SlideShare a Scribd company logo
1 of 51
Download to read offline
See it – Control it – Protect it
 – An into of Kaspersky Endpoint Security for Business




 Nathan Wang, VP of Tech Divisions Kaspersky APAC
  nathan.wang@kaspersky.com

        KESB Launch         |         Hong Kong     |   March 7-8, 2013
PAGE 1 | 51
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
              Encryption: a difficult play or an easy game?
              System Manager: what’s new?
              MDM: a convenient alternative?
              Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 2 | 51
Business drivers and their impact on IT
                                                                     66% of business owners
      AGILITY             Move fast, be nimble and flexible          identify business agility as a
                                                                     priority


                          Cut costs                                  54% of organizations say that
    EFFICIENCY                                                       their business processes
                          Consolidate and streamline                 could be improved


                          Maximise the value of existing resources   81% of business owners cite
  PRODUCTIVITY                                                       operational efficiencies as
                          Do more with less                          their top strategic priority




  IMPACT on IT
  IT complexity: more data, more systems, more technology
  Pressure on resources and budgets
PAGE 3 | 51
And then, there’s the rise of malware…

                                                         New threats every day   200K




                     Malicious programs specifically targeting mobile devices    >35K




                            Malware files in Kaspersky Lab collection Jan 2013   >100m




       1999   2001   2003      2005      2007     2009       2011     2013


PAGE 4 | 51
The impact on IT security

                                    Response:
          Malware                   Anti-malware plus management
                                    tool / dashboard


       The #1 target:    Response:
                         Systems / patch
       applications!
                         management

                                                   YOUR DATA
       Your data is on   Response:
         the move!       Data encryption

                                    Response:
       Mobile / BYOD                Mobile device
                                    management (MDM)




PAGE 5 | 51
What if?

          Malware


       The #1 target:


                         1
       applications!     PLATFORM
                         MANAGEMENT CONSOLE
                         COST YOUR DATA
       Your data is on
         the move!


       Mobile / BYOD




PAGE 6 | 51
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
              Encryption: a difficult play or an easy game?
              System Manager: what’s new?
              MDM: a convenient alternative?
              Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 7 | 51
A high level glance of KES/KSC10

          SEE                    CONTROL                PROTECT
   Physical, virtual, mobile   Configure and deploy   Evolve beyond anti-
   Identify vulnerabilities    Set and enforce IT     virus
   Inventory HW and SW         policies               Meet security demands
   Take action with clear      Manage employee-       Protect data and
   reporting                   owned devices          devices anywhere
                               Prioritize patches     Rely on Kaspersky
                               License Management     expertise
                               NAC




PAGE 8 | 51
A high level glance of KES/KSC10
                 Kaspersky                  Kaspersky
              Endpoint Security           Security Center
         •Anti-malware                  •Security policy mgmnt
         •Control Tools                 •Mobile Device Mgmnt
         •Encryption                    •Systems Management
         •Mail and Web                  •Image Mgmnt •Vulnerability Scan
                                        •NAC         •Patch Mgmnt
         •Collaboration Server          •SW/HW Mgmnt •License Mgmnt




          •Smartphones   •Server
          •Tablets       •Workstation
                         •Laptop




PAGE 9 | 51
A high level glance of KES/KSC10
           Total
                           Collaboration              Mail                  Gateway
      Advanced              License               Network                 Software




                                                                                            Kaspersky Security Center
                          Management           Admission (NAC)           Installation
                                     Systems Management (SMS)
                           Image                   Patch                 Vulnerability
                         Management              Management                 Scan

                                     Data Protection (Encryption)
          Select             Mobile Endpoint                 Mobile Device Management
                                Security                               (MDM)

                                           File Server Security
                           Application
                            Control            Device Control            Web Control

               Core                     Anti Malware + Firewall

                                Management             Endpoint            Infrastructure
                Cloud protection is enabled for business users via the
PAGE 10 | 51    Kaspersky Security Network (KSN)
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
               Encryption: a difficult play or an easy game?
               System Manager: what’s new?
               MDM: a convenient alternative?
               Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 11 | 51
Encryption – quite difficult mechanism
---- Who is listening and what to do?
         Alice              eVe              Bob

