SlideShare une entreprise Scribd logo
1  sur  26
Introducing
1
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Business drivers and their impact on IT
Move fast, be nimble and flexibleAGILITY
66% of business owners
identify business agility as a
priority
Cut costs
Consolidate and streamline
EFFICIENCY
54% of organisations say that
their business processes
could be improved
Maximise the value of existing resources
Do more with less
PRODUCTIVITY
81% of business owners cite
operational efficiencies as
their top strategic priority
2
IMPACT ON IT
IT complexity: more data, more systems, more technology
Pressure on resources and budgets
And then, there’s the rise of malware…
1999 2001 2003 2005 2007 2009 2011
Malware files in Kaspersky Lab collection Jan 2013 >100m
New Threats Every Day 200K
Malicious programs specifically targeting mobile devices >35K
3
2013
Malware
The impact on IT security
Mobile / BYOD
Your data is on
the move!
The #1 target:
applications!
4
YOUR DATA
Response:
Anti-malware plus
management tool / dashboard
Response:
Systems / patch
management
Response:
Data encryption
Response:
Mobile device
management (MDM)
Malware
The impact on IT security
Mobile / BYOD
Your data is on
the move!
The #1 target:
applications!
5
YOUR DATA
Response:
Anti-malware plus
management tool / dashboard
Response:
Systems / patch
management
Response:
Data encryption
Response:
Mobile device
management (MDM)
This is complexity
COMPLEXITY IS THE ENEMY OF IT SECURITY
Malware
What if?
Mobile / BYOD
Your data is on
the move!
The #1 target:
applications!
6
1
PLATFORM
MANAGEMENT CONSOLE
COST
Introducing . . .
KASPERSKY
ENDPOINT SECURITY
FOR BUSINESS
7
8
Kaspersky Endpoint Security for Business
This single platform contains:
Anti-malware
traditional & cloud-assisted
Mobile security
MDM plus mobile security
agent
Data encryption
file / folder,
full-disk
Endpoint
control tools:
application, device
and web control
Systems
management
including patch
management
Endpoint
control tools:
application, device
and web control
Systems
Management
including patch
management
9
Kaspersky Endpoint Security for Business
All managed through a single management console:
Kaspersky Security Center
Anti-malware
traditional & cloud-assisted
Mobile security
MDM plus mobile security
agent
Data encryption
file / folder,
full-disk
For the first time, you can:
10
Physical, virtual, mobile
Identify vulnerabilities
Inventory HW and SW
Take action with clear
reporting
SEE
Configure and deploy
Set and enforce IT policies
Manage employee-owned
devices
Prioritise patches
License Management
NAC
CONTROL
Evolve beyond anti-virus
Meet security demands
Protect data and devices
anywhere
Rely on Kaspersky
expertise
PROTECT
Bringing two benefits together
11
Deeper protection + seamless manageability
Anti-malware
Endpoint control tools
Encryption
Mail and internet gateway security
Collaboration
ENDPOINT / INFRASTRUCTURE
Smartphones
Tablets
Servers
Workstations
Laptops
Mobile Device Management (MDM)
Systems Management
Security Policy Enforcement
KASPERSKY SECURITY CENTER
Kaspersky
Security Center
Infrastructure
Anti-malware
12
The foundation of the platform
Kaspersky Anti-malware
Technology
Multi-point scanning
Cloud-assisted
Award-winning
Kaspersky
Security Center
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
Infrastructure
Encryption features
File / folder or full-disk
Transparent to end-users
13
Data encryption
Keeping your data safe, wherever it goes
Integrates with device
control and application
control
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
Inside the Network Outside the Network
Transparent encryption
and decryption
Infrastructure
Mobile security
14
Mobile endpoint + MDM
Microsoft
Exchange
ActiveSync
Apple MDM
Mobile Device
Management (MDM)
Endpoint Agent for
Mobile Devices
*
*
Smartphones
Tablets
iOS devices
Two components
Kaspersky
Security Center
MDM
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
*
• Android
• Windows
• Symbian
• Blackberry
Infrastructure
Mobile solution features
Via SMS, email or tether
CONFIGURE/DEPLOY
Anti-malware
Anti-phishing
Anti-spam
SECURITY
GPS find
Remote block
ANTI-THEFT
Set password
Jailbreak / Root notice
Force settings
POLICY COMPLIANCE
Containerisation
Data access restriction
APPLICATIONS
Data Encryption
Remote wipe
DATA ACCESS
15
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
Infrastructure
16
The perfect solution for BYOD
Kaspersky
Security Center
Keeps corporate
data separate
Encrypted
Selectively wiped
Containerisation
Corporate
Personal Private ‘App’ Portal
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE

