SlideShare a Scribd company logo
1 of 20
Download to read offline
Kaspersky Endpoint Security 8
 Control Technologies




PAGE 1
You’re in control.
You’re in the driver’s seat.




                                    .
                               Applications
                               Devices
                               Web content filtering




PAGE 2
The Need for New Levels of Protection
Business Drivers



          Greater        Higher         Increased
         Efficiency    Productivity       Agility




         Reduced                        Improved IT
                      Competitiveness
          Costs                           Control




PAGE 3
IT Faces the ‘Change’ Reaction
Business Change Produces IT Security Challenges
                      • Efficiency
                      • Flexibility and Agility
                      • Reduce Costs - OPEX
                      • Consolidation
         Business     • Mobility and ‘Me Time’



                      • Virtualization
                      • Mobile Devices
                      • Consumerisation and Social Media
         Technology   • Cloud Services




                      • Malware
                      • Diverse Platform Support
                      • Hacking/Email/Phishing
          Security    • Poor Social Media Security




PAGE 4
The Growing Malware Threat
From 1 every MINUTE to 1 every SECOND


  Signatures
                                                  New Threats Every Day    125k
   5,000,000



   4,000,000                  Malware in Kaspersky Lab Database Jan 2012   67m

   3,000,000

                              Malware in Kaspersky Lab Database Jan 2011
                                                                           50m
   2,000,000



   1,000,000                                     Malware from downloads      1
                                                                           in14

         1999   2001   2003     2005     2007      2009      2011



PAGE 5
The Growing Malware Threat
From 1 every MINUTE to 1 every SECOND




   “     Cyber-gangs are definitely
         expanding their sights and
              targeting B2B.
                                   ”
                                   Roel Schouwenberg
                      Senior Researcher, Kaspersky Lab




PAGE 6
Today’s Real Challenges
The High Cost of Inadequate Protection


     91%          Experienced at least one IT security intrusion


     70%          State their IT department is under-resourced


     61%          Have experienced viruses, worms, spyware and other malware



         #1      Social Networking is seen as the biggest threat to IT security


    Source - 2011 Global IT Security Risks Survey, Kaspersky Lab


PAGE 7
Kaspersky Endpoint Security 8
Protect and Control

Superior, Intelligent Protection  Comprehensive, Flexible Control
  Significantly Reducing Business   Improving Business Efficiency and
  Risks                             Productivity
   Always Ahead of New Threats       Enhancing IT Flexibility




PAGE 8
Elegant Architecture
Fully Integrated from the Ground Up
                         Device
                         Control

                                   System
         Best of Breed             Watcher
         Anti-Malware
           Technology


                                         Application
                                         Control
           Web
         Control



           Firewall                     Kaspersky Security
                                          Network (KSN)




PAGE 9
Kaspersky Security Network (KSN)
Immediate Protection

   Billions of Records
   Uniquely ‘Aware’ Cloud
   Urgent Detection System                          Kaspersky
                                                  Security Network




                                                           Your Office
                         Kaspersky Global Users

PAGE 10
Application Control with Dynamic Whitelisting
Kaspersky’s Exclusive Approach

   Strict Policy
   Enforcement for
   Deeper
   Protection     Classify   Control



                 Enforce     Inspect




PAGE 11
Kaspersky Dynamic Whitelisting



                          Over 500 million unique clean files
                          in the database
                          Dedicated whitelisting lab
                          Whitelist infrastructure
                          (~ 1 million files per day)
                          Based on technologies
                          developed for 4 generations of our
                          consumer products




PAGE 12
Kaspersky Whitelisting Global Partnerships
Over 200 ISV official partners




PAGE 13
Efficiency proved by 1st Whitelisting Test
West Coast Labs
          We know almost all software ever released in the world!




                Source – Kaspersky Application Control and Default Deny using
                Whitelisting Comparative Test Report, West Coast Labs
PAGE 14
Application Control and Default Deny Test Results
West Coast Labs

            Blocks all programmes except those that
                 have specifically been allowed




            Source – Kaspersky Application Control and Default Deny using
            Whitelisting Comparative Test Report, West Coast Labs




PAGE 15
Device Control
Deep Granular Control Over Devices


     Controls device access privileges at the bus, type and device level
     White list categories down to serial number granularity
     Allows the creation of flexible policy scenarios to institute any access
     privilege policy
     Hardware Inventory function provides network-wide endpoint
     accounting




                                                                   Read/Write
   Connection    Time of Day     Device Type       Unique ID       Privileges
    Bus Type



PAGE 16
Web Control
Effective Productivity, Protection & Policy Enforcement
     Filtering of web resources by URL, content and data type regardless
     of workstation location
     Administrative control to grant permission, prohibit, or limit access
     Conducts audits of user access to certain website categories
     Granular and flexible rules with time-based access/deny scheduling
     on a group or user level