   1             0            0          0            2




         0+1                 0+1               0+2



   1             0+2         0+2        0+1           2



                            0+1+2
        0+1+2                                 0+1+2


PAGE 12 | 51
Encryption – quite difficult mechanism
---- Color trick & numerical arithmetic with one-way function
         Alice                eVe                   Bob




PAGE 13 | 51
Encryption – quite difficult mechanism
    Encryption offering
      Full Disk Encryption (FDE)
      File Level Encryption (FLE)
      Removable Media data Encryption (RME)

    Asymmetric encryption — protection for data in transit
      Secure connection between EP and KSC (SSL)
      User and computer keys’ management exchange
      Protection for recovery data

    Symmetric encryption — protection for data at rest
      Full disk encryption
      File level encryption
      Removable media data encryption

    AES encryption module
      256-bit
      56-bit


PAGE 14 | 51
Encryption – quite difficult mechanism
 ---- Keys used in encryption

 An individual master
  key for each computer

 An individual key for
                                             User’s key
  each user
                                                              Master key
                                  MS DPAPI

 The computer key is
  encrypted using
  the public key of
  the Security Center

 The user’s key is             Master key
  encrypted using                                             Master key
  the personal key         Computer key
                              store                       User key store

 PAGE 15 | 51
Encryption – quite difficult mechanism
---- Document exchange inside a corp network




                  1                     3                     Master key #2


                                                              Master key #1

                       Encrypted file
                      (Master key ID)                         User key store
                                                          4
    Computer #1                  2          Computer #2


PAGE 16 | 51
Encryption – quite difficult mechanism
---- Boot order when FDE is used
  Authentication Agent starts before the operating system
  Key for decrypting the system boot sector
  Special drivers are responsible for decrypting disk files
  during and after the operating system start
                     Password




            Pre-boot Environment
   MBR                               Operating system boot record              File system
            (Authentication Agent)



         Open data                                            Encrypted data



PAGE 17 | 51
Encryption – an easy operation
 ---- Single Sign-On for end users


                                           Passwords
                                             match




                                            Passwords do
                                             not match

Authentication Agent        Windows
Username/Password      Username/Password




                                                       Authentication Agent
                                                       changes the password
                       Next start




 PAGE 18 | 51
Encryption – an easy operation
---- SSO, a routine policy configuration for IT guys




PAGE 19 | 51
Encryption – an easy operation
---- Enable encryption and policy configuration




PAGE 20 | 51
Encryption – an easy operation
---- “Tough” requirements for FLE and data recovery
   The only requirement for FLE is the accessibility of KSC
     • The File Level Encryption is integrated to Windows’ authentication;
     • The key exchange is materialized automatically;
     • The Kaspersky encryption implementation is seamless to end
       users and applications, a great example of ease of use;
   The data recovery requirement is simple
     • The computer to which the damaged disk connected can not have
       FDE enabled;
     • Just connect the damaged disk and run the recovery utility;


               No FDE enabled           Old hard disk


PAGE 21 | 51
Encryption – an easy operation
---- Data sent to external parties




PAGE 22 | 51
Encryption – an easy operation
---- Removable Media data Encryption in clicks




PAGE 23 | 51
Encryption – an easy operation
---- Removable Media data Encryption in clicks




PAGE 24 | 51
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
               Encryption: a difficult play or an easy game?
               System Manager: what’s new?
               MDM: a convenient alternative?
               Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 25 | 51
System Management: What’s new?
---- SM function via KSC and Network Agent

   Software monitoring/inventory
   Hardware monitoring/inventory
   License Management
   Vulnerability detection
   Update management
   Installation of 3rd party’s applications
   Network Access Control (NAC)
   Deployment of operating system images

PAGE 26 | 51
System Management: What’s new?
---- Licensed management (remember software inventory?)




