SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
Introducing
    KASPERSKY ENDPOINT SECURITY FOR BUSINESS




1
Business drivers and their impact on IT
                                                                         66% of business owners
        AGILITY             Move fast, be nimble and flexible          identify business agility as a
                                                                                  priority


                            Cut costs                                  54% of organisations say that
     EFFICIENCY                                                          their business processes
                            Consolidate and streamline                      could be improved


                            Maximise the value of existing resources   81% of business owners cite
    PRODUCTIVITY                                                        operational efficiencies as
                            Do more with less                            their top strategic priority




    IMPACT ON IT
    IT complexity: more data, more systems, more technology
    Pressure on resources and budgets
2
And then, there’s the rise of malware…

                                                          New Threats Every Day   200K




                      Malicious programs specifically targeting mobile devices    >35K




                             Malware files in Kaspersky Lab collection Jan 2013   >100m




        1999   2001   2003      2005      2007     2009        2011    2013


3
The impact on IT security
                                             Response:
           Malware                           Anti-malware plus
                                             management tool / dashboard


                                Response:
        The #1 target:          Systems / patch
        applications!           management


                                                              YOUR DATA
        Your data is on         Response:
          the move!             Data encryption


                                             Response:
                                             Mobile device
        Mobile / BYOD                        management (MDM)




4
The impact on IT security
                                                       Response:
           Malware                                     Anti-malware plus
                                                       management tool / dashboard


                                              Response:
        The #1 target:           This is complexity / patch
                                              Systems
        applications!COMPLEXITY IS THE ENEMY OF IT SECURITY
                                              management


                                                                        YOUR DATA
        Your data is on                   Response:
          the move!                       Data encryption


                                                       Response:
                                                       Mobile device
        Mobile / BYOD                                  management (MDM)




5
What if?

           Malware




                          1
        The #1 target:
        applications!     PLATFORM
                          MANAGEMENT CONSOLE
                          COST YOUR DATA
        Your data is on
          the move!



        Mobile / BYOD




6
Introducing . . .


              KASPERSKY
            ENDPOINT SECURITY
            FOR BUSINESS



7
Kaspersky Endpoint Security for Business
    This single platform contains:




                                     Anti-malware                 Mobile security
                              traditional & cloud-assisted      MDM plus mobile security
                                                                        agent


                                 Systems
                                management                          Data encryption
                                 including patch                         file / folder,
                                  management                                full-disk
                                                     Endpoint
                                                   control tools:
                                                   application, device
                                                    and web control



8
Kaspersky Endpoint Security for Business
    All managed through a single management console:
    Kaspersky Security Center




                                Anti-malware                    Mobile security
                            traditional & cloud-assisted      MDM plus mobile security
                                                                      agent


                               Systems
                              Management                          Data encryption
                               including patch                         file / folder,
                                management                                full-disk
                                                   Endpoint
                                                 control tools:
                                                 application, device
                                                  and web control



9
For the first time, you can:
                 SEE                    CONTROL                      PROTECT
      Physical, virtual, mobile   Configure and deploy          Evolve beyond anti-virus
      Identify vulnerabilities    Set and enforce IT policies   Meet security demands
      Inventory HW and SW         Manage employee-owned         Protect data and devices
      Take action with clear      devices                       anywhere
      reporting                   Prioritise patches            Rely on Kaspersky
                                  License Management            expertise

                                  NAC




10
Bringing two benefits together
     Deeper protection + seamless manageability

           ENDPOINT / INFRASTRUCTURE               KASPERSKY SECURITY CENTER
           Anti-malware                             Mobile Device Management (MDM)
           Endpoint control tools                   Systems Management
           Encryption                               Security Policy Enforcement
           Mail and internet gateway security
           Collaboration

                                                                 Kaspersky
                                                               Security Center




           Smartphones              Servers
           Tablets                  Workstations
                                    Laptops




11
Anti-malware
     The foundation of the platform



                                Multi-point scanning


                                                                                      Kaspersky Anti-malware
                                         Cloud-assisted
                                                                                           Technology

                                         Award-winning


                                                                                                Kaspersky
                                                                                              Security Center