App

App

App

App

App

App

App

App
Infrastructure
Systems management
17
Staying up-to-date just got faster and easier
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
HW and SW inventory
Multiple vulnerability
databases
VULNERABILITY
SCANNING
Install applications
Update applications
Troubleshoot
REMOTE TOOLS
Track usage
Manage renewals
Manage licence
compliance
LICENCE MANAGEMENT
Guest policy
management
Guest portal
NETWORK ADMISSION
CONTROL (NAC)
Automated prioritisation
Reboot options
ADVANCED PATCHING
Create images
Store and update
Deploy
SYSTEM PROVISIONING
Control tools
18
Applications, devices and web
DEVICE CONTROL
WEB CONTROL
APPLICATION CONTROL
WITH DYNAMIC WHITELISTING
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
ANTI
MALWARE
Infrastructure
Mail, Internet gateway and collaboration
19
Comprehensive infrastructure protection
Microsoft Exchange
Lotus Notes/Domino
Linux Mail Servers
Security
for Mail
Microsoft ISA/TMG
Squid
Firewall
Security
For Internet Gateways
Microsoft SharePoint
servers
Security
For Collaboration
DATA
ENCRYPTION
Mobile Security
SYSTEMS
MANAGEMENT
CONTROL
TOOLS
Infrastructure
Supported and powered by the Kaspersky
Security Network
Global cloud network
of millions of users
Dynamic reputation of
applications and websites
Improves performance
and reduces false positives
Tightly integrated with
protection features
20
KASPERSKY GLOBAL USERS
Kaspersky Endpoint Security for Business:
Progressive, feature-rich tiers
ANTI-MALWARE
APP, DEVICE,
WEB CONTROL
MOBILE
SECURITY
DATA
ENCRYPTION
SYSTEMS
MANAGEMENT
MAIL, WEB AND
COLLABORATION
21
TOTAL
ADVANCED
CORE
SELECT
Application Control
Vulnerability ScanPatch ManagementSystem Provisioning
In detail
Internet GatewayCollaboration Mail
Core
Select
Advanced
Total
Endpoint Management Infrastructure
22
Cloud-enabled via the
Kaspersky Security Network (KSN)
Software InstallationNetwork Admission (NAC)Licence Management
Mobile Endpoint Security
Data Encryption
Mobile Device Management (MDM)
File Server Security
Device Control Web Control
Anti-malware + Firewall
KasperskySecurityCenter
Plus: additional targeted solutions
23
Kaspersky Security for...
File
Servers
Systems
Management Storage Mail
Mobile Virtualization Collaboration Internet
Gateways
24
Summary: a unique set of benefits
Deeper
protection
Unified
management
REDUCE BUSINESS RISK, WITH MAXIMUM
BUSINESS EFFICIENCY
– WITH KASPERSKY, NOW YOU CAN
SEE CONTROL PROTECT
IT
efficiency
Why Kaspersky for your business?
KASPERSKY INSIDE
Over 80 IT, networking security and communications vendors have
chosen to embed Kaspersky Lab anti-malware technology inside their
own solutions, including Microsoft, IBM, Checkpoint and Juniper.
AWARD-WINNING ANTI-MALWARE
BUILT, NOT BOUGHT We do not acquire technologies and then try to integrate them.
Every feature and function is built up from the same, single code base.
25
www.kaspersky.com/business
26
KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Contenu connexe

Tendances

KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONGS CHO
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyQualys
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Qualys
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...Symantec
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Qualys
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the CloudSymantec
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionSymantec
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionMicrosoft
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...imagazinepl
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMIftikhar Ali Iqbal
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365Elastica Inc.
 
Cyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudCyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudSymantec
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 

Tendances (20)

KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
 
Cyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudCyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the Cloud
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 

Similaire à Kaspersky Endpoint overview

KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxfrancis578223
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aIgor Pandzic
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCristian Garcia G.
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)Iftikhar Ali Iqbal
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceDean Iacovelli
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud ServicesOzgur Gercek
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsCTI Group
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDNUG e.V.
 

Similaire à Kaspersky Endpoint overview (20)

KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Information Security
Information SecurityInformation Security
Information Security
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdf
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 

Dernier

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Dernier (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Kaspersky Endpoint overview

  • 2. Business drivers and their impact on IT Move fast, be nimble and flexibleAGILITY 66% of business owners identify business agility as a priority Cut costs Consolidate and streamline EFFICIENCY 54% of organisations say that their business processes could be improved Maximise the value of existing resources Do more with less PRODUCTIVITY 81% of business owners cite operational efficiencies as their top strategic priority 2 IMPACT ON IT IT complexity: more data, more systems, more technology Pressure on resources and budgets
  • 3. And then, there’s the rise of malware… 1999 2001 2003 2005 2007 2009 2011 Malware files in Kaspersky Lab collection Jan 2013 >100m New Threats Every Day 200K Malicious programs specifically targeting mobile devices >35K 3 2013
  • 4. Malware The impact on IT security Mobile / BYOD Your data is on the move! The #1 target: applications! 4 YOUR DATA Response: Anti-malware plus management tool / dashboard Response: Systems / patch management Response: Data encryption Response: Mobile device management (MDM)
  • 5. Malware The impact on IT security Mobile / BYOD Your data is on the move! The #1 target: applications! 5 YOUR DATA Response: Anti-malware plus management tool / dashboard Response: Systems / patch management Response: Data encryption Response: Mobile device management (MDM) This is complexity COMPLEXITY IS THE ENEMY OF IT SECURITY
  • 6. Malware What if? Mobile / BYOD Your data is on the move! The #1 target: applications! 6 1 PLATFORM MANAGEMENT CONSOLE COST
  • 7. Introducing . . . KASPERSKY ENDPOINT SECURITY FOR BUSINESS 7
  • 8. 8 Kaspersky Endpoint Security for Business This single platform contains: Anti-malware traditional & cloud-assisted Mobile security MDM plus mobile security agent Data encryption file / folder, full-disk Endpoint control tools: application, device and web control Systems management including patch management
  • 9. Endpoint control tools: application, device and web control Systems Management including patch management 9 Kaspersky Endpoint Security for Business All managed through a single management console: Kaspersky Security Center Anti-malware traditional & cloud-assisted Mobile security MDM plus mobile security agent Data encryption file / folder, full-disk
  • 10. For the first time, you can: 10 Physical, virtual, mobile Identify vulnerabilities Inventory HW and SW Take action with clear reporting SEE Configure and deploy Set and enforce IT policies Manage employee-owned devices Prioritise patches License Management NAC CONTROL Evolve beyond anti-virus Meet security demands Protect data and devices anywhere Rely on Kaspersky expertise PROTECT
  • 11. Bringing two benefits together 11 Deeper protection + seamless manageability Anti-malware Endpoint control tools Encryption Mail and internet gateway security Collaboration ENDPOINT / INFRASTRUCTURE Smartphones Tablets Servers Workstations Laptops Mobile Device Management (MDM) Systems Management Security Policy Enforcement KASPERSKY SECURITY CENTER Kaspersky Security Center