PAGE 27 | 51
System Management: What’s new?
---- Licensed management (NOT licensing enforcement)




      Examples of use cases:
       Error, the number of licenses is exceeded;
       Warning, license will expire soon (in 14 days);
       Info, 95% of the available licenses are used up
PAGE 28 | 51
System Management: What’s new?
---- New update management



          KL Expertise

                             KL Vulnerability DB




                                                                   1. Missing
                                                                      Windows
                                                                      updates
                   Windows
                   Update                                          2. Vulnerabilities
                                                   Vulnerability      from KL
                                                    Scan Task         database




PAGE 29 | 51
System Management: What’s new?
---- Patching vulnerabilities




PAGE 30 | 51
System Management: What’s new?
---- Testing tasks patch and update installation




PAGE 31 | 51
System Management: What’s new?
---- SM features in KSC9 and in the new KSC10
   The previous implementation in KSC 9 are available:
      • Find vulnerabilities and Microsoft application updates (via the local
        WU service);
      • Installation of selected Microsoft updates (via the local WU service);
      • Installation of updates manually created and assigned by
        the administrator;
   The new licensed capabilities added to KSC 10:
      • Automatic installation of updates and patches according to
        the specified rules;
      • Using of the KSC Server as a WSUS server;
      • Installation of updates and patches for the applications; included in
        the Kaspersky Lab database;
      • Other new features;
PAGE 32 | 51
System Management: What’s new?
---- Network Access/Admission Control (NAC)
  NAC basics
   • Usually people think NAC is an appliance using SNMP;
   • NAC can be used to securely control authenticated/unauthenticated;
     user traffic according policies (based on port, protocol, subnet);
  Capabilities of KL software based NAC
   • Block Internet access for computers having «bad» protection status;
   • Redirect unmanaged computers to the authorization portal;
   • Block any network activity for new devices;
   • Allow new computers accessing a special isolated subnet;
  KL NAC architecture
   • Enforcers, Policy server, Access policy and Network devices;
   • Simple deployment and requires no changes on DHCP, DC;

PAGE 33 | 51
System Management: What’s new?
---- Network Access/Admission Control (NAC)




PAGE 34 | 51
System Management: What’s new?
---- Remote deployment of operating system images
 Capturing an Operating System image
  • Install and use Windows Automated Installation Kit;
  • Enable representation of the OS image capture and distribution
    functionality;
  • Capture a computer image, say a Windows 8 operating system,
    with application pre-installed;


 Deploying the image
  • Remote install the Windows 8 image to managed computers;
  • Remote install the Windows 8 image to ―bare metal‖ computers;


PAGE 35 | 51
Topics of discussion
    1    Business demands and IT chandleries

    2    Kaspersky Endpoint Security for Business
               Encryption: a difficult play or an easy game?
               System Manager: what’s new?
               MDM: a convenient alternative?
               Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 36 | 51
MDM: a convenient alternative?
---- What we have been doing manually




PAGE 37 | 51
MDM: a convenient alternative?
---- KL MDM architecture




PAGE 38 | 51
MDM: a convenient alternative?
---- KL MDM architecture




iOS

               Apple Push
               Notification
               Service




                              Android
                              Windows Mobile
                              Windows Phone
                              Palm (WebOS)
                              Nokia (Symbian, Maemo)
PAGE 39 | 51
MDM: a convenient alternative?
---- KL Mobile Devices Server installation
 Adding Exchange ActiveSync Mobile Devices Server
  • Install Agent and MDM server on an Exchange Server;*
  • Testing the connection with a KSC Server;
  • Exchange ActiveSync configuration;
 Profile creation and policy configuration
  • On the KSC, configures profiles and polices for selected mailbox of the
    Exchange
  • Sync the profile and policy with the Exchange
 Mobile devices receive profiles and polices**
  • Direct Push is used for pushing notifications (MS Exchange ActiveSync)
  • Users receive it during the synchronization with the Exchange server

PAGE 40 | 51
MDM: a convenient alternative?
---- Synchronizing Mobile Devices with KSC




                    Mobile
                    Devices
PAGE 41 | 51
Kaspersky Mobile Endpoint Security
---- Centrally managed by the KSC

     CONFIGURE/DEPLOY         SECURITY           ANTI-THEFT
       Via SMS, email or   Anti-malware       GPS find
       tether              Anti-phishing      Remote block
                           Anti-spam




     POLICY COMPLIANCE      APPLICATIONS       DATA ACCESS
       Set password        Containerization   Data Encryption
       Jailbreak / Root    Data access        Remote wipe
       notice              restriction
       Force settings



PAGE 42 | 51
MDM: a convenient alternative?
---- Still want to go back to the old manual operation?