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
12
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
Data encryption
     Keeping your data safe, wherever it goes
     Encryption features
        File / folder or full-disk                                                    Integrates with device
        Transparent to end-users                                                      control and application
                                                                                      control


                                                   Inside the Network                                           Outside the Network




                                                      Transparent encryption
                                                          and decryption




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
13
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
Mobile security
     Mobile endpoint + MDM                                                                                       Kaspersky
                                                                                                               Security Center
                                                                        Mobile Device
                                                                      Management (MDM)
                                                                                                                  MDM



                                                                                              Microsoft
         Two components                                                                      Exchange                             Apple MDM
                                                                                             ActiveSync




                                                                        Endpoint Agent for
                                                                                                  *
                                                                         Mobile Devices
                                                                                         *                 *
                                                                                             Smartphones                         iOS devices
                                                                                             Tablets
                                                                                              •   Android
                                                                                              •   Windows
                                                                                              •   Symbian
       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure           •   Blackberry
14   MALWARE   ENCRYPTION
                            Mobile Security
                                              MANAGEMENT    TOOLS
Mobile solution features
                CONFIGURE/DEPLOY                                                           SECURITY                 ANTI-THEFT

                Via SMS, email or tether                                              Anti-malware              GPS find
                                                                                      Anti-phishing             Remote block
                                                                                      Anti-spam




               POLICY COMPLIANCE                                                         APPLICATIONS              DATA ACCESS

                Set password                                                          Containerisation          Data Encryption
                Jailbreak / Root notice                                               Data access restriction   Remote wipe
                Force settings




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
15
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
The perfect solution for BYOD
     Containerisation                                                                         Private ‘App’ Portal

                                                                                                          
                                                                                                  App     App
               Corporate

                                  Personal



                                                                  Keeps corporate                         
                                                                                                  App     App
                                                                  data separate                                        Kaspersky
                                                                                                                     Security Center
                                                                  Encrypted                               
                                                                                                  App     App
                                                                  Selectively wiped
                                                                                                          
                                                                                                  App     App




       ANTI             DATA                           SYSTEMS     CONTROL   Infrastructure
16
                                   Mobile Security
     MALWARE         ENCRYPTION                      MANAGEMENT     TOOLS
Systems management
     Staying up-to-date just got faster and easier
               SYSTEM PROVISIONING                                                    LICENCE MANAGEMENT            REMOTE TOOLS

                Create images                                                          Track usage                Install applications
                Store and update                                                       Manage renewals            Update applications
                Deploy                                                                 Manage licence             Troubleshoot
                                                                                       compliance




                  VULNERABILITY                                                       ADVANCED PATCHING           NETWORK ADMISSION
                      SCANNING                                                                                      CONTROL (NAC)
                HW and SW inventory                                                    Automated prioritisation   Guest policy
                Multiple vulnerability                                                 Reboot options             management
                databases                                                                                         Guest portal




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
17
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
Control tools
     Applications, devices and web


          DEVICE CONTROL




          WEB CONTROL




          APPLICATION CONTROL
          WITH DYNAMIC WHITELISTING



       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
18   MALWARE   ENCRYPTION
                            Mobile Security
                                              MANAGEMENT    TOOLS
Mail, Internet gateway and collaboration
     Comprehensive infrastructure protection

                          Security                                                     Security             Security
                          for Mail                                              For Internet Gateways   For Collaboration
               Microsoft Exchange                                                 Microsoft ISA/TMG     Microsoft SharePoint
                                                                                  Squid                 servers
               Lotus Notes/Domino
               Linux Mail Servers                                                 Firewall




            DATA                          SYSTEMS    CONTROL   Infrastructure
19       ENCRYPTION
                      Mobile Security
                                        MANAGEMENT    TOOLS
Supported and powered by the Kaspersky
     Security Network

           Global cloud network
            of millions of users


          Dynamic reputation of
         applications and websites


          Improves performance
        and reduces false positives


          Tightly integrated with
           protection features
                                      KASPERSKY GLOBAL USERS


