SlideShare a Scribd company logo
Introducing
    KASPERSKY ENDPOINT SECURITY FOR BUSINESS




1
Business drivers and their impact on IT
                                                                         66% of business owners
        AGILITY             Move fast, be nimble and flexible          identify business agility as a
                                                                                  priority


                            Cut costs                                  54% of organisations say that
     EFFICIENCY                                                          their business processes
                            Consolidate and streamline                      could be improved


                            Maximise the value of existing resources   81% of business owners cite
    PRODUCTIVITY                                                        operational efficiencies as
                            Do more with less                            their top strategic priority




    IMPACT ON IT
    IT complexity: more data, more systems, more technology
    Pressure on resources and budgets
2
And then, there’s the rise of malware…

                                                          New Threats Every Day   200K




                      Malicious programs specifically targeting mobile devices    >35K




                             Malware files in Kaspersky Lab collection Jan 2013   >100m




        1999   2001   2003      2005      2007     2009        2011    2013


3
The impact on IT security
                                             Response:
           Malware                           Anti-malware plus
                                             management tool / dashboard


                                Response:
        The #1 target:          Systems / patch
        applications!           management


                                                              YOUR DATA
        Your data is on         Response:
          the move!             Data encryption


                                             Response:
                                             Mobile device
        Mobile / BYOD                        management (MDM)




4
The impact on IT security
                                                       Response:
           Malware                                     Anti-malware plus
                                                       management tool / dashboard


                                              Response:
        The #1 target:           This is complexity / patch
                                              Systems
        applications!COMPLEXITY IS THE ENEMY OF IT SECURITY
                                              management


                                                                        YOUR DATA
        Your data is on                   Response:
          the move!                       Data encryption


                                                       Response:
                                                       Mobile device
        Mobile / BYOD                                  management (MDM)




5
What if?

           Malware




                          1
        The #1 target:
        applications!     PLATFORM
                          MANAGEMENT CONSOLE
                          COST YOUR DATA
        Your data is on
          the move!



        Mobile / BYOD




6
Introducing . . .


              KASPERSKY
            ENDPOINT SECURITY
            FOR BUSINESS



7
Kaspersky Endpoint Security for Business
    This single platform contains:




                                     Anti-malware                 Mobile security
                              traditional & cloud-assisted      MDM plus mobile security
                                                                        agent


                                 Systems
                                management                          Data encryption
                                 including patch                         file / folder,
                                  management                                full-disk
                                                     Endpoint
                                                   control tools:
                                                   application, device
                                                    and web control



8
Kaspersky Endpoint Security for Business
    All managed through a single management console:
    Kaspersky Security Center




                                Anti-malware                    Mobile security
                            traditional & cloud-assisted      MDM plus mobile security
                                                                      agent


                               Systems
                              Management                          Data encryption
                               including patch                         file / folder,
                                management                                full-disk
                                                   Endpoint
                                                 control tools:
                                                 application, device
                                                  and web control



9
For the first time, you can:
                 SEE                    CONTROL                      PROTECT
      Physical, virtual, mobile   Configure and deploy          Evolve beyond anti-virus
      Identify vulnerabilities    Set and enforce IT policies   Meet security demands
      Inventory HW and SW         Manage employee-owned         Protect data and devices
      Take action with clear      devices                       anywhere
      reporting                   Prioritise patches            Rely on Kaspersky
                                  License Management            expertise

                                  NAC




10
Bringing two benefits together
     Deeper protection + seamless manageability

           ENDPOINT / INFRASTRUCTURE               KASPERSKY SECURITY CENTER
           Anti-malware                             Mobile Device Management (MDM)
           Endpoint control tools                   Systems Management
           Encryption                               Security Policy Enforcement
           Mail and internet gateway security
           Collaboration

                                                                 Kaspersky
                                                               Security Center




           Smartphones              Servers
           Tablets                  Workstations
                                    Laptops




11
Anti-malware
     The foundation of the platform



                                Multi-point scanning


                                                                                      Kaspersky Anti-malware
                                         Cloud-assisted
                                                                                           Technology

                                         Award-winning


                                                                                                Kaspersky
                                                                                              Security Center




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
12
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
Data encryption
     Keeping your data safe, wherever it goes
     Encryption features
        File / folder or full-disk                                                    Integrates with device
        Transparent to end-users                                                      control and application
                                                                                      control


                                                   Inside the Network                                           Outside the Network




                                                      Transparent encryption
                                                          and decryption




