SlideShare a Scribd company logo
1 of 51
Download to read offline
See it – Control it – Protect it
 – An into of Kaspersky Endpoint Security for Business




 Nathan Wang, VP of Tech Divisions Kaspersky APAC
  nathan.wang@kaspersky.com

        KESB Launch         |         Hong Kong     |   March 7-8, 2013
PAGE 1 | 51
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
              Encryption: a difficult play or an easy game?
              System Manager: what’s new?
              MDM: a convenient alternative?
              Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 2 | 51
Business drivers and their impact on IT
                                                                     66% of business owners
      AGILITY             Move fast, be nimble and flexible          identify business agility as a
                                                                     priority


                          Cut costs                                  54% of organizations say that
    EFFICIENCY                                                       their business processes
                          Consolidate and streamline                 could be improved


                          Maximise the value of existing resources   81% of business owners cite
  PRODUCTIVITY                                                       operational efficiencies as
                          Do more with less                          their top strategic priority




  IMPACT on IT
  IT complexity: more data, more systems, more technology
  Pressure on resources and budgets
PAGE 3 | 51
And then, there’s the rise of malware…

                                                         New threats every day   200K




                     Malicious programs specifically targeting mobile devices    >35K




                            Malware files in Kaspersky Lab collection Jan 2013   >100m




       1999   2001   2003      2005      2007     2009       2011     2013


PAGE 4 | 51
The impact on IT security

                                    Response:
          Malware                   Anti-malware plus management
                                    tool / dashboard


       The #1 target:    Response:
                         Systems / patch
       applications!
                         management

                                                   YOUR DATA
       Your data is on   Response:
         the move!       Data encryption

                                    Response:
       Mobile / BYOD                Mobile device
                                    management (MDM)




PAGE 5 | 51
What if?

          Malware


       The #1 target:


                         1
       applications!     PLATFORM
                         MANAGEMENT CONSOLE
                         COST YOUR DATA
       Your data is on
         the move!


       Mobile / BYOD




PAGE 6 | 51
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
              Encryption: a difficult play or an easy game?
              System Manager: what’s new?
              MDM: a convenient alternative?
              Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 7 | 51
A high level glance of KES/KSC10

          SEE                    CONTROL                PROTECT
   Physical, virtual, mobile   Configure and deploy   Evolve beyond anti-
   Identify vulnerabilities    Set and enforce IT     virus
   Inventory HW and SW         policies               Meet security demands
   Take action with clear      Manage employee-       Protect data and
   reporting                   owned devices          devices anywhere
                               Prioritize patches     Rely on Kaspersky
                               License Management     expertise
                               NAC




PAGE 8 | 51
A high level glance of KES/KSC10
                 Kaspersky                  Kaspersky
              Endpoint Security           Security Center
         •Anti-malware                  •Security policy mgmnt
         •Control Tools                 •Mobile Device Mgmnt
         •Encryption                    •Systems Management
         •Mail and Web                  •Image Mgmnt •Vulnerability Scan
                                        •NAC         •Patch Mgmnt
         •Collaboration Server          •SW/HW Mgmnt •License Mgmnt




          •Smartphones   •Server
          •Tablets       •Workstation
                         •Laptop




PAGE 9 | 51
A high level glance of KES/KSC10
           Total
                           Collaboration              Mail                  Gateway
      Advanced              License               Network                 Software




                                                                                            Kaspersky Security Center
                          Management           Admission (NAC)           Installation
                                     Systems Management (SMS)
                           Image                   Patch                 Vulnerability
                         Management              Management                 Scan

                                     Data Protection (Encryption)
          Select             Mobile Endpoint                 Mobile Device Management
                                Security                               (MDM)

                                           File Server Security
                           Application
                            Control            Device Control            Web Control

               Core                     Anti Malware + Firewall

                                Management             Endpoint            Infrastructure
                Cloud protection is enabled for business users via the
PAGE 10 | 51    Kaspersky Security Network (KSN)
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
               Encryption: a difficult play or an easy game?
               System Manager: what’s new?
               MDM: a convenient alternative?
               Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 11 | 51
Encryption – quite difficult mechanism
---- Who is listening and what to do?
         Alice              eVe              Bob