PAGE 43 | 51
KES/KSC10 in a nutshell

                 Platform
                 Console
                 Cost
See it                      Control it
PAGE 44 | 51   Protect it
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
               Encryption: a difficult play or an easy game?
               System Manager: what’s new?
               MDM: a convenient alternative?
               Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 45 | 51
KSV 2, KS-Exchange 8, KLMS 8, SPE 10…
---- Kaspersky comprehensive security offering
 Kaspersky Security for Virtualization
  • Effectively integrated with vShield, an agentless solution to deliver
    cloud/local anti-malware, network protection under KSC management;
  • Materialize the mission for VMware to enhance security via an effective
    agentless approach;
 Mail, collaboration and gateway security
  • Email, SharePoint and gateway security are always the essential;
  • Multi-layered spam filtering plus the best anti-malware for security
    elevation and resource optimization;
 Service Provider Edition
  • A web application designed for ISPs to provide anti-malware security
    control/monitoring service for corporate network;
  • Coupled with KSV, it delivers cloud based security products and services;

PAGE 46 | 51
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
               Encryption: a difficult play or an easy game?
               System Manager: what’s new?
               MDM: a convenient alternative?
               Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 47 | 51
Kaspersky Lab datasheet




PAGE 48 | 51
Kaspersky Lab datasheet




PAGE 49 | 51
Kaspersky Lab datasheet




PAGE 50 | 51
Thank You!




 Nathan Wang, VP of Tech Divisions Kaspersky APAC
  nathan.wang@kaspersky.com


PAGE 51 | 51

More Related Content

What's hot

McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)Iftikhar Ali Iqbal
 
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfHaris Chughtai
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevOps Indonesia
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCPriyanka Aash
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceDhruv Majumdar
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat ProtectionThierry DEMAN
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
Sandbox Technology in AntiVirus
Sandbox Technology in AntiVirusSandbox Technology in AntiVirus
Sandbox Technology in AntiVirusAshish Gautam
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaEdureka!
 
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...MITRE - ATT&CKcon
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) MITRE ATT&CK
 
SEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfSEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfJean-François LOMBARDO
 
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds
 
Veeam: Cybersecurity protection solutions through Backup and Availability
Veeam: Cybersecurity protection solutions through Backup and AvailabilityVeeam: Cybersecurity protection solutions through Backup and Availability
Veeam: Cybersecurity protection solutions through Backup and AvailabilityNext Dimension Inc.
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Securitygjdevos
 

What's hot (20)

McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Sandbox Technology in AntiVirus
Sandbox Technology in AntiVirusSandbox Technology in AntiVirus
Sandbox Technology in AntiVirus
 
OSCP.pdf
OSCP.pdfOSCP.pdf
OSCP.pdf
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?)
 
SEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfSEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdf
 
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
 
Veeam: Cybersecurity protection solutions through Backup and Availability
Veeam: Cybersecurity protection solutions through Backup and AvailabilityVeeam: Cybersecurity protection solutions through Backup and Availability
Veeam: Cybersecurity protection solutions through Backup and Availability
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 

Viewers also liked

Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Onwubiko Emmanuel
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentKaspersky
 
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1iacer
 
PALETTE BUSINESS SOLUTION DOCUMENTATION
PALETTE BUSINESS SOLUTION DOCUMENTATIONPALETTE BUSINESS SOLUTION DOCUMENTATION
PALETTE BUSINESS SOLUTION DOCUMENTATIONOnwubiko Emmanuel
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentationShapeBlue
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONGS CHO
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training GameFFFOD
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...UNIDEES Algérie
 

Viewers also liked (14)

Kaspersky
KasperskyKaspersky
Kaspersky
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
 
PALETTE BUSINESS SOLUTION DOCUMENTATION
PALETTE BUSINESS SOLUTION DOCUMENTATIONPALETTE BUSINESS SOLUTION DOCUMENTATION
PALETTE BUSINESS SOLUTION DOCUMENTATION
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training Game
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...
 