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
13
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
Mobile security
     Mobile endpoint + MDM                                                                                       Kaspersky
                                                                                                               Security Center
                                                                        Mobile Device
                                                                      Management (MDM)
                                                                                                                  MDM



                                                                                              Microsoft
         Two components                                                                      Exchange                             Apple MDM
                                                                                             ActiveSync




                                                                        Endpoint Agent for
                                                                                                  *
                                                                         Mobile Devices
                                                                                         *                 *
                                                                                             Smartphones                         iOS devices
                                                                                             Tablets
                                                                                              •   Android
                                                                                              •   Windows
                                                                                              •   Symbian
       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure           •   Blackberry
14   MALWARE   ENCRYPTION
                            Mobile Security
                                              MANAGEMENT    TOOLS
Mobile solution features
                CONFIGURE/DEPLOY                                                           SECURITY                 ANTI-THEFT

                Via SMS, email or tether                                              Anti-malware              GPS find
                                                                                      Anti-phishing             Remote block
                                                                                      Anti-spam




               POLICY COMPLIANCE                                                         APPLICATIONS              DATA ACCESS

                Set password                                                          Containerisation          Data Encryption
                Jailbreak / Root notice                                               Data access restriction   Remote wipe
                Force settings




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
15
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
The perfect solution for BYOD
     Containerisation                                                                         Private ‘App’ Portal

                                                                                                          
                                                                                                  App     App
               Corporate

                                  Personal



                                                                  Keeps corporate                         
                                                                                                  App     App
                                                                  data separate                                        Kaspersky
                                                                                                                     Security Center
                                                                  Encrypted                               
                                                                                                  App     App
                                                                  Selectively wiped
                                                                                                          
                                                                                                  App     App




       ANTI             DATA                           SYSTEMS     CONTROL   Infrastructure
16
                                   Mobile Security
     MALWARE         ENCRYPTION                      MANAGEMENT     TOOLS
Systems management
     Staying up-to-date just got faster and easier
               SYSTEM PROVISIONING                                                    LICENCE MANAGEMENT            REMOTE TOOLS

                Create images                                                          Track usage                Install applications
                Store and update                                                       Manage renewals            Update applications
                Deploy                                                                 Manage licence             Troubleshoot
                                                                                       compliance




                  VULNERABILITY                                                       ADVANCED PATCHING           NETWORK ADMISSION
                      SCANNING                                                                                      CONTROL (NAC)
                HW and SW inventory                                                    Automated prioritisation   Guest policy
                Multiple vulnerability                                                 Reboot options             management
                databases                                                                                         Guest portal




       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
17
                            Mobile Security
     MALWARE   ENCRYPTION                     MANAGEMENT    TOOLS
Control tools
     Applications, devices and web


          DEVICE CONTROL




          WEB CONTROL




          APPLICATION CONTROL
          WITH DYNAMIC WHITELISTING



       ANTI       DATA                          SYSTEMS    CONTROL   Infrastructure
18   MALWARE   ENCRYPTION
                            Mobile Security
                                              MANAGEMENT    TOOLS
Mail, Internet gateway and collaboration
     Comprehensive infrastructure protection

                          Security                                                     Security             Security
                          for Mail                                              For Internet Gateways   For Collaboration
               Microsoft Exchange                                                 Microsoft ISA/TMG     Microsoft SharePoint
                                                                                  Squid                 servers
               Lotus Notes/Domino
               Linux Mail Servers                                                 Firewall




            DATA                          SYSTEMS    CONTROL   Infrastructure
19       ENCRYPTION
                      Mobile Security
                                        MANAGEMENT    TOOLS
Supported and powered by the Kaspersky
     Security Network

           Global cloud network
            of millions of users


          Dynamic reputation of
         applications and websites


          Improves performance
        and reduces false positives


          Tightly integrated with
           protection features
                                      KASPERSKY GLOBAL USERS


20
Kaspersky Endpoint Security for Business:
     Progressive, feature-rich tiers

                                APP, DEVICE,    MOBILE       DATA        SYSTEMS     MAIL, WEB AND
                ANTI-MALWARE   WEB CONTROL     SECURITY   ENCRYPTION   MANAGEMENT   COLLABORATION


        TOTAL


     ADVANCED


       SELECT


        CORE




21
In detail
            Total
                       Collaboration                       Mail                     Internet Gateway

        Advanced    Licence Management         Network Admission (NAC)            Software Installation

                    System Provisioning             Patch Management               Vulnerability Scan




                                                                                                          Kaspersky Security Center
                                                     Data Encryption