   1             0            0          0            2




         0+1                 0+1               0+2



   1             0+2         0+2        0+1           2



                            0+1+2
        0+1+2                                 0+1+2


PAGE 12 | 51
Encryption – quite difficult mechanism
---- Color trick & numerical arithmetic with one-way function
         Alice                eVe                   Bob




PAGE 13 | 51
Encryption – quite difficult mechanism
    Encryption offering
      Full Disk Encryption (FDE)
      File Level Encryption (FLE)
      Removable Media data Encryption (RME)

    Asymmetric encryption — protection for data in transit
      Secure connection between EP and KSC (SSL)
      User and computer keys’ management exchange
      Protection for recovery data

    Symmetric encryption — protection for data at rest
      Full disk encryption
      File level encryption
      Removable media data encryption

    AES encryption module
      256-bit
      56-bit


PAGE 14 | 51
Encryption – quite difficult mechanism
 ---- Keys used in encryption

 An individual master
  key for each computer

 An individual key for
                                             User’s key
  each user
                                                              Master key
                                  MS DPAPI

 The computer key is
  encrypted using
  the public key of
  the Security Center

 The user’s key is             Master key
  encrypted using                                             Master key
  the personal key         Computer key
                              store                       User key store

 PAGE 15 | 51
Encryption – quite difficult mechanism
---- Document exchange inside a corp network




                  1                     3                     Master key #2


                                                              Master key #1

                       Encrypted file
                      (Master key ID)                         User key store
                                                          4
    Computer #1                  2          Computer #2


PAGE 16 | 51
Encryption – quite difficult mechanism
---- Boot order when FDE is used
  Authentication Agent starts before the operating system
  Key for decrypting the system boot sector
  Special drivers are responsible for decrypting disk files
  during and after the operating system start
                     Password




            Pre-boot Environment
   MBR                               Operating system boot record              File system
            (Authentication Agent)



         Open data                                            Encrypted data



PAGE 17 | 51
Encryption – an easy operation
 ---- Single Sign-On for end users


                                           Passwords
                                             match




                                            Passwords do
                                             not match

Authentication Agent        Windows
Username/Password      Username/Password




                                                       Authentication Agent
                                                       changes the password
                       Next start




 PAGE 18 | 51
Encryption – an easy operation
---- SSO, a routine policy configuration for IT guys




PAGE 19 | 51
Encryption – an easy operation
---- Enable encryption and policy configuration




PAGE 20 | 51
Encryption – an easy operation
---- “Tough” requirements for FLE and data recovery
   The only requirement for FLE is the accessibility of KSC
     • The File Level Encryption is integrated to Windows’ authentication;
     • The key exchange is materialized automatically;
     • The Kaspersky encryption implementation is seamless to end
       users and applications, a great example of ease of use;
   The data recovery requirement is simple
     • The computer to which the damaged disk connected can not have
       FDE enabled;
     • Just connect the damaged disk and run the recovery utility;


               No FDE enabled           Old hard disk


PAGE 21 | 51
Encryption – an easy operation
---- Data sent to external parties




PAGE 22 | 51
Encryption – an easy operation
---- Removable Media data Encryption in clicks




PAGE 23 | 51
Encryption – an easy operation
---- Removable Media data Encryption in clicks




PAGE 24 | 51
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
               Encryption: a difficult play or an easy game?
               System Manager: what’s new?
               MDM: a convenient alternative?
               Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 25 | 51
System Management: What’s new?
---- SM function via KSC and Network Agent

   Software monitoring/inventory
   Hardware monitoring/inventory
   License Management
   Vulnerability detection
   Update management
   Installation of 3rd party’s applications
   Network Access Control (NAC)
   Deployment of operating system images

PAGE 26 | 51
System Management: What’s new?
---- Licensed management (remember software inventory?)