20
Kaspersky Endpoint Security for Business:
     Progressive, feature-rich tiers

                                APP, DEVICE,    MOBILE       DATA        SYSTEMS     MAIL, WEB AND
                ANTI-MALWARE   WEB CONTROL     SECURITY   ENCRYPTION   MANAGEMENT   COLLABORATION


        TOTAL


     ADVANCED


       SELECT


        CORE




21
In detail
            Total
                       Collaboration                       Mail                     Internet Gateway

        Advanced    Licence Management         Network Admission (NAC)            Software Installation

                    System Provisioning             Patch Management               Vulnerability Scan




                                                                                                          Kaspersky Security Center
                                                     Data Encryption

           Select        Mobile Endpoint Security                     Mobile Device Management (MDM)

                                                    File Server Security

                    Application Control              Device Control                  Web Control

            Core                                Anti-malware + Firewall

                                          Endpoint             Management             Infrastructure

                       Cloud-enabled via the
                       Kaspersky Security Network (KSN)



22
Plus: additional targeted solutions
     Kaspersky Security for...


          File           Systems           Storage         Mail
         Servers        Management


         Mobile         Virtualization   Collaboration    Internet
                                                         Gateways




23
Summary: a unique set of benefits
                 SEE           CONTROL          PROTECT




               Deeper                IT           Unified
              protection        efficiency      management



                   REDUCE BUSINESS RISK, WITH MAXIMUM
                           BUSINESS EFFICIENCY
                     – WITH KASPERSKY, NOW YOU CAN




24
Why Kaspersky for your business?


      AWARD-WINNING ANTI-MALWARE



                           Over 80 IT, networking security and communications vendors have
      KASPERSKY INSIDE    chosen to embed Kaspersky Lab anti-malware technology inside their
                            own solutions, including Microsoft, IBM, Checkpoint and Juniper.



                             We do not acquire technologies and then try to integrate them.
      BUILT, NOT BOUGHT   Every feature and function is built up from the same, single code base.




25
KASPERSKY ENDPOINT SECURITY FOR BUSINESS




     www.kaspersky.com/business
26

Contenu connexe

Tendances

Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019Ivanti
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?NetEnrich, Inc.
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Preventiondj1arry
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security SolutionsThe TNS Group
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCristian Garcia G.
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0Michael Gough
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 

Tendances (20)

Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 

En vedette

Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Kaspersky Security center 10 documentation
Kaspersky Security center 10  documentationKaspersky Security center 10  documentation
Kaspersky Security center 10 documentationTarek Amer
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentationShapeBlue
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Onwubiko Emmanuel
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentKaspersky
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training GameFFFOD
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...UNIDEES Algérie
 

En vedette (14)

Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Kaspersky Security center 10 documentation
Kaspersky Security center 10  documentationKaspersky Security center 10  documentation
Kaspersky Security center 10 documentation
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training Game
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...
 

Similaire à Introducing New Kaspersky Endpoint Security for Business - ENGLISH

KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxfrancis578223
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overviewsferinga
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overviewsferinga
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityarms8586
 
Advocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureAdvocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureJon Prete
 
Advocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 

Similaire à Introducing New Kaspersky Endpoint Security for Business - ENGLISH (20)

KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
Advocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureAdvocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management Brochure
 
Advocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device Management
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Renovo CE IT Overview
Renovo CE IT OverviewRenovo CE IT Overview
Renovo CE IT Overview
 

Plus de Kirill Kertsenbaum

PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANPHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANKirill Kertsenbaum
 
vForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANvForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANKirill Kertsenbaum
 
IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...Kirill Kertsenbaum
 
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANIntroducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANKirill Kertsenbaum
 
Kaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKirill Kertsenbaum
 
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...Kirill Kertsenbaum
 
Kaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKirill Kertsenbaum
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKirill Kertsenbaum
 
Cybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANCybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANKirill Kertsenbaum
 
Russian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANRussian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANKirill Kertsenbaum
 
Russian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANRussian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANKirill Kertsenbaum
 

Plus de Kirill Kertsenbaum (12)

PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANPHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
 
vForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANvForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIAN
 
IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...
 