           Select        Mobile Endpoint Security                     Mobile Device Management (MDM)

                                                    File Server Security

                    Application Control              Device Control                  Web Control

            Core                                Anti-malware + Firewall

                                          Endpoint             Management             Infrastructure

                       Cloud-enabled via the
                       Kaspersky Security Network (KSN)



22
Plus: additional targeted solutions
     Kaspersky Security for...


          File           Systems           Storage         Mail
         Servers        Management


         Mobile         Virtualization   Collaboration    Internet
                                                         Gateways




23
Summary: a unique set of benefits
                 SEE           CONTROL          PROTECT




               Deeper                IT           Unified
              protection        efficiency      management



                   REDUCE BUSINESS RISK, WITH MAXIMUM
                           BUSINESS EFFICIENCY
                     – WITH KASPERSKY, NOW YOU CAN




24
Why Kaspersky for your business?


      AWARD-WINNING ANTI-MALWARE



                           Over 80 IT, networking security and communications vendors have
      KASPERSKY INSIDE    chosen to embed Kaspersky Lab anti-malware technology inside their
                            own solutions, including Microsoft, IBM, Checkpoint and Juniper.



                             We do not acquire technologies and then try to integrate them.
      BUILT, NOT BOUGHT   Every feature and function is built up from the same, single code base.




25
KASPERSKY ENDPOINT SECURITY FOR BUSINESS




     www.kaspersky.com/business
26

More Related Content

What's hot

Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
AlienVault
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
dj1arry
 
Soc
SocSoc
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
Splunk
 
Azure sentinel
Azure sentinelAzure sentinel
Azure sentinel
Marius Sandbu
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
Dipak Bamugade
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
David J Rosenthal
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
NebiyeLioul
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
Risk Analysis Consultants, s.r.o.
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
Piyush Jain
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
Boris Otto
 
Role Based Access Control - Overview
Role Based Access Control - OverviewRole Based Access Control - Overview
Role Based Access Control - Overview
Hitachi ID Systems, Inc.
 
Microsoft Dynamics 365 and why you need it NOW!
Microsoft Dynamics 365 and why you need it NOW!Microsoft Dynamics 365 and why you need it NOW!
Microsoft Dynamics 365 and why you need it NOW!
David Blumentals
 
Session 1: INTRODUCTION TO SALESFORCE
Session 1: INTRODUCTION TO SALESFORCESession 1: INTRODUCTION TO SALESFORCE
Session 1: INTRODUCTION TO SALESFORCE
SmritiSharan1
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
Information security
Information securityInformation security
Information security
linalona515
 
Why is Customer Data Platform (CDP) ?
Why is Customer Data Platform (CDP) ?Why is Customer Data Platform (CDP) ?
Why is Customer Data Platform (CDP) ?
Trieu Nguyen
 
Business intelligence in the real time economy
Business intelligence in the real time economyBusiness intelligence in the real time economy
Business intelligence in the real time economy
Johan Blomme
 

What's hot (20)

Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Soc
SocSoc
Soc
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Azure sentinel
Azure sentinelAzure sentinel
Azure sentinel
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
 
Role Based Access Control - Overview
Role Based Access Control - OverviewRole Based Access Control - Overview
Role Based Access Control - Overview
 
Microsoft Dynamics 365 and why you need it NOW!
Microsoft Dynamics 365 and why you need it NOW!Microsoft Dynamics 365 and why you need it NOW!
Microsoft Dynamics 365 and why you need it NOW!
 
Session 1: INTRODUCTION TO SALESFORCE
Session 1: INTRODUCTION TO SALESFORCESession 1: INTRODUCTION TO SALESFORCE
Session 1: INTRODUCTION TO SALESFORCE
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Information security
Information securityInformation security
Information security
 
Why is Customer Data Platform (CDP) ?
Why is Customer Data Platform (CDP) ?Why is Customer Data Platform (CDP) ?
Why is Customer Data Platform (CDP) ?
 
Business intelligence in the real time economy
Business intelligence in the real time economyBusiness intelligence in the real time economy
Business intelligence in the real time economy
 

Viewers also liked

Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Kirill Kertsenbaum
 
Kaspersky Security center 10 documentation
Kaspersky Security center 10  documentationKaspersky Security center 10  documentation
Kaspersky Security center 10 documentation
Tarek Amer
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
ShapeBlue
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
Sophos Benelux
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
Sophos
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
Onwubiko Emmanuel
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
DeServ - Tecnologia e Servços
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
Giovanni Giovannelli
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
Kaspersky
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
Sophos
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training Game
FFFOD
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...
UNIDEES Algérie
 

Viewers also liked (15)

Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Kaspersky Security center 10 documentation
Kaspersky Security center 10  documentationKaspersky Security center 10  documentation
Kaspersky Security center 10 documentation
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training Game
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...
 