PAGE 27 | 51
System Management: What’s new?
---- Licensed management (NOT licensing enforcement)




      Examples of use cases:
       Error, the number of licenses is exceeded;
       Warning, license will expire soon (in 14 days);
       Info, 95% of the available licenses are used up
PAGE 28 | 51
System Management: What’s new?
---- New update management



          KL Expertise

                             KL Vulnerability DB




                                                                   1. Missing
                                                                      Windows
                                                                      updates
                   Windows
                   Update                                          2. Vulnerabilities
                                                   Vulnerability      from KL
                                                    Scan Task         database




PAGE 29 | 51
System Management: What’s new?
---- Patching vulnerabilities




PAGE 30 | 51
System Management: What’s new?
---- Testing tasks patch and update installation




PAGE 31 | 51
System Management: What’s new?
---- SM features in KSC9 and in the new KSC10
   The previous implementation in KSC 9 are available:
      • Find vulnerabilities and Microsoft application updates (via the local
        WU service);
      • Installation of selected Microsoft updates (via the local WU service);
      • Installation of updates manually created and assigned by
        the administrator;
   The new licensed capabilities added to KSC 10:
      • Automatic installation of updates and patches according to
        the specified rules;
      • Using of the KSC Server as a WSUS server;
      • Installation of updates and patches for the applications; included in
        the Kaspersky Lab database;
      • Other new features;
PAGE 32 | 51
System Management: What’s new?
---- Network Access/Admission Control (NAC)
  NAC basics
   • Usually people think NAC is an appliance using SNMP;
   • NAC can be used to securely control authenticated/unauthenticated;
     user traffic according policies (based on port, protocol, subnet);
  Capabilities of KL software based NAC
   • Block Internet access for computers having «bad» protection status;
   • Redirect unmanaged computers to the authorization portal;
   • Block any network activity for new devices;
   • Allow new computers accessing a special isolated subnet;
  KL NAC architecture
   • Enforcers, Policy server, Access policy and Network devices;
   • Simple deployment and requires no changes on DHCP, DC;

PAGE 33 | 51
System Management: What’s new?
---- Network Access/Admission Control (NAC)




PAGE 34 | 51
System Management: What’s new?
---- Remote deployment of operating system images
 Capturing an Operating System image
  • Install and use Windows Automated Installation Kit;
  • Enable representation of the OS image capture and distribution
    functionality;
  • Capture a computer image, say a Windows 8 operating system,
    with application pre-installed;


 Deploying the image
  • Remote install the Windows 8 image to managed computers;
  • Remote install the Windows 8 image to ―bare metal‖ computers;


PAGE 35 | 51
Topics of discussion
    1    Business demands and IT chandleries

    2    Kaspersky Endpoint Security for Business
               Encryption: a difficult play or an easy game?
               System Manager: what’s new?
               MDM: a convenient alternative?
               Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 36 | 51
MDM: a convenient alternative?
---- What we have been doing manually




PAGE 37 | 51
MDM: a convenient alternative?
---- KL MDM architecture




PAGE 38 | 51
MDM: a convenient alternative?
---- KL MDM architecture




iOS

               Apple Push
               Notification
               Service




                              Android
                              Windows Mobile
                              Windows Phone
                              Palm (WebOS)
                              Nokia (Symbian, Maemo)
PAGE 39 | 51
MDM: a convenient alternative?
---- KL Mobile Devices Server installation
 Adding Exchange ActiveSync Mobile Devices Server
  • Install Agent and MDM server on an Exchange Server;*
  • Testing the connection with a KSC Server;
  • Exchange ActiveSync configuration;
 Profile creation and policy configuration
  • On the KSC, configures profiles and polices for selected mailbox of the
    Exchange
  • Sync the profile and policy with the Exchange
 Mobile devices receive profiles and polices**
  • Direct Push is used for pushing notifications (MS Exchange ActiveSync)
  • Users receive it during the synchronization with the Exchange server

PAGE 40 | 51
MDM: a convenient alternative?
---- Synchronizing Mobile Devices with KSC




                    Mobile
                    Devices
PAGE 41 | 51
Kaspersky Mobile Endpoint Security
---- Centrally managed by the KSC

     CONFIGURE/DEPLOY         SECURITY           ANTI-THEFT
       Via SMS, email or   Anti-malware       GPS find
       tether              Anti-phishing      Remote block
                           Anti-spam




     POLICY COMPLIANCE      APPLICATIONS       DATA ACCESS
       Set password        Containerization   Data Encryption
       Jailbreak / Root    Data access        Remote wipe
       notice              restriction
       Force settings



PAGE 42 | 51
MDM: a convenient alternative?
---- Still want to go back to the old manual operation?