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANIntroducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
 
Kaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIAN
 
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
 
Kaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIAN
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
 
Cybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANCybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIAN
 
DLP in global view - RUSSIAN
DLP in global view - RUSSIANDLP in global view - RUSSIAN
DLP in global view - RUSSIAN
 
Russian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANRussian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIAN
 
Russian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANRussian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIAN
 

Dernier

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Dernier (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Introducing New Kaspersky Endpoint Security for Business - ENGLISH

  • 1. Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1
  • 2. Business drivers and their impact on IT 66% of business owners AGILITY Move fast, be nimble and flexible identify business agility as a priority Cut costs 54% of organisations say that EFFICIENCY their business processes Consolidate and streamline could be improved Maximise the value of existing resources 81% of business owners cite PRODUCTIVITY operational efficiencies as Do more with less their top strategic priority IMPACT ON IT IT complexity: more data, more systems, more technology Pressure on resources and budgets 2
  • 3. And then, there’s the rise of malware… New Threats Every Day 200K Malicious programs specifically targeting mobile devices >35K Malware files in Kaspersky Lab collection Jan 2013 >100m 1999 2001 2003 2005 2007 2009 2011 2013 3
  • 4. The impact on IT security Response: Malware Anti-malware plus management tool / dashboard Response: The #1 target: Systems / patch applications! management YOUR DATA Your data is on Response: the move! Data encryption Response: Mobile device Mobile / BYOD management (MDM) 4
  • 5. The impact on IT security Response: Malware Anti-malware plus management tool / dashboard Response: The #1 target: This is complexity / patch Systems applications!COMPLEXITY IS THE ENEMY OF IT SECURITY management YOUR DATA Your data is on Response: the move! Data encryption Response: Mobile device Mobile / BYOD management (MDM) 5
  • 6. What if? Malware 1 The #1 target: applications! PLATFORM MANAGEMENT CONSOLE COST YOUR DATA Your data is on the move! Mobile / BYOD 6
  • 7. Introducing . . . KASPERSKY ENDPOINT SECURITY FOR BUSINESS 7
  • 8. Kaspersky Endpoint Security for Business This single platform contains: Anti-malware Mobile security traditional & cloud-assisted MDM plus mobile security agent Systems management Data encryption including patch file / folder, management full-disk Endpoint control tools: application, device and web control 8
  • 9. Kaspersky Endpoint Security for Business All managed through a single management console: Kaspersky Security Center Anti-malware Mobile security traditional & cloud-assisted MDM plus mobile security agent Systems Management Data encryption including patch file / folder, management full-disk Endpoint control tools: application, device and web control 9
  • 10. For the first time, you can: SEE CONTROL PROTECT Physical, virtual, mobile Configure and deploy Evolve beyond anti-virus Identify vulnerabilities Set and enforce IT policies Meet security demands Inventory HW and SW Manage employee-owned Protect data and devices Take action with clear devices anywhere reporting Prioritise patches Rely on Kaspersky License Management expertise NAC 10
  • 11. Bringing two benefits together Deeper protection + seamless manageability ENDPOINT / INFRASTRUCTURE KASPERSKY SECURITY CENTER Anti-malware Mobile Device Management (MDM) Endpoint control tools Systems Management Encryption Security Policy Enforcement Mail and internet gateway security Collaboration Kaspersky Security Center Smartphones Servers Tablets Workstations Laptops 11