Similar to Introducing New Kaspersky Endpoint Security for Business - ENGLISH

KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
francis578223
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
sferinga
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
sferinga
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
arms8586
 
Advocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureAdvocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management Brochure
Jon Prete
 
Advocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device Management
Advocate Consulting
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
Mobile Monday Brussels
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Sverige
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
Carahsoft
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
Symantec
 
Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
scoopnewsgroup
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
DataExchangeAgency
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
Symantec
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
Plain Concepts
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
 
Renovo CE IT Overview
Renovo CE IT OverviewRenovo CE IT Overview
Renovo CE IT Overview
renovohcitmgmt
 

Similar to Introducing New Kaspersky Endpoint Security for Business - ENGLISH (20)

KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
Advocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureAdvocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management Brochure
 
Advocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device Management
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Renovo CE IT Overview
Renovo CE IT OverviewRenovo CE IT Overview
Renovo CE IT Overview
 

More from Kirill Kertsenbaum

PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANPHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANKirill Kertsenbaum
 
vForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANvForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANKirill Kertsenbaum
 
IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...Kirill Kertsenbaum
 
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANIntroducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANKirill Kertsenbaum
 
Kaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKirill Kertsenbaum
 
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...Kirill Kertsenbaum
 
Kaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKirill Kertsenbaum
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
Kirill Kertsenbaum
 
Cybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANCybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANKirill Kertsenbaum
 
Russian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANRussian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANKirill Kertsenbaum
 
Russian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANRussian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANKirill Kertsenbaum
 

More from Kirill Kertsenbaum (12)

PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIANPHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
 
vForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIANvForum 2014 - Cloud Security evolution - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIAN
 
IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...IDC 2013 - How to provide confidentiality, integrity and availability in time...
IDC 2013 - How to provide confidentiality, integrity and availability in time...
 
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIANIntroducing New Kaspersky Endpoint Security for Business - RUSSIAN
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
 
Kaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIANKaspersky Endpoint Security and Control - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIAN
 
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
 
Kaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIANKaspersky Security For Virtualization - RUSSIAN
Kaspersky Security For Virtualization - RUSSIAN
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
 
Cybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIANCybercrime: Past, Present and Future - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIAN
 
DLP in global view - RUSSIAN
DLP in global view - RUSSIANDLP in global view - RUSSIAN
DLP in global view - RUSSIAN
 
Russian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIANRussian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIAN
 
Russian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIANRussian CSO Summit 2011 - 1 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIAN
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Introducing New Kaspersky Endpoint Security for Business - ENGLISH

