection against know, unknown and advanced threats
Innovative Technology
5
GLOBAL RESEARCH AND ANALYSIS TEAMWORLD’S LEADING THREAT RESEARCH
EXPERTS
THREAT DISCOVERY CULTURE
ACCUMULATED KNOWLEDGE
AUTOMATEDSYSTEMS
5
KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION*
5
20 40 60 80 1000%
20%
40%
60%
80%
100%
N of independent tests/reviews
Scor
e of
TO
P 3
plac
es
Bitdefender
Sophos
G DATASymantec
F-Secure Intel Security (McAfee)
Trend Micro
Avira
Avast
BullGuard
AVG
ESET
AhnLabMicrosoft
Panda Security
In 2014 Kaspersky Lab products participated in 93 independent tests and reviews. Our products were awarded 51 firsts and received 66 top-three finishes.
* Notes:• According to summary results of
independent tests in 2014 for corporate, consumer and mobile products.
• Summary includes tests conducted by the following independent test labs and magazines: Test labs: AV-Comparatives, AV-Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, VirusBulletin
• The size of the bubble reflects the number of 1st places achieved.ThreatTrack (VIPRE)
Qihoo 360
Kingsoft
Tencent
Kaspersky Lab1st places – 51
Participation in 93 tests/reviewsTOP 3 = 71%
KASPERSKY LAB MULTILAYER SECURITYKn
own
Thre
a ts
File Download File Start File Execution
29%70% 1%
Proactive Technologies
Reactive Technologies
Anti
-Ph
ishi
ng
(em
ail
traffi
c)
HIP
S &
Fi
rew
all
(net
wor
k tr
affic)
URL
Fi
lter
ing
(web
tr
affic)
Anti
-Spa
m(e
mai
l tr
affic)
Blac
klis
ti ng
Unk
no wn
Thre
ats
Heu
rist
ic s
Whi
telis
ti ng
App
Co
ntro
l Ad
vanc ed
Thre
ats
BSS AE P
Syst
ems
Wat
che r
Kaspersky Security Network
Vulnerability Assessment & Patch Management
6
7
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Internet GatewayCollaboration MailTOTALInventories &
License ControlSoftware
Distribution OS deployment SIEM integration
Data Encryption
ADVANCED
Mobile Application Management
MobileDevice Management
DeviceControl
ApplicationControl
WebControl
File Server Security
MobileSecuritySELECT
Anti-Malware + Firewall
Kaspersky SecurityCenter
CORE
Cloud-enabled via theKaspersky Security Network
(KSN) Endpoint Management Infrastructur
e
Vulnerability Assessment & Patch Management
HIPS and Personal Firewall
System watcherAutomatic Exploit Prevention
Cloud-based protection Heuristic scanning
4
MULTI-LAYERED PROTECTIONThe best security foundation possible – Kaspersky Lab’s industry-leading protection against known, unknown and advanced threats
Signature-based protection
Powerful multi-layered protection from all forms of cyber-threatKNOWN
UNKNOWN
ADVANCED
5
POWERED BY GLOBAL INTELLIGENCE NETWORKKASPERSKY SECURITY NETWORK
Continuously feeds new data to protection
components
Global security intelligence
Global cloud network -threat related information
from 60 million+ users
KASPERSKY GLOBAL USERS
KASPERSKY SECURITYNETWOR
K
10
ENDPOINT CONTROL
DEVICE CONTROL
APPLICATION CONTROLWITH DYNAMIC WHITELISTING
WEB CONTROL
11
UNAUTHRIZED ACCESS TO
CORPORATE DATA
MOBILE MALWARE
DEVICELOSS OR THEFT
EMM ADMINISTRATION
COMPLEXITY
ONE MORE SOLUTION TO
IMPLEMENT & MANAGE
MOBILE SECURITY
MOBILE DEVICE
MANAGEMENT
MOBILE APPLICATION
MANAGEMENTCENTRALIZEDMANAGEMENT
MOBILE SECURITY AND MANAGEMENT
12
DATA ENCRYPTIONSimple Administration – Complex Capabilities
• File/folder (FLE)
• Full disk (FDE)
POWERFUL DATAENCRYPTION
• Application controls
• Device controls
RICH UNPARALLELEDINTEGRATION WITHCONTROL TOOLS
• Transparent/single sign-on
• Minimized footprint
OPTIMIZED FOR MINIMAL END-USER IMPACT
• Easy password recovery
• Remote management
STREAMLINEDADMINISTRATION• Pre-boot authentication
• Non-qwerty keyboards• 2-factor authentication
via tokens or smart cards
AUTHENTICATION
FLEXIBLE
13
KASPERSKY SYSTEMS MANAGEMENTEnhance security and manage complexity
• Hardware & software inventories
• License management & compliance
• Guest device policies
INVENTORIES &LICENSE CONTROL
• Multicast technology supported
• Policies for automatic distribution
• Optional after-hours deployment
SOFTWAREDISTRIBUTION• Easy image creation &
deployment• Wake-on-LAN support• Post-installation editing
support
OPERATING SYSTEMSDEPLOYMENT
• HP ArcSight & IBM QRadar
• Enterprise-level reporting
• Improved IT security
INTEGRATION
SIEM
• Remote troubleshooting• Role-Based Access Control• Control of all IT security areas
across the corporate network
CENTRALIZEDMANAGEMENT
• Vulnerability detection & prioritization
• Distribution of patches & updates
• Patch delivery status reports
VULNERABILITY ASSESSMENT AND PATCH MANAGEMENT
14
KASPERSKY TOTAL SECURITY FOR BUSINESS Comprehensive infrastructure protection beyond the endpoint
Security for Mail Server• Kaspersky Security for
Linux Mail Server• Kaspersky Security for
Microsoft Exchange Servers• Kaspersky Anti-Virus
for Lotus Notes/Domino
Security for Internet Gateway• Kaspersky Anti-Virus
for Proxy Server• Kaspersky Anti-Virus
for Microsoft ISA Server and Forefront TMG
Security for Collaboration• Kaspersky Security
for Microsoft SharePoint Server
14
15
IT SECURITY MANAGEMENT
Endpoint security technologies built into this single platform All managed through a single management console: Kaspersky Security Center
KASPERSKY SECURITY CENTER
DESKTOPS
VIRTUAL DESKTOPS
SERVERS
TABLETS
LAPTOPS
SMART-PHONES
16
TARGETED SOLUTIONS
File Servers Systems Management
Mobile Mail Servers
Virtualization Collaboration Storage Internet Gateways
17
KASPERSKY ENDPOINT SECURITY FOR BUSINESSPowerful multi-layered protection against known, unknown and advanced threats, designed and built by the industry’s leading security experts. Kaspersky Endpoint Security for Business, backed by world-renowned threat intelligence, provides unequalled IT security and control
LET'S TALK?VISIT US AT WWW.DATAUNIT.BE
top related