Similar to Introduction to Kaspersky Endpoint Security for Businesss

Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISSATYAVEER PAL
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overviewsferinga
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overviewsferinga
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsCTI Group
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxfrancis578223
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
stackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeestackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeeGaurav "GP" Pal
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMLuigi Perrone
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 

Similar to Introduction to Kaspersky Endpoint Security for Businesss (20)

Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
stackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeestackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfee
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 

More from Andrew Wong

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing ReportAndrew Wong
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongAndrew Wong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Andrew Wong
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail IndustryAndrew Wong
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBAndrew Wong
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapAndrew Wong
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in MarketingAndrew Wong
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13Andrew Wong
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Andrew Wong
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution GuideAndrew Wong
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyAndrew Wong
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user studyAndrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportAndrew Wong
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials PresentationAndrew Wong
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web ServicesAndrew Wong
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 

More from Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Introduction to Kaspersky Endpoint Security for Businesss

  • 1. See it – Control it – Protect it – An into of Kaspersky Endpoint Security for Business Nathan Wang, VP of Tech Divisions Kaspersky APAC nathan.wang@kaspersky.com KESB Launch | Hong Kong | March 7-8, 2013 PAGE 1 | 51
  • 2. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 2 | 51
  • 3. Business drivers and their impact on IT 66% of business owners AGILITY Move fast, be nimble and flexible identify business agility as a priority Cut costs 54% of organizations say that EFFICIENCY their business processes Consolidate and streamline could be improved Maximise the value of existing resources 81% of business owners cite PRODUCTIVITY operational efficiencies as Do more with less their top strategic priority IMPACT on IT IT complexity: more data, more systems, more technology Pressure on resources and budgets PAGE 3 | 51
  • 4. And then, there’s the rise of malware… New threats every day 200K Malicious programs specifically targeting mobile devices >35K Malware files in Kaspersky Lab collection Jan 2013 >100m 1999 2001 2003 2005 2007 2009 2011 2013 PAGE 4 | 51
  • 5. The impact on IT security Response: Malware Anti-malware plus management tool / dashboard The #1 target: Response: Systems / patch applications! management YOUR DATA Your data is on Response: the move! Data encryption Response: Mobile / BYOD Mobile device management (MDM) PAGE 5 | 51
  • 6. What if? Malware The #1 target: 1 applications! PLATFORM MANAGEMENT CONSOLE COST YOUR DATA Your data is on the move! Mobile / BYOD PAGE 6 | 51
  • 7. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 7 | 51
  • 8. A high level glance of KES/KSC10 SEE CONTROL PROTECT Physical, virtual, mobile Configure and deploy Evolve beyond anti- Identify vulnerabilities Set and enforce IT virus Inventory HW and SW policies Meet security demands Take action with clear Manage employee- Protect data and reporting owned devices devices anywhere Prioritize patches Rely on Kaspersky License Management expertise NAC PAGE 8 | 51
  • 9. A high level glance of KES/KSC10 Kaspersky Kaspersky Endpoint Security Security Center •Anti-malware •Security policy mgmnt •Control Tools •Mobile Device Mgmnt •Encryption •Systems Management •Mail and Web •Image Mgmnt •Vulnerability Scan •NAC •Patch Mgmnt •Collaboration Server •SW/HW Mgmnt •License Mgmnt •Smartphones •Server •Tablets •Workstation •Laptop PAGE 9 | 51