PAGE 43 | 51
KES/KSC10 in a nutshell

                 Platform
                 Console
                 Cost
See it                      Control it
PAGE 44 | 51   Protect it
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
               Encryption: a difficult play or an easy game?
               System Manager: what’s new?
               MDM: a convenient alternative?
               Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 45 | 51
KSV 2, KS-Exchange 8, KLMS 8, SPE 10…
---- Kaspersky comprehensive security offering
 Kaspersky Security for Virtualization
  • Effectively integrated with vShield, an agentless solution to deliver
    cloud/local anti-malware, network protection under KSC management;
  • Materialize the mission for VMware to enhance security via an effective
    agentless approach;
 Mail, collaboration and gateway security
  • Email, SharePoint and gateway security are always the essential;
  • Multi-layered spam filtering plus the best anti-malware for security
    elevation and resource optimization;
 Service Provider Edition
  • A web application designed for ISPs to provide anti-malware security
    control/monitoring service for corporate network;
  • Coupled with KSV, it delivers cloud based security products and services;

PAGE 46 | 51
Topics of discussion
    1    Business demands and IT challenges

    2    Kaspersky Endpoint Security for Business
               Encryption: a difficult play or an easy game?
               System Manager: what’s new?
               MDM: a convenient alternative?
               Others: KSV 2.0, KS-Exchange and KLMS 8

    3    Kaspersky Lab datasheet


PAGE 47 | 51
Kaspersky Lab datasheet




PAGE 48 | 51
Kaspersky Lab datasheet




PAGE 49 | 51
Kaspersky Lab datasheet




PAGE 50 | 51
Thank You!




 Nathan Wang, VP of Tech Divisions Kaspersky APAC
  nathan.wang@kaspersky.com


PAGE 51 | 51

More Related Content

What's hot

Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 

What's hot (20)

Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
 
Manning Information Security Strategy
Manning Information Security StrategyManning Information Security Strategy
Manning Information Security Strategy
 
Agile security
Agile securityAgile security
Agile security
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to Tenable
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 
OWASP Top Ten in Practice
OWASP Top Ten in PracticeOWASP Top Ten in Practice
OWASP Top Ten in Practice
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 

Viewers also liked

Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
Onwubiko Emmanuel
 
PALETTE BUSINESS SOLUTION DOCUMENTATION
PALETTE BUSINESS SOLUTION DOCUMENTATIONPALETTE BUSINESS SOLUTION DOCUMENTATION
PALETTE BUSINESS SOLUTION DOCUMENTATION
Onwubiko Emmanuel
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Kirill Kertsenbaum
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
GS CHO
 

Viewers also liked (13)

Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
 
PALETTE BUSINESS SOLUTION DOCUMENTATION
PALETTE BUSINESS SOLUTION DOCUMENTATIONPALETTE BUSINESS SOLUTION DOCUMENTATION
PALETTE BUSINESS SOLUTION DOCUMENTATION
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training Game
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...
 

