Kaspersky Endpoint Security for Business Advanced combines multi-layered security with extended control tools to deliver an agile security solution that rapidly adapts to protect against new threats. The security and systems management console drives efficiency, while extra layers of defence help eliminate vulnerabilities and further safeguard sensitive data.
Adaptive security with extended management & data protection
One management console
From the ‘single pane of glass’ management console, administrators can view and manage the entire security landscape and apply your chosen security policies to every endpoint in your business. This helps deploy security rapidly and with minimum interruption or fuss, using the wide range of preconfigured scenarios.
Agile, adaptive security
The product is designed to work within any IT environment. It employs a full stack of proven and Next Gen technologies and prevent detected attacks; built-in sensors and integration with Endpoint Detection and Response (EDR) enable the capture of large volumes of data to discover even the most obscure, sophisticated cyberattacks.
A single product – transparent costs
With multiple security technologies built into a single product, there are no hidden costs. One product means one license – and all you need to protect your IT estate.
Customer satisfaction assured
Our strong focus on R&D means that our products deliver the security you need. Decision-makers like you consistently express outstanding levels of satisfaction with the results, as regularly confirmed in independent surveys and reports.
Cloud-enabled endpoint controls
Unique Anomaly and Application Controls
Adaptive Anomaly Control, which automatically uplifts security levels to the highest level appropriate to each role in the organization, is complemented by enterprise-grade Application Control and an always-up–to-date whitelisting database.
Host Intrusion Prevention (HIPS)
Regulates access to sensitive data and recording devices by using local and cloud (Kaspersky Security Network) reputations databases, without affecting the performance of authorized applications.
Device Control, Web Control and more…
Encryption and data protection
Your security team can centrally enforce FIPS 140.2 and Common Criteria-certified encryption – at file, disk or device-level – and manage native encryption tools such as Microsoft BitLocker and macOS FileVault.
Unified, integrated policy
Unique integration of encryption with Application and Device Controls provides an additional layer of security and administrative ease.
Core threat protection features
Behavioral Detection and Automatic Rollback
Identifies and protects against advanced threats, including ransomware, fileless attacks and admin account takeovers. Behavior Detection blocks attacks, while Automatic Rollback reverses any changes already made.
Protection against encryption for shared folders
A unique anti-cryptor mechanism is capable of blocking the encryption of files on shared resources conducted by a malicious process running on another machine on the same network.
Protection for containers and terminal servers
Protects Windows Server containers and a wide range of remote access environments including Microsoft Remote Desktop Services and Citrix XenApp/Xen Desktop. Traffic Security component provides protection for web and mail traffic on the terminal server.
Exploit Prevention, Anti-rootkit technology and more…
Mobile Threat Defense features
Innovative anti-malware technologies
Combining ML-based, proactive and cloud-assisted detection with real-time protection. Web protection, on-demand and scheduled scans all increase security.
Deployment Over the Air (OTA) provisioning and more...
System, vulnerabilities and patch management
Advanced in-depth scanning for vulnerabilities is complemented by the automated distribution of patches.
Time-saving OS and software deployment
Create, store and deploy system images from a central location. This is ideal for upgrade to Microsoft Windows 10, for example, or deploying 150 popular applications identified by Kaspersky Security Network.
Hardware, software and license management
Hardware and software inventory reports help control software license obligations. Save on costs by centrally provisioning software rights.
Support and Professional Services
Professional help is available whenever you need it. Operating in more than 200 countries, from 34 offices worldwide, we have you covered 24/7/365. Take advantage of our Premium Support packages (MSA), or call on our Professional Services to ensure that you derive maximum benefit and ROI from your Kaspersky Lab security installation.
The protection and management capabilities you need
Kaspersky Lab has built powerful enterpriseclass features into the progressive tiers of our products. We’ve made sure that the technology is uncomplicated and flexible enough for any-sized business to use.
Multiple protection layers for
• Windows, Linux and Mac
• Windows and Linux servers
• Windows Server containers
• Android and other mobile devices
• Removable storage
Unparalleled security against
• Software exploits
• Mobile malware
• Advanced threats
• Fileless threats
• PowerShell & script-based attacks
• Web threats
• Anti-Malware (next level)
• Vulnerability Management
• Security Policy Adviser
• AI-based learning
• AMSI support (new)
• Encrypted traffic scanning (new)
• Process isolation
• Exploit Prevention and Rollback
• Firewall and OS firewall management
• Cloud-assisted protection
• Integrated EDR agent
• Adaptive Anomaly Control (new)
• Applicaiton, Web and Device Controls
• Server and containers protection (next level)
• Protection for terminal servers
• Windows Linux Subsystem support (new)
• Mobile Threat Defense (next level)
• OS encryption management
• System configuration & deployment
• Patch Management (next level)