  • 10. A high level glance of KES/KSC10 Total Collaboration Mail Gateway Advanced License Network Software Kaspersky Security Center Management Admission (NAC) Installation Systems Management (SMS) Image Patch Vulnerability Management Management Scan Data Protection (Encryption) Select Mobile Endpoint Mobile Device Management Security (MDM) File Server Security Application Control Device Control Web Control Core Anti Malware + Firewall Management Endpoint Infrastructure Cloud protection is enabled for business users via the PAGE 10 | 51 Kaspersky Security Network (KSN)
  • 11. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 11 | 51
  • 12. Encryption – quite difficult mechanism ---- Who is listening and what to do? Alice eVe Bob 1 0 0 0 2 0+1 0+1 0+2 1 0+2 0+2 0+1 2 0+1+2 0+1+2 0+1+2 PAGE 12 | 51
  • 13. Encryption – quite difficult mechanism ---- Color trick & numerical arithmetic with one-way function Alice eVe Bob PAGE 13 | 51
  • 14. Encryption – quite difficult mechanism  Encryption offering  Full Disk Encryption (FDE)  File Level Encryption (FLE)  Removable Media data Encryption (RME)  Asymmetric encryption — protection for data in transit  Secure connection between EP and KSC (SSL)  User and computer keys’ management exchange  Protection for recovery data  Symmetric encryption — protection for data at rest  Full disk encryption  File level encryption  Removable media data encryption  AES encryption module  256-bit  56-bit PAGE 14 | 51
  • 15. Encryption – quite difficult mechanism ---- Keys used in encryption  An individual master key for each computer  An individual key for User’s key each user Master key MS DPAPI  The computer key is encrypted using the public key of the Security Center  The user’s key is Master key encrypted using Master key the personal key Computer key store User key store PAGE 15 | 51
  • 16. Encryption – quite difficult mechanism ---- Document exchange inside a corp network 1 3 Master key #2 Master key #1 Encrypted file (Master key ID) User key store 4 Computer #1 2 Computer #2 PAGE 16 | 51
  • 17. Encryption – quite difficult mechanism ---- Boot order when FDE is used  Authentication Agent starts before the operating system  Key for decrypting the system boot sector  Special drivers are responsible for decrypting disk files during and after the operating system start Password Pre-boot Environment MBR Operating system boot record File system (Authentication Agent) Open data Encrypted data PAGE 17 | 51
  • 18. Encryption – an easy operation ---- Single Sign-On for end users Passwords match Passwords do not match Authentication Agent Windows Username/Password Username/Password Authentication Agent changes the password Next start PAGE 18 | 51
  • 19. Encryption – an easy operation ---- SSO, a routine policy configuration for IT guys PAGE 19 | 51
  • 20. Encryption – an easy operation ---- Enable encryption and policy configuration PAGE 20 | 51
  • 21. Encryption – an easy operation ---- “Tough” requirements for FLE and data recovery  The only requirement for FLE is the accessibility of KSC • The File Level Encryption is integrated to Windows’ authentication; • The key exchange is materialized automatically; • The Kaspersky encryption implementation is seamless to end users and applications, a great example of ease of use;  The data recovery requirement is simple • The computer to which the damaged disk connected can not have FDE enabled; • Just connect the damaged disk and run the recovery utility; No FDE enabled Old hard disk PAGE 21 | 51
  • 22. Encryption – an easy operation ---- Data sent to external parties PAGE 22 | 51
  • 23. Encryption – an easy operation ---- Removable Media data Encryption in clicks PAGE 23 | 51
  • 24. Encryption – an easy operation ---- Removable Media data Encryption in clicks PAGE 24 | 51
  • 25. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 25 | 51
  • 26. System Management: What’s new? ---- SM function via KSC and Network Agent  Software monitoring/inventory  Hardware monitoring/inventory  License Management  Vulnerability detection  Update management  Installation of 3rd party’s applications  Network Access Control (NAC)  Deployment of operating system images PAGE 26 | 51
  • 27. System Management: What’s new? ---- Licensed management (remember software inventory?) PAGE 27 | 51
  • 28. System Management: What’s new? ---- Licensed management (NOT licensing enforcement) Examples of use cases:  Error, the number of licenses is exceeded;  Warning, license will expire soon (in 14 days);  Info, 95% of the available licenses are used up PAGE 28 | 51
  • 29. System Management: What’s new? ---- New update management KL Expertise KL Vulnerability DB 1. Missing Windows updates Windows Update 2. Vulnerabilities Vulnerability from KL Scan Task database PAGE 29 | 51
  • 30. System Management: What’s new? ---- Patching vulnerabilities PAGE 30 | 51
  • 31. System Management: What’s new? ---- Testing tasks patch and update installation PAGE 31 | 51