  • 12. Infrastructure Anti-malware 12 The foundation of the platform Kaspersky Anti-malware Technology Multi-point scanning Cloud-assisted Award-winning Kaspersky Security Center DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE
  • 13. Infrastructure Encryption features File / folder or full-disk Transparent to end-users 13 Data encryption Keeping your data safe, wherever it goes Integrates with device control and application control DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE Inside the Network Outside the Network Transparent encryption and decryption
  • 14. Infrastructure Mobile security 14 Mobile endpoint + MDM Microsoft Exchange ActiveSync Apple MDM Mobile Device Management (MDM) Endpoint Agent for Mobile Devices * * Smartphones Tablets iOS devices Two components Kaspersky Security Center MDM DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE * • Android • Windows • Symbian • Blackberry
  • 15. Infrastructure Mobile solution features Via SMS, email or tether CONFIGURE/DEPLOY Anti-malware Anti-phishing Anti-spam SECURITY GPS find Remote block ANTI-THEFT Set password Jailbreak / Root notice Force settings POLICY COMPLIANCE Containerisation Data access restriction APPLICATIONS Data Encryption Remote wipe DATA ACCESS 15 DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE
  • 16. Infrastructure 16 The perfect solution for BYOD Kaspersky Security Center Keeps corporate data separate Encrypted Selectively wiped Containerisation Corporate Personal Private ‘App’ Portal DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE  App  App  App  App  App  App  App  App
  • 17. Infrastructure Systems management 17 Staying up-to-date just got faster and easier DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE HW and SW inventory Multiple vulnerability databases VULNERABILITY SCANNING Install applications Update applications Troubleshoot REMOTE TOOLS Track usage Manage renewals Manage licence compliance LICENCE MANAGEMENT Guest policy management Guest portal NETWORK ADMISSION CONTROL (NAC) Automated prioritisation Reboot options ADVANCED PATCHING Create images Store and update Deploy SYSTEM PROVISIONING
  • 18. Control tools 18 Applications, devices and web DEVICE CONTROL WEB CONTROL APPLICATION CONTROL WITH DYNAMIC WHITELISTING DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS ANTI MALWARE Infrastructure
  • 19. Mail, Internet gateway and collaboration 19 Comprehensive infrastructure protection Microsoft Exchange Lotus Notes/Domino Linux Mail Servers Security for Mail Microsoft ISA/TMG Squid Firewall Security For Internet Gateways Microsoft SharePoint servers Security For Collaboration DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS Infrastructure
  • 20. Supported and powered by the Kaspersky Security Network Global cloud network of millions of users Dynamic reputation of applications and websites Improves performance and reduces false positives Tightly integrated with protection features 20 KASPERSKY GLOBAL USERS
  • 21. Kaspersky Endpoint Security for Business: Progressive, feature-rich tiers ANTI-MALWARE APP, DEVICE, WEB CONTROL MOBILE SECURITY DATA ENCRYPTION SYSTEMS MANAGEMENT MAIL, WEB AND COLLABORATION 21 TOTAL ADVANCED CORE SELECT
  • 22. Application Control Vulnerability ScanPatch ManagementSystem Provisioning In detail Internet GatewayCollaboration Mail Core Select Advanced Total Endpoint Management Infrastructure 22 Cloud-enabled via the Kaspersky Security Network (KSN) Software InstallationNetwork Admission (NAC)Licence Management Mobile Endpoint Security Data Encryption Mobile Device Management (MDM) File Server Security Device Control Web Control Anti-malware + Firewall KasperskySecurityCenter
  • 23. Plus: additional targeted solutions 23 Kaspersky Security for... File Servers Systems Management Storage Mail Mobile Virtualization Collaboration Internet Gateways
  • 24. 24 Summary: a unique set of benefits Deeper protection Unified management REDUCE BUSINESS RISK, WITH MAXIMUM BUSINESS EFFICIENCY – WITH KASPERSKY, NOW YOU CAN SEE CONTROL PROTECT IT efficiency
  • 25. Why Kaspersky for your business? KASPERSKY INSIDE Over 80 IT, networking security and communications vendors have chosen to embed Kaspersky Lab anti-malware technology inside their own solutions, including Microsoft, IBM, Checkpoint and Juniper. AWARD-WINNING ANTI-MALWARE BUILT, NOT BOUGHT We do not acquire technologies and then try to integrate them. Every feature and function is built up from the same, single code base. 25