Kaspersky Endpoint Advanced 50-99 Node 2 year Přechod

Kaspersky Endpoint Security for Business Advanced combines multi-layered security with extended control tools to deliver an agile security solution that rapidly adapts to protect against new threats. The security and systems management console drives efficiency, while extra layers of defence help el ... více
Objednací kód: KAS854000117
Kód výrobce: KL4867XAQDW
Záruční lhůta: 6 měs.
Dostupnost: obvykle 48 hodin
Cena bez DPH: 1 241 Kč
Cena s DPH: 1 502 Kč
Porovnání Oblíbené

Kaspersky Endpoint Security for Business Advanced combines multi-layered security with extended control tools to deliver an agile security solution that rapidly adapts to protect against new threats. The security and systems management console drives efficiency, while extra layers of defence help eliminate vulnerabilities and further safeguard sensitive data.

Adaptive security with extended management & data protection

One management console

From the ‘single pane of glass’ management console, administrators can view and manage the entire security landscape and apply your chosen security policies to every endpoint in your business. This helps deploy security rapidly and with minimum interruption or fuss, using the wide range of preconfigured scenarios.

Agile, adaptive security

The product is designed to work within any IT environment. It employs a full stack of proven and Next Gen technologies and prevent detected attacks; built-in sensors and integration with Endpoint Detection and Response (EDR) enable the capture of large volumes of data to discover even the most obscure, sophisticated cyberattacks.

A single product – transparent costs

With multiple security technologies built into a single product, there are no hidden costs. One product means one license – and all you need to protect your IT estate.

Customer satisfaction assured

Our strong focus on R&D means that our products deliver the security you need. Decision-makers like you consistently express outstanding levels of satisfaction with the results, as regularly confirmed in independent surveys and reports.

Key features

Cloud-enabled endpoint controls

Unique Anomaly and Application Controls

Adaptive Anomaly Control, which automatically uplifts security levels to the highest level appropriate to each role in the organization, is complemented by enterprise-grade Application Control and an always-up–to-date whitelisting database.

Host Intrusion Prevention (HIPS)

Regulates access to sensitive data and recording devices by using local and cloud (Kaspersky Security Network) reputations databases, without affecting the performance of authorized applications.

Device Control, Web Control and more…

Encryption and data protection

Comprehensive encryption

Your security team can centrally enforce FIPS 140.2 and Common Criteria-certified encryption – at file, disk or device-level – and manage native encryption tools such as Microsoft BitLocker and macOS FileVault.

Unified, integrated policy

Unique integration of encryption with Application and Device Controls provides an additional layer of security and administrative ease.

Core threat protection features

Behavioral Detection and Automatic Rollback

Identifies and protects against advanced threats, including ransomware, fileless attacks and admin account takeovers. Behavior Detection blocks attacks, while Automatic Rollback reverses any changes already made.

Protection against encryption for shared folders

A unique anti-cryptor mechanism is capable of blocking the encryption of files on shared resources conducted by a malicious process running on another machine on the same network.

Protection for containers and terminal servers

Protects Windows Server containers and a wide range of remote access environments including Microsoft Remote Desktop Services and Citrix XenApp/Xen Desktop. Traffic Security component provides protection for web and mail traffic on the terminal server.

Exploit Prevention, Anti-rootkit technology and more…

Mobile Threat Defense features

Innovative anti-malware technologies

Combining ML-based, proactive and cloud-assisted detection with real-time protection. Web protection, on-demand and scheduled scans all increase security.

Deployment Over the Air (OTA) provisioning and more...

System, vulnerabilities and patch management

Patch management

Advanced in-depth scanning for vulnerabilities is complemented by the automated distribution of patches.

Time-saving OS and software deployment

Create, store and deploy system images from a central location. This is ideal for upgrade to Microsoft Windows 10, for example, or deploying 150 popular applications identified by Kaspersky Security Network.

Hardware, software and license management

Hardware and software inventory reports help control software license obligations. Save on costs by centrally provisioning software rights.

Support and Professional Services

Professional help is available whenever you need it. Operating in more than 200 countries, from 34 offices worldwide, we have you covered 24/7/365. Take advantage of our Premium Support packages (MSA), or call on our Professional Services to ensure that you derive maximum benefit and ROI from your Kaspersky Lab security installation.

The protection and management capabilities you need

Kaspersky Lab has built powerful enterpriseclass features into the progressive tiers of our products. We’ve made sure that the technology is uncomplicated and flexible enough for any-sized business to use.

Multiple protection layers for

• Windows, Linux and Mac
• Windows and Linux servers
• Windows Server containers
• Android and other mobile devices
• Removable storage

Unparalleled security against

• Software exploits
• Ransomware
• Mobile malware
• Advanced threats
• Fileless threats
• PowerShell & script-based attacks
• Web threats

Features included

• Anti-Malware (next level)
• Vulnerability Management
• Security Policy Adviser
• AI-based learning
• AMSI support (new)
• Encrypted traffic scanning (new)
• Process isolation
• Exploit Prevention and Rollback
• Firewall and OS firewall management
• Cloud-assisted protection
• Integrated EDR agent
• Adaptive Anomaly Control (new)
• Applicaiton, Web and Device Controls
• Server and containers protection (next level)
• Protection for terminal servers
• Windows Linux Subsystem support (new)
• Mobile Threat Defense (next level)
• OS encryption management
• System configuration & deployment
• Patch Management (next level)
• Reporting