SlideShare a Scribd company logo
1 of 24
Download to read offline
Kaspersky Small Office Security 
INTRODUCING 
New for 2014!
KASPERSKY SMALL OFFICE SECURITY KEY FEATURES: 
2 
•Centrally managed protection and controls 
•Cloud-assisted, real-time protection from cyberthreats 
•Safe Money security to protect online financial transactions 
•Controls to manage employee web surfing and application use 
•Android smartphone and tablet security 
•Encryption-based data protection 
•Anti-phishing and anti-spam technologies 
•Secure password management 
•Automatic data back-up via Dropbox
SUPERIOR SECURITY FOR PC’S AND SERVERS 
•Anti-Malware protection 
•Data Protection 
•Identity/Financial Protection 
•Productivity Improvement 
•Administrative Simplicity
ANTI-MALWARE PROTECTION
LEADING ANTI-MALWARE PROTECTION 
5 
•Combines: 
•Signature based protection to instantly block known malware 
•Heuristic technology spotting virus-like behaviors 
•The Kaspersky Security Network: cloud-assisted intelligence for up-to-the-second protection from new or unknown threats 
•Firewall and Network Attack Blocker 
•URL and File advisor
AUTOMATIC EXPLOIT PREVENTION 
Going beyond vulnerability scanning 
•Analyzes and controls the actions of programs, applications, etc. that have vulnerabilities. 
•Prevents and blocks the actions of such programs and exploits by: 
•Controlling the launch of executable files from applications with vulnerabilities. 
•Analyzing the behavior of executable files for any similarities with malicious programs. 
•Restricting the actions allowed by applications with vulnerabilities.
DATA PROTECTION
ENCRYPTED CONTAINERS 
8 
Complete protection for lost or stolen data 
•Easily create containers – virtual ‘safes’ to store files and folders in an encrypted state 
•Data in the container is only accessible by the owner of the data 
•Protects valuable data from unauthorised access
Storing and Recovering Data 
•Back up to local storage, FTP or cloud services 
•Automate back-up process upon device insertion 
•Integrated Dropbox support with 2gb extendable storage included* 
*Subject toDropbox terms and conditions 
BACKUP AND RESTORE
IDENTITY AND FINANCIAL PROTECTION
SAFE MONEY 
Securing financial transactions 
•Recognizes when a banking or payment site is being accessed, and offers Safe Money protection. 
•Verifies that the site is genuine and secure. 
•Protects data against unauthorized applications. 
•Green frame readily identifies that Safe Money is active. 
Protecting your hard-earned money
SECURE AND VIRTUAL KEYBOARDS 
12 
Preventing confidential data theft during input to financial sites. Virtual on-screen keyboard protects against programs that take snapshots or record keystrokes Activated automatically when using a banking or payment site Also: Secure Keyboard Mode provides enhanced protection for the physical keyboard connection
Make passwords easier and more secure 
•Website and application passwords stored in a protected vault 
•Includes a password generator and automatic sign-in feature 
•Stores identify information to enable quick completion of web forms 
PASSWORD MANAGER
PRODUCTIVITY IMPROVEMENT
WEB BROWSING POLICY CONTROL 
15 
Increase employee productivity and security 
•Create and manage web usage policies for employees. 
•Set times when web browsing is allowed or restricted. 
•Ensure Safe Search controls are enabled to block prohibited content. 
•Restrict file downloads
ADMINISTRATIVE SIMPLICITY 
Easy to use, with no special training needed
OPTIMIZED FOR PERFORMANCE 
Compatible with Windows 8 Workstations and Windows Servers 
Microsoft® Windows® 8 / 8 Pro (32-bit and 64-bit**) 
Microsoft Windows 7 Home Premium / Professional / Ultimate - (32-bit and 64-bit**) SP 1 or higher 
Microsoft Windows Vista® Home Basic and Premium / Business / Enterprise / Ultimate SP 2 or higher 
(32-bit and 64-bit**) 
Microsoft Windows XP Home / Professional (32-bit) SP 3 or higher - Professional (64-bit) SP 2 or higher 
Microsoft Windows Server 2012 
Foundation / Essentials / Standard 
Microsoft Windows SBS 2011 
Essentials, Standard SP 1 or higher 
Microsoft Windows SBS 2008 
Standard x64 Edition SP 2 or higher 
Microsoft Windows Server 2008 R2 
Foundation / Standard SP 1 or higher 
Workstations 
Servers
INSTALLATION 
18 
Simplicity, Step-by-step 
•Purpose-built for busy professionals 
•Easy to deploy through a simple installation process that anyone can use 
•Helps uninstall existing antivirus 
•Completes in minutes.
REPORTING 
19 
Quickly view security status 
•Reports on all program activities 
•scans completed 
•malware found 
•sites blocked 
•updates 
•Available at any time 
•Variable reporting time frame
BONUS! 
Kaspersky Small Office Security includes protection for Android devices!
In 2012, Kaspersky Lab detected over 35,000 new malicious programs for Android devices. There has been a significant rise in the number of malicious programs in official app stores
KASPERSKY INTERNET SECURITY FOR ANDROID The latest, most comprehensive mobile security solution that won’t interfere with your online activities or the performance of your devices 
•Defends against internet threats and mobile malware 
•Blocks dangerous websites 
•Protects against theft and loss 
•Provides call/text filtering and privacy protection
KASPERSKY INTERNET SECURITY FOR ANDROID 
“Kaspersky’s product once again includes the most important security components” 
“Five-star performance – the best possible score of PCSL”
THANK YOU! 
VAŠ KASPERSKY PARTNER V SLOVENIJI: 
BONA DEA d.o.o., Šmartinska cesta 130, 1000 Ljubljana 
E-prodaja: www.itshop.si Telefon: 01 549 1915 prodaja@itshop.si