            Adult
            Sites
      Games
        &                                                 Kaspersky
     Gambling
                Social                                  Security Network
                Media


        Restrict specific       Create specific           Powered by
      sites, web pages or         rules and            Kaspersky Security
      complete categories         schedules                Network

PAGE 17
Kaspersky Security Center
Unified Management Console

                                      Impressive
          Single Screen Monitoring    Centralised Security Controls at
                                      Granular Levels
                Deployment
                                      Inclusive
          Protection Policy Setting   One Application, One Console

               Administration         Integrated
                                      Seamless Integration with
           Vulnerability Scanning     Kaspersky Endpoint Security

             Virtual Awareness        Intuitive
                                      No Training Required
                 Reporting




PAGE 18
Summary

    Simplified                   Device                  Application                      Web
   Management                    Control                  Control                       Filtering




       Unified Under a         Block Unauthorised         Block Unauthorised         Restrict Access to
        Single-Pane                Hardware                  Applications            Unauthorised Sites

          Solid Policy         Manage Connection           Classify, Control ,         Block Specific
          Enforcement              Interfaces             Enforce and Inspect          Content Types

    Intuitive Interface and   Create List of Trusted    Apply Granular Rules for     Block Unauthorised
      Robust Reporting              Devices             Whitelisting/ Blacklisting       Downloads

    Physical, Virtual and     Tailor Devices Rules to      Regularly Updated           Pre-configured
    Mobile Environments           Groups or Users           Classifications              Categories




PAGE 19
Be Ready for What’s Next


                           Malware detection, web content
                           filtering, device and application control
                           are all features of Kaspersky Endpoint
                           Security 8.


                           You’re in control.
                           You’re in the driver’s seat.

                           Kaspersky.com/beready




PAGE 20

More Related Content

What's hot

Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Skycure
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentationShapeBlue
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsSkycure
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesSkycure
 
Tools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense SolutionsTools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense SolutionsSkycure
 

What's hot (20)

Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
 
Tools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense SolutionsTools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense Solutions
 

Similar to Kaspersky Endpoint Security and Control - ENGLISH

Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKirill Kertsenbaum
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...imagazinepl
 
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Lumension
 
Protecting the Mac Environment: Technical Insight
Protecting the Mac Environment: Technical InsightProtecting the Mac Environment: Technical Insight
Protecting the Mac Environment: Technical Insightimagazinepl
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionWebroot
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk ManagementPinewood
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environmentMASIT MACEDONIA
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Cybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowCybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowKaseya
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudTrend Micro (EMEA) Limited
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overviewsferinga
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overviewsferinga
 

Similar to Kaspersky Endpoint Security and Control - ENGLISH (20)

Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
 
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
 
Protecting the Mac Environment: Technical Insight
Protecting the Mac Environment: Technical InsightProtecting the Mac Environment: Technical Insight
Protecting the Mac Environment: Technical Insight
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
 
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier CiscoIsday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environment
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Cybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to KnowCybercrime Threats in 2012 - What You Need to Know
Cybercrime Threats in 2012 - What You Need to Know
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 

More from Kirill Kertsenbaum

PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANPHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANKirill Kertsenbaum
 
vForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANvForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANKirill Kertsenbaum
 
IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...Kirill Kertsenbaum
 
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANIntroducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANKirill Kertsenbaum
 
Kaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKirill Kertsenbaum
 
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...Kirill Kertsenbaum
 
Kaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKirill Kertsenbaum
 
Cybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANCybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANKirill Kertsenbaum
 
Russian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANRussian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANKirill Kertsenbaum
 
Russian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANRussian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANKirill Kertsenbaum
 

More from Kirill Kertsenbaum (11)

PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANPHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
 
vForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANvForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIAN
 
IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...
 
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANIntroducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
 
Kaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIAN
 
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
 
Kaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIAN
 
Cybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANCybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIAN
 
DLP in global view - RUSSIAN
DLP in global view - RUSSIANDLP in global view - RUSSIAN
DLP in global view - RUSSIAN
 
Russian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANRussian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIAN
 
Russian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANRussian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIAN
 