  • 12. Anti-malware The foundation of the platform Multi-point scanning Kaspersky Anti-malware Cloud-assisted Technology Award-winning Kaspersky Security Center ANTI DATA SYSTEMS CONTROL Infrastructure 12 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 13. Data encryption Keeping your data safe, wherever it goes Encryption features File / folder or full-disk Integrates with device Transparent to end-users control and application control Inside the Network Outside the Network Transparent encryption and decryption ANTI DATA SYSTEMS CONTROL Infrastructure 13 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 14. Mobile security Mobile endpoint + MDM Kaspersky Security Center Mobile Device Management (MDM) MDM Microsoft Two components Exchange Apple MDM ActiveSync Endpoint Agent for * Mobile Devices * * Smartphones iOS devices Tablets • Android • Windows • Symbian ANTI DATA SYSTEMS CONTROL Infrastructure • Blackberry 14 MALWARE ENCRYPTION Mobile Security MANAGEMENT TOOLS
  • 15. Mobile solution features CONFIGURE/DEPLOY SECURITY ANTI-THEFT Via SMS, email or tether Anti-malware GPS find Anti-phishing Remote block Anti-spam POLICY COMPLIANCE APPLICATIONS DATA ACCESS Set password Containerisation Data Encryption Jailbreak / Root notice Data access restriction Remote wipe Force settings ANTI DATA SYSTEMS CONTROL Infrastructure 15 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 16. The perfect solution for BYOD Containerisation Private ‘App’ Portal   App App Corporate Personal Keeps corporate   App App data separate Kaspersky Security Center Encrypted   App App Selectively wiped   App App ANTI DATA SYSTEMS CONTROL Infrastructure 16 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 17. Systems management Staying up-to-date just got faster and easier SYSTEM PROVISIONING LICENCE MANAGEMENT REMOTE TOOLS Create images Track usage Install applications Store and update Manage renewals Update applications Deploy Manage licence Troubleshoot compliance VULNERABILITY ADVANCED PATCHING NETWORK ADMISSION SCANNING CONTROL (NAC) HW and SW inventory Automated prioritisation Guest policy Multiple vulnerability Reboot options management databases Guest portal ANTI DATA SYSTEMS CONTROL Infrastructure 17 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 18. Control tools Applications, devices and web DEVICE CONTROL WEB CONTROL APPLICATION CONTROL WITH DYNAMIC WHITELISTING ANTI DATA SYSTEMS CONTROL Infrastructure 18 MALWARE ENCRYPTION Mobile Security MANAGEMENT TOOLS
  • 19. Mail, Internet gateway and collaboration Comprehensive infrastructure protection Security Security Security for Mail For Internet Gateways For Collaboration Microsoft Exchange Microsoft ISA/TMG Microsoft SharePoint Squid servers Lotus Notes/Domino Linux Mail Servers Firewall DATA SYSTEMS CONTROL Infrastructure 19 ENCRYPTION Mobile Security MANAGEMENT TOOLS
  • 20. Supported and powered by the Kaspersky Security Network Global cloud network of millions of users Dynamic reputation of applications and websites Improves performance and reduces false positives Tightly integrated with protection features KASPERSKY GLOBAL USERS 20
  • 21. Kaspersky Endpoint Security for Business: Progressive, feature-rich tiers APP, DEVICE, MOBILE DATA SYSTEMS MAIL, WEB AND ANTI-MALWARE WEB CONTROL SECURITY ENCRYPTION MANAGEMENT COLLABORATION TOTAL ADVANCED SELECT CORE 21
  • 22. In detail Total Collaboration Mail Internet Gateway Advanced Licence Management Network Admission (NAC) Software Installation System Provisioning Patch Management Vulnerability Scan Kaspersky Security Center Data Encryption Select Mobile Endpoint Security Mobile Device Management (MDM) File Server Security Application Control Device Control Web Control Core Anti-malware + Firewall Endpoint Management Infrastructure Cloud-enabled via the Kaspersky Security Network (KSN) 22
  • 23. Plus: additional targeted solutions Kaspersky Security for... File Systems Storage Mail Servers Management Mobile Virtualization Collaboration Internet Gateways 23
  • 24. Summary: a unique set of benefits SEE CONTROL PROTECT Deeper IT Unified protection efficiency management REDUCE BUSINESS RISK, WITH MAXIMUM BUSINESS EFFICIENCY – WITH KASPERSKY, NOW YOU CAN 24
  • 25. Why Kaspersky for your business? AWARD-WINNING ANTI-MALWARE Over 80 IT, networking security and communications vendors have KASPERSKY INSIDE chosen to embed Kaspersky Lab anti-malware technology inside their own solutions, including Microsoft, IBM, Checkpoint and Juniper. We do not acquire technologies and then try to integrate them. BUILT, NOT BOUGHT Every feature and function is built up from the same, single code base. 25
  • 26. KASPERSKY ENDPOINT SECURITY FOR BUSINESS www.kaspersky.com/business 26