More Related Content

What's hot

5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365Bitglass
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Top 3 tips for security documentation
Top 3 tips for security documentationTop 3 tips for security documentation
Top 3 tips for security documentationMichael Furman
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure Corporation
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goMichael Furman
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New HopeBitglass
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Bitglass
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupBitglass
 
Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...Nordic Infrastructure Conference
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Shahar Geiger Maor
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Bitglass
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataBitglass
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 SecurityBitglass
 

What's hot (20)

5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Top 3 tips for security documentation
Top 3 tips for security documentationTop 3 tips for security documentation
Top 3 tips for security documentation
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
Virtual Security
Virtual SecurityVirtual Security
Virtual Security
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...Brian Desmond - Quickly and easily protect your applications and services wit...
Brian Desmond - Quickly and easily protect your applications and services wit...
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security
 

Viewers also liked

Predstavitev Kaspersky PURE 3.0 Total Security
Predstavitev Kaspersky PURE 3.0 Total SecurityPredstavitev Kaspersky PURE 3.0 Total Security
Predstavitev Kaspersky PURE 3.0 Total SecurityDejan Pogačnik
 
SQL-on-Hadoop without compromise: Big SQL 3.0
SQL-on-Hadoop without compromise: Big SQL 3.0SQL-on-Hadoop without compromise: Big SQL 3.0
SQL-on-Hadoop without compromise: Big SQL 3.0Nicolas Morales
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Dejan Pogačnik
 
Planet videonadzor-012014
Planet videonadzor-012014Planet videonadzor-012014
Planet videonadzor-012014Dejan Pogačnik
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

Viewers also liked (6)

Predstavitev Kaspersky PURE 3.0 Total Security
Predstavitev Kaspersky PURE 3.0 Total SecurityPredstavitev Kaspersky PURE 3.0 Total Security
Predstavitev Kaspersky PURE 3.0 Total Security
 
SQL-on-Hadoop without compromise: Big SQL 3.0
SQL-on-Hadoop without compromise: Big SQL 3.0SQL-on-Hadoop without compromise: Big SQL 3.0
SQL-on-Hadoop without compromise: Big SQL 3.0
 
PLANET ICA-HM101
PLANET ICA-HM101PLANET ICA-HM101
PLANET ICA-HM101
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 
Planet videonadzor-012014
Planet videonadzor-012014Planet videonadzor-012014
Planet videonadzor-012014
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similar to Predstavitev Kaspersky Small Office Security za mala podjetja

AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒Cheer Chain Enterprise Co., Ltd.
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environmentMASIT MACEDONIA
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your BusinessAll Covered
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliJürgen Ambrosi
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Zero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source SoftwareZero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source SoftwareMyNOG
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsBitglass
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLBreaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLiphonepentest
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptxkovec2684
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 

Similar to Predstavitev Kaspersky Small Office Security za mala podjetja (20)

AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environment
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your Business
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Zero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source SoftwareZero Day Malware Detection/Prevention Using Open Source Software
Zero Day Malware Detection/Prevention Using Open Source Software
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLBreaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 

Recently uploaded

Effort Estimation Techniques used in Software Projects
Effort Estimation Techniques used in Software ProjectsEffort Estimation Techniques used in Software Projects
Effort Estimation Techniques used in Software ProjectsDEEPRAJ PATHAK
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
Key Steps in Agile Software Delivery Roadmap
Key Steps in Agile Software Delivery RoadmapKey Steps in Agile Software Delivery Roadmap
Key Steps in Agile Software Delivery RoadmapIshara Amarasekera
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdfAndrey Devyatkin
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
Advantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptxAdvantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptxRTS corp
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxUnderstanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxSasikiranMarri
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...kalichargn70th171
 
Mastering Project Planning with Microsoft Project 2016.pptx
Mastering Project Planning with Microsoft Project 2016.pptxMastering Project Planning with Microsoft Project 2016.pptx
Mastering Project Planning with Microsoft Project 2016.pptxAS Design & AST.
 

Recently uploaded (20)

Effort Estimation Techniques used in Software Projects
Effort Estimation Techniques used in Software ProjectsEffort Estimation Techniques used in Software Projects
Effort Estimation Techniques used in Software Projects
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
Key Steps in Agile Software Delivery Roadmap
Key Steps in Agile Software Delivery RoadmapKey Steps in Agile Software Delivery Roadmap
Key Steps in Agile Software Delivery Roadmap
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
Advantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptxAdvantages of Cargo Cloud Solutions.pptx
Advantages of Cargo Cloud Solutions.pptx
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptxUnderstanding Plagiarism: Causes, Consequences and Prevention.pptx
Understanding Plagiarism: Causes, Consequences and Prevention.pptx
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
The Ultimate Guide to Performance Testing in Low-Code, No-Code Environments (...
 
Mastering Project Planning with Microsoft Project 2016.pptx
Mastering Project Planning with Microsoft Project 2016.pptxMastering Project Planning with Microsoft Project 2016.pptx
Mastering Project Planning with Microsoft Project 2016.pptx
 