Similar to Introduction to Kaspersky Endpoint Security for Businesss

Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
sferinga
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
sferinga
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
CTI Group
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
Andris Soroka
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
Trend Micro
 

Similar to Introduction to Kaspersky Endpoint Security for Businesss (20)

Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
stackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeestackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfee
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 

More from Andrew Wong

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
Andrew Wong
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
Andrew Wong
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
Andrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
Andrew Wong
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
Andrew Wong
 

More from Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Introduction to Kaspersky Endpoint Security for Businesss

  • 1. See it – Control it – Protect it – An into of Kaspersky Endpoint Security for Business Nathan Wang, VP of Tech Divisions Kaspersky APAC nathan.wang@kaspersky.com KESB Launch | Hong Kong | March 7-8, 2013 PAGE 1 | 51
  • 2. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 2 | 51
  • 3. Business drivers and their impact on IT 66% of business owners AGILITY Move fast, be nimble and flexible identify business agility as a priority Cut costs 54% of organizations say that EFFICIENCY their business processes Consolidate and streamline could be improved Maximise the value of existing resources 81% of business owners cite PRODUCTIVITY operational efficiencies as Do more with less their top strategic priority IMPACT on IT IT complexity: more data, more systems, more technology Pressure on resources and budgets PAGE 3 | 51
  • 4. And then, there’s the rise of malware… New threats every day 200K Malicious programs specifically targeting mobile devices >35K Malware files in Kaspersky Lab collection Jan 2013 >100m 1999 2001 2003 2005 2007 2009 2011 2013 PAGE 4 | 51
  • 5. The impact on IT security Response: Malware Anti-malware plus management tool / dashboard The #1 target: Response: Systems / patch applications! management YOUR DATA Your data is on Response: the move! Data encryption Response: Mobile / BYOD Mobile device management (MDM) PAGE 5 | 51
  • 6. What if? Malware The #1 target: 1 applications! PLATFORM MANAGEMENT CONSOLE COST YOUR DATA Your data is on the move! Mobile / BYOD PAGE 6 | 51
  • 7. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 7 | 51
  • 8. A high level glance of KES/KSC10 SEE CONTROL PROTECT Physical, virtual, mobile Configure and deploy Evolve beyond anti- Identify vulnerabilities Set and enforce IT virus Inventory HW and SW policies Meet security demands Take action with clear Manage employee- Protect data and reporting owned devices devices anywhere Prioritize patches Rely on Kaspersky License Management expertise NAC PAGE 8 | 51
  • 9. A high level glance of KES/KSC10 Kaspersky Kaspersky Endpoint Security Security Center •Anti-malware •Security policy mgmnt •Control Tools •Mobile Device Mgmnt •Encryption •Systems Management •Mail and Web •Image Mgmnt •Vulnerability Scan •NAC •Patch Mgmnt •Collaboration Server •SW/HW Mgmnt •License Mgmnt •Smartphones •Server •Tablets •Workstation •Laptop PAGE 9 | 51
  • 10. A high level glance of KES/KSC10 Total Collaboration Mail Gateway Advanced License Network Software Kaspersky Security Center Management Admission (NAC) Installation Systems Management (SMS) Image Patch Vulnerability Management Management Scan Data Protection (Encryption) Select Mobile Endpoint Mobile Device Management Security (MDM) File Server Security Application Control Device Control Web Control Core Anti Malware + Firewall Management Endpoint Infrastructure Cloud protection is enabled for business users via the PAGE 10 | 51 Kaspersky Security Network (KSN)
  • 11. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 11 | 51
  • 12. Encryption – quite difficult mechanism ---- Who is listening and what to do? Alice eVe Bob 1 0 0 0 2 0+1 0+1 0+2 1 0+2 0+2 0+1 2 0+1+2 0+1+2 0+1+2 PAGE 12 | 51
  • 13. Encryption – quite difficult mechanism ---- Color trick & numerical arithmetic with one-way function Alice eVe Bob PAGE 13 | 51