  • 32. System Management: What’s new? ---- SM features in KSC9 and in the new KSC10  The previous implementation in KSC 9 are available: • Find vulnerabilities and Microsoft application updates (via the local WU service); • Installation of selected Microsoft updates (via the local WU service); • Installation of updates manually created and assigned by the administrator;  The new licensed capabilities added to KSC 10: • Automatic installation of updates and patches according to the specified rules; • Using of the KSC Server as a WSUS server; • Installation of updates and patches for the applications; included in the Kaspersky Lab database; • Other new features; PAGE 32 | 51
  • 33. System Management: What’s new? ---- Network Access/Admission Control (NAC)  NAC basics • Usually people think NAC is an appliance using SNMP; • NAC can be used to securely control authenticated/unauthenticated; user traffic according policies (based on port, protocol, subnet);  Capabilities of KL software based NAC • Block Internet access for computers having «bad» protection status; • Redirect unmanaged computers to the authorization portal; • Block any network activity for new devices; • Allow new computers accessing a special isolated subnet;  KL NAC architecture • Enforcers, Policy server, Access policy and Network devices; • Simple deployment and requires no changes on DHCP, DC; PAGE 33 | 51
  • 34. System Management: What’s new? ---- Network Access/Admission Control (NAC) PAGE 34 | 51
  • 35. System Management: What’s new? ---- Remote deployment of operating system images  Capturing an Operating System image • Install and use Windows Automated Installation Kit; • Enable representation of the OS image capture and distribution functionality; • Capture a computer image, say a Windows 8 operating system, with application pre-installed;  Deploying the image • Remote install the Windows 8 image to managed computers; • Remote install the Windows 8 image to ―bare metal‖ computers; PAGE 35 | 51
  • 36. Topics of discussion 1 Business demands and IT chandleries 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 36 | 51
  • 37. MDM: a convenient alternative? ---- What we have been doing manually PAGE 37 | 51
  • 38. MDM: a convenient alternative? ---- KL MDM architecture PAGE 38 | 51
  • 39. MDM: a convenient alternative? ---- KL MDM architecture iOS Apple Push Notification Service Android Windows Mobile Windows Phone Palm (WebOS) Nokia (Symbian, Maemo) PAGE 39 | 51
  • 40. MDM: a convenient alternative? ---- KL Mobile Devices Server installation  Adding Exchange ActiveSync Mobile Devices Server • Install Agent and MDM server on an Exchange Server;* • Testing the connection with a KSC Server; • Exchange ActiveSync configuration;  Profile creation and policy configuration • On the KSC, configures profiles and polices for selected mailbox of the Exchange • Sync the profile and policy with the Exchange  Mobile devices receive profiles and polices** • Direct Push is used for pushing notifications (MS Exchange ActiveSync) • Users receive it during the synchronization with the Exchange server PAGE 40 | 51
  • 41. MDM: a convenient alternative? ---- Synchronizing Mobile Devices with KSC Mobile Devices PAGE 41 | 51
  • 42. Kaspersky Mobile Endpoint Security ---- Centrally managed by the KSC CONFIGURE/DEPLOY SECURITY ANTI-THEFT Via SMS, email or Anti-malware GPS find tether Anti-phishing Remote block Anti-spam POLICY COMPLIANCE APPLICATIONS DATA ACCESS Set password Containerization Data Encryption Jailbreak / Root Data access Remote wipe notice restriction Force settings PAGE 42 | 51
  • 43. MDM: a convenient alternative? ---- Still want to go back to the old manual operation? PAGE 43 | 51
  • 44. KES/KSC10 in a nutshell Platform Console Cost See it Control it PAGE 44 | 51 Protect it
  • 45. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 45 | 51
  • 46. KSV 2, KS-Exchange 8, KLMS 8, SPE 10… ---- Kaspersky comprehensive security offering  Kaspersky Security for Virtualization • Effectively integrated with vShield, an agentless solution to deliver cloud/local anti-malware, network protection under KSC management; • Materialize the mission for VMware to enhance security via an effective agentless approach;  Mail, collaboration and gateway security • Email, SharePoint and gateway security are always the essential; • Multi-layered spam filtering plus the best anti-malware for security elevation and resource optimization;  Service Provider Edition • A web application designed for ISPs to provide anti-malware security control/monitoring service for corporate network; • Coupled with KSV, it delivers cloud based security products and services; PAGE 46 | 51
  • 47. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 47 | 51
  • 51. Thank You! Nathan Wang, VP of Tech Divisions Kaspersky APAC nathan.wang@kaspersky.com PAGE 51 | 51