Predstavitev Kaspersky Small Office Security za mala podjetja

  • 1. Kaspersky Small Office Security INTRODUCING New for 2014!
  • 2. KASPERSKY SMALL OFFICE SECURITY KEY FEATURES: 2 •Centrally managed protection and controls •Cloud-assisted, real-time protection from cyberthreats •Safe Money security to protect online financial transactions •Controls to manage employee web surfing and application use •Android smartphone and tablet security •Encryption-based data protection •Anti-phishing and anti-spam technologies •Secure password management •Automatic data back-up via Dropbox
  • 3. SUPERIOR SECURITY FOR PC’S AND SERVERS •Anti-Malware protection •Data Protection •Identity/Financial Protection •Productivity Improvement •Administrative Simplicity
  • 5. LEADING ANTI-MALWARE PROTECTION 5 •Combines: •Signature based protection to instantly block known malware •Heuristic technology spotting virus-like behaviors •The Kaspersky Security Network: cloud-assisted intelligence for up-to-the-second protection from new or unknown threats •Firewall and Network Attack Blocker •URL and File advisor
  • 6. AUTOMATIC EXPLOIT PREVENTION Going beyond vulnerability scanning •Analyzes and controls the actions of programs, applications, etc. that have vulnerabilities. •Prevents and blocks the actions of such programs and exploits by: •Controlling the launch of executable files from applications with vulnerabilities. •Analyzing the behavior of executable files for any similarities with malicious programs. •Restricting the actions allowed by applications with vulnerabilities.
  • 8. ENCRYPTED CONTAINERS 8 Complete protection for lost or stolen data •Easily create containers – virtual ‘safes’ to store files and folders in an encrypted state •Data in the container is only accessible by the owner of the data •Protects valuable data from unauthorised access
  • 9. Storing and Recovering Data •Back up to local storage, FTP or cloud services •Automate back-up process upon device insertion •Integrated Dropbox support with 2gb extendable storage included* *Subject toDropbox terms and conditions BACKUP AND RESTORE
  • 11. SAFE MONEY Securing financial transactions •Recognizes when a banking or payment site is being accessed, and offers Safe Money protection. •Verifies that the site is genuine and secure. •Protects data against unauthorized applications. •Green frame readily identifies that Safe Money is active. Protecting your hard-earned money
  • 12. SECURE AND VIRTUAL KEYBOARDS 12 Preventing confidential data theft during input to financial sites. Virtual on-screen keyboard protects against programs that take snapshots or record keystrokes Activated automatically when using a banking or payment site Also: Secure Keyboard Mode provides enhanced protection for the physical keyboard connection
  • 13. Make passwords easier and more secure •Website and application passwords stored in a protected vault •Includes a password generator and automatic sign-in feature •Stores identify information to enable quick completion of web forms PASSWORD MANAGER
  • 15. WEB BROWSING POLICY CONTROL 15 Increase employee productivity and security •Create and manage web usage policies for employees. •Set times when web browsing is allowed or restricted. •Ensure Safe Search controls are enabled to block prohibited content. •Restrict file downloads
  • 16. ADMINISTRATIVE SIMPLICITY Easy to use, with no special training needed
  • 17. OPTIMIZED FOR PERFORMANCE Compatible with Windows 8 Workstations and Windows Servers Microsoft® Windows® 8 / 8 Pro (32-bit and 64-bit**) Microsoft Windows 7 Home Premium / Professional / Ultimate - (32-bit and 64-bit**) SP 1 or higher Microsoft Windows Vista® Home Basic and Premium / Business / Enterprise / Ultimate SP 2 or higher (32-bit and 64-bit**) Microsoft Windows XP Home / Professional (32-bit) SP 3 or higher - Professional (64-bit) SP 2 or higher Microsoft Windows Server 2012 Foundation / Essentials / Standard Microsoft Windows SBS 2011 Essentials, Standard SP 1 or higher Microsoft Windows SBS 2008 Standard x64 Edition SP 2 or higher Microsoft Windows Server 2008 R2 Foundation / Standard SP 1 or higher Workstations Servers
  • 18. INSTALLATION 18 Simplicity, Step-by-step •Purpose-built for busy professionals •Easy to deploy through a simple installation process that anyone can use •Helps uninstall existing antivirus •Completes in minutes.
  • 19. REPORTING 19 Quickly view security status •Reports on all program activities •scans completed •malware found •sites blocked •updates •Available at any time •Variable reporting time frame
  • 20. BONUS! Kaspersky Small Office Security includes protection for Android devices!
  • 21. In 2012, Kaspersky Lab detected over 35,000 new malicious programs for Android devices. There has been a significant rise in the number of malicious programs in official app stores
  • 22. KASPERSKY INTERNET SECURITY FOR ANDROID The latest, most comprehensive mobile security solution that won’t interfere with your online activities or the performance of your devices •Defends against internet threats and mobile malware •Blocks dangerous websites •Protects against theft and loss •Provides call/text filtering and privacy protection
  • 23. KASPERSKY INTERNET SECURITY FOR ANDROID “Kaspersky’s product once again includes the most important security components” “Five-star performance – the best possible score of PCSL”
  • 24. THANK YOU! VAŠ KASPERSKY PARTNER V SLOVENIJI: BONA DEA d.o.o., Šmartinska cesta 130, 1000 Ljubljana E-prodaja: www.itshop.si Telefon: 01 549 1915 prodaja@itshop.si