  • 14. Encryption – quite difficult mechanism  Encryption offering  Full Disk Encryption (FDE)  File Level Encryption (FLE)  Removable Media data Encryption (RME)  Asymmetric encryption — protection for data in transit  Secure connection between EP and KSC (SSL)  User and computer keys’ management exchange  Protection for recovery data  Symmetric encryption — protection for data at rest  Full disk encryption  File level encryption  Removable media data encryption  AES encryption module  256-bit  56-bit PAGE 14 | 51
  • 15. Encryption – quite difficult mechanism ---- Keys used in encryption  An individual master key for each computer  An individual key for User’s key each user Master key MS DPAPI  The computer key is encrypted using the public key of the Security Center  The user’s key is Master key encrypted using Master key the personal key Computer key store User key store PAGE 15 | 51
  • 16. Encryption – quite difficult mechanism ---- Document exchange inside a corp network 1 3 Master key #2 Master key #1 Encrypted file (Master key ID) User key store 4 Computer #1 2 Computer #2 PAGE 16 | 51
  • 17. Encryption – quite difficult mechanism ---- Boot order when FDE is used  Authentication Agent starts before the operating system  Key for decrypting the system boot sector  Special drivers are responsible for decrypting disk files during and after the operating system start Password Pre-boot Environment MBR Operating system boot record File system (Authentication Agent) Open data Encrypted data PAGE 17 | 51
  • 18. Encryption – an easy operation ---- Single Sign-On for end users Passwords match Passwords do not match Authentication Agent Windows Username/Password Username/Password Authentication Agent changes the password Next start PAGE 18 | 51
  • 19. Encryption – an easy operation ---- SSO, a routine policy configuration for IT guys PAGE 19 | 51
  • 20. Encryption – an easy operation ---- Enable encryption and policy configuration PAGE 20 | 51
  • 21. Encryption – an easy operation ---- “Tough” requirements for FLE and data recovery  The only requirement for FLE is the accessibility of KSC • The File Level Encryption is integrated to Windows’ authentication; • The key exchange is materialized automatically; • The Kaspersky encryption implementation is seamless to end users and applications, a great example of ease of use;  The data recovery requirement is simple • The computer to which the damaged disk connected can not have FDE enabled; • Just connect the damaged disk and run the recovery utility; No FDE enabled Old hard disk PAGE 21 | 51
  • 22. Encryption – an easy operation ---- Data sent to external parties PAGE 22 | 51
  • 23. Encryption – an easy operation ---- Removable Media data Encryption in clicks PAGE 23 | 51
  • 24. Encryption – an easy operation ---- Removable Media data Encryption in clicks PAGE 24 | 51
  • 25. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 25 | 51
  • 26. System Management: What’s new? ---- SM function via KSC and Network Agent  Software monitoring/inventory  Hardware monitoring/inventory  License Management  Vulnerability detection  Update management  Installation of 3rd party’s applications  Network Access Control (NAC)  Deployment of operating system images PAGE 26 | 51
  • 27. System Management: What’s new? ---- Licensed management (remember software inventory?) PAGE 27 | 51
  • 28. System Management: What’s new? ---- Licensed management (NOT licensing enforcement) Examples of use cases:  Error, the number of licenses is exceeded;  Warning, license will expire soon (in 14 days);  Info, 95% of the available licenses are used up PAGE 28 | 51
  • 29. System Management: What’s new? ---- New update management KL Expertise KL Vulnerability DB 1. Missing Windows updates Windows Update 2. Vulnerabilities Vulnerability from KL Scan Task database PAGE 29 | 51
  • 30. System Management: What’s new? ---- Patching vulnerabilities PAGE 30 | 51
  • 31. System Management: What’s new? ---- Testing tasks patch and update installation PAGE 31 | 51
  • 32. System Management: What’s new? ---- SM features in KSC9 and in the new KSC10  The previous implementation in KSC 9 are available: • Find vulnerabilities and Microsoft application updates (via the local WU service); • Installation of selected Microsoft updates (via the local WU service); • Installation of updates manually created and assigned by the administrator;  The new licensed capabilities added to KSC 10: • Automatic installation of updates and patches according to the specified rules; • Using of the KSC Server as a WSUS server; • Installation of updates and patches for the applications; included in the Kaspersky Lab database; • Other new features; PAGE 32 | 51