Kaspersky Endpoint Security and Control - ENGLISH

  • 1. Kaspersky Endpoint Security 8 Control Technologies PAGE 1
  • 2. You’re in control. You’re in the driver’s seat. . Applications Devices Web content filtering PAGE 2
  • 3. The Need for New Levels of Protection Business Drivers Greater Higher Increased Efficiency Productivity Agility Reduced Improved IT Competitiveness Costs Control PAGE 3
  • 4. IT Faces the ‘Change’ Reaction Business Change Produces IT Security Challenges • Efficiency • Flexibility and Agility • Reduce Costs - OPEX • Consolidation Business • Mobility and ‘Me Time’ • Virtualization • Mobile Devices • Consumerisation and Social Media Technology • Cloud Services • Malware • Diverse Platform Support • Hacking/Email/Phishing Security • Poor Social Media Security PAGE 4
  • 5. The Growing Malware Threat From 1 every MINUTE to 1 every SECOND Signatures New Threats Every Day 125k 5,000,000 4,000,000 Malware in Kaspersky Lab Database Jan 2012 67m 3,000,000 Malware in Kaspersky Lab Database Jan 2011 50m 2,000,000 1,000,000 Malware from downloads 1 in14 1999 2001 2003 2005 2007 2009 2011 PAGE 5
  • 6. The Growing Malware Threat From 1 every MINUTE to 1 every SECOND “ Cyber-gangs are definitely expanding their sights and targeting B2B. ” Roel Schouwenberg Senior Researcher, Kaspersky Lab PAGE 6
  • 7. Today’s Real Challenges The High Cost of Inadequate Protection 91% Experienced at least one IT security intrusion 70% State their IT department is under-resourced 61% Have experienced viruses, worms, spyware and other malware #1 Social Networking is seen as the biggest threat to IT security Source - 2011 Global IT Security Risks Survey, Kaspersky Lab PAGE 7
  • 8. Kaspersky Endpoint Security 8 Protect and Control Superior, Intelligent Protection Comprehensive, Flexible Control Significantly Reducing Business Improving Business Efficiency and Risks Productivity Always Ahead of New Threats Enhancing IT Flexibility PAGE 8
  • 9. Elegant Architecture Fully Integrated from the Ground Up Device Control System Best of Breed Watcher Anti-Malware Technology Application Control Web Control Firewall Kaspersky Security Network (KSN) PAGE 9
  • 10. Kaspersky Security Network (KSN) Immediate Protection Billions of Records Uniquely ‘Aware’ Cloud Urgent Detection System Kaspersky Security Network Your Office Kaspersky Global Users PAGE 10
  • 11. Application Control with Dynamic Whitelisting Kaspersky’s Exclusive Approach Strict Policy Enforcement for Deeper Protection Classify Control Enforce Inspect PAGE 11
  • 12. Kaspersky Dynamic Whitelisting Over 500 million unique clean files in the database Dedicated whitelisting lab Whitelist infrastructure (~ 1 million files per day) Based on technologies developed for 4 generations of our consumer products PAGE 12
  • 13. Kaspersky Whitelisting Global Partnerships Over 200 ISV official partners PAGE 13
  • 14. Efficiency proved by 1st Whitelisting Test West Coast Labs We know almost all software ever released in the world! Source – Kaspersky Application Control and Default Deny using Whitelisting Comparative Test Report, West Coast Labs PAGE 14
  • 15. Application Control and Default Deny Test Results West Coast Labs Blocks all programmes except those that have specifically been allowed Source – Kaspersky Application Control and Default Deny using Whitelisting Comparative Test Report, West Coast Labs PAGE 15
  • 16. Device Control Deep Granular Control Over Devices Controls device access privileges at the bus, type and device level White list categories down to serial number granularity Allows the creation of flexible policy scenarios to institute any access privilege policy Hardware Inventory function provides network-wide endpoint accounting Read/Write Connection Time of Day Device Type Unique ID Privileges Bus Type PAGE 16
  • 17. Web Control Effective Productivity, Protection & Policy Enforcement Filtering of web resources by URL, content and data type regardless of workstation location Administrative control to grant permission, prohibit, or limit access Conducts audits of user access to certain website categories Granular and flexible rules with time-based access/deny scheduling on a group or user level Adult Sites Games & Kaspersky Gambling Social Security Network Media Restrict specific Create specific Powered by sites, web pages or rules and Kaspersky Security complete categories schedules Network PAGE 17
  • 18. Kaspersky Security Center Unified Management Console Impressive Single Screen Monitoring Centralised Security Controls at Granular Levels Deployment Inclusive Protection Policy Setting One Application, One Console Administration Integrated Seamless Integration with Vulnerability Scanning Kaspersky Endpoint Security Virtual Awareness Intuitive No Training Required Reporting PAGE 18
  • 19. Summary Simplified Device Application Web Management Control Control Filtering Unified Under a Block Unauthorised Block Unauthorised Restrict Access to Single-Pane Hardware Applications Unauthorised Sites Solid Policy Manage Connection Classify, Control , Block Specific Enforcement Interfaces Enforce and Inspect Content Types Intuitive Interface and Create List of Trusted Apply Granular Rules for Block Unauthorised Robust Reporting Devices Whitelisting/ Blacklisting Downloads Physical, Virtual and Tailor Devices Rules to Regularly Updated Pre-configured Mobile Environments Groups or Users Classifications Categories PAGE 19
  • 20. Be Ready for What’s Next Malware detection, web content filtering, device and application control are all features of Kaspersky Endpoint Security 8. You’re in control. You’re in the driver’s seat. Kaspersky.com/beready PAGE 20