  • 33. System Management: What’s new? ---- Network Access/Admission Control (NAC)  NAC basics • Usually people think NAC is an appliance using SNMP; • NAC can be used to securely control authenticated/unauthenticated; user traffic according policies (based on port, protocol, subnet);  Capabilities of KL software based NAC • Block Internet access for computers having «bad» protection status; • Redirect unmanaged computers to the authorization portal; • Block any network activity for new devices; • Allow new computers accessing a special isolated subnet;  KL NAC architecture • Enforcers, Policy server, Access policy and Network devices; • Simple deployment and requires no changes on DHCP, DC; PAGE 33 | 51
  • 34. System Management: What’s new? ---- Network Access/Admission Control (NAC) PAGE 34 | 51
  • 35. System Management: What’s new? ---- Remote deployment of operating system images  Capturing an Operating System image • Install and use Windows Automated Installation Kit; • Enable representation of the OS image capture and distribution functionality; • Capture a computer image, say a Windows 8 operating system, with application pre-installed;  Deploying the image • Remote install the Windows 8 image to managed computers; • Remote install the Windows 8 image to ―bare metal‖ computers; PAGE 35 | 51
  • 36. Topics of discussion 1 Business demands and IT chandleries 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 36 | 51
  • 37. MDM: a convenient alternative? ---- What we have been doing manually PAGE 37 | 51
  • 38. MDM: a convenient alternative? ---- KL MDM architecture PAGE 38 | 51
  • 39. MDM: a convenient alternative? ---- KL MDM architecture iOS Apple Push Notification Service Android Windows Mobile Windows Phone Palm (WebOS) Nokia (Symbian, Maemo) PAGE 39 | 51
  • 40. MDM: a convenient alternative? ---- KL Mobile Devices Server installation  Adding Exchange ActiveSync Mobile Devices Server • Install Agent and MDM server on an Exchange Server;* • Testing the connection with a KSC Server; • Exchange ActiveSync configuration;  Profile creation and policy configuration • On the KSC, configures profiles and polices for selected mailbox of the Exchange • Sync the profile and policy with the Exchange  Mobile devices receive profiles and polices** • Direct Push is used for pushing notifications (MS Exchange ActiveSync) • Users receive it during the synchronization with the Exchange server PAGE 40 | 51
  • 41. MDM: a convenient alternative? ---- Synchronizing Mobile Devices with KSC Mobile Devices PAGE 41 | 51
  • 42. Kaspersky Mobile Endpoint Security ---- Centrally managed by the KSC CONFIGURE/DEPLOY SECURITY ANTI-THEFT Via SMS, email or Anti-malware GPS find tether Anti-phishing Remote block Anti-spam POLICY COMPLIANCE APPLICATIONS DATA ACCESS Set password Containerization Data Encryption Jailbreak / Root Data access Remote wipe notice restriction Force settings PAGE 42 | 51
  • 43. MDM: a convenient alternative? ---- Still want to go back to the old manual operation? PAGE 43 | 51
  • 44. KES/KSC10 in a nutshell Platform Console Cost See it Control it PAGE 44 | 51 Protect it
  • 45. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 45 | 51
  • 46. KSV 2, KS-Exchange 8, KLMS 8, SPE 10… ---- Kaspersky comprehensive security offering  Kaspersky Security for Virtualization • Effectively integrated with vShield, an agentless solution to deliver cloud/local anti-malware, network protection under KSC management; • Materialize the mission for VMware to enhance security via an effective agentless approach;  Mail, collaboration and gateway security • Email, SharePoint and gateway security are always the essential; • Multi-layered spam filtering plus the best anti-malware for security elevation and resource optimization;  Service Provider Edition • A web application designed for ISPs to provide anti-malware security control/monitoring service for corporate network; • Coupled with KSV, it delivers cloud based security products and services; PAGE 46 | 51
  • 47. Topics of discussion 1 Business demands and IT challenges 2 Kaspersky Endpoint Security for Business Encryption: a difficult play or an easy game? System Manager: what’s new? MDM: a convenient alternative? Others: KSV 2.0, KS-Exchange and KLMS 8 3 Kaspersky Lab datasheet PAGE 47 | 51
  • 51. Thank You! Nathan Wang, VP of Tech Divisions Kaspersky APAC nathan.wang@kaspersky.com PAGE 51 | 51