  • 1. Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1
  • 2. Business drivers and their impact on IT 66% of business owners AGILITY Move fast, be nimble and flexible identify business agility as a priority Cut costs 54% of organisations say that EFFICIENCY their business processes Consolidate and streamline could be improved Maximise the value of existing resources 81% of business owners cite PRODUCTIVITY operational efficiencies as Do more with less their top strategic priority IMPACT ON IT IT complexity: more data, more systems, more technology Pressure on resources and budgets 2
  • 3. And then, there’s the rise of malware… New Threats Every Day 200K Malicious programs specifically targeting mobile devices >35K Malware files in Kaspersky Lab collection Jan 2013 >100m 1999 2001 2003 2005 2007 2009 2011 2013 3
  • 4. The impact on IT security Response: Malware Anti-malware plus management tool / dashboard Response: The #1 target: Systems / patch applications! management YOUR DATA Your data is on Response: the move! Data encryption Response: Mobile device Mobile / BYOD management (MDM) 4
  • 5. The impact on IT security Response: Malware Anti-malware plus management tool / dashboard Response: The #1 target: This is complexity / patch Systems applications!COMPLEXITY IS THE ENEMY OF IT SECURITY management YOUR DATA Your data is on Response: the move! Data encryption Response: Mobile device Mobile / BYOD management (MDM) 5
  • 6. What if? Malware 1 The #1 target: applications! PLATFORM MANAGEMENT CONSOLE COST YOUR DATA Your data is on the move! Mobile / BYOD 6
  • 7. Introducing . . . KASPERSKY ENDPOINT SECURITY FOR BUSINESS 7
  • 8. Kaspersky Endpoint Security for Business This single platform contains: Anti-malware Mobile security traditional & cloud-assisted MDM plus mobile security agent Systems management Data encryption including patch file / folder, management full-disk Endpoint control tools: application, device and web control 8
  • 9. Kaspersky Endpoint Security for Business All managed through a single management console: Kaspersky Security Center Anti-malware Mobile security traditional & cloud-assisted MDM plus mobile security agent Systems Management Data encryption including patch file / folder, management full-disk Endpoint control tools: application, device and web control 9
  • 10. For the first time, you can: SEE CONTROL PROTECT Physical, virtual, mobile Configure and deploy Evolve beyond anti-virus Identify vulnerabilities Set and enforce IT policies Meet security demands Inventory HW and SW Manage employee-owned Protect data and devices Take action with clear devices anywhere reporting Prioritise patches Rely on Kaspersky License Management expertise NAC 10
  • 11. Bringing two benefits together Deeper protection + seamless manageability ENDPOINT / INFRASTRUCTURE KASPERSKY SECURITY CENTER Anti-malware Mobile Device Management (MDM) Endpoint control tools Systems Management Encryption Security Policy Enforcement Mail and internet gateway security Collaboration Kaspersky Security Center Smartphones Servers Tablets Workstations Laptops 11
  • 12. Anti-malware The foundation of the platform Multi-point scanning Kaspersky Anti-malware Cloud-assisted Technology Award-winning Kaspersky Security Center ANTI DATA SYSTEMS CONTROL Infrastructure 12 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 13. Data encryption Keeping your data safe, wherever it goes Encryption features File / folder or full-disk Integrates with device Transparent to end-users control and application control Inside the Network Outside the Network Transparent encryption and decryption ANTI DATA SYSTEMS CONTROL Infrastructure 13 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 14. Mobile security Mobile endpoint + MDM Kaspersky Security Center Mobile Device Management (MDM) MDM Microsoft Two components Exchange Apple MDM ActiveSync Endpoint Agent for * Mobile Devices * * Smartphones iOS devices Tablets • Android • Windows • Symbian ANTI DATA SYSTEMS CONTROL Infrastructure • Blackberry 14 MALWARE ENCRYPTION Mobile Security MANAGEMENT TOOLS
  • 15. Mobile solution features CONFIGURE/DEPLOY SECURITY ANTI-THEFT Via SMS, email or tether Anti-malware GPS find Anti-phishing Remote block Anti-spam POLICY COMPLIANCE APPLICATIONS DATA ACCESS Set password Containerisation Data Encryption Jailbreak / Root notice Data access restriction Remote wipe Force settings ANTI DATA SYSTEMS CONTROL Infrastructure 15 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 16. The perfect solution for BYOD Containerisation Private ‘App’ Portal   App App Corporate Personal Keeps corporate   App App data separate Kaspersky Security Center Encrypted   App App Selectively wiped   App App ANTI DATA SYSTEMS CONTROL Infrastructure 16 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 17. Systems management Staying up-to-date just got faster and easier SYSTEM PROVISIONING LICENCE MANAGEMENT REMOTE TOOLS Create images Track usage Install applications Store and update Manage renewals Update applications Deploy Manage licence Troubleshoot compliance VULNERABILITY ADVANCED PATCHING NETWORK ADMISSION SCANNING CONTROL (NAC) HW and SW inventory Automated prioritisation Guest policy Multiple vulnerability Reboot options management databases Guest portal ANTI DATA SYSTEMS CONTROL Infrastructure 17 Mobile Security MALWARE ENCRYPTION MANAGEMENT TOOLS
  • 18. Control tools Applications, devices and web DEVICE CONTROL WEB CONTROL APPLICATION CONTROL WITH DYNAMIC WHITELISTING ANTI DATA SYSTEMS CONTROL Infrastructure 18 MALWARE ENCRYPTION Mobile Security MANAGEMENT TOOLS
  • 19. Mail, Internet gateway and collaboration Comprehensive infrastructure protection Security Security Security for Mail For Internet Gateways For Collaboration Microsoft Exchange Microsoft ISA/TMG Microsoft SharePoint Squid servers Lotus Notes/Domino Linux Mail Servers Firewall DATA SYSTEMS CONTROL Infrastructure 19 ENCRYPTION Mobile Security MANAGEMENT TOOLS
  • 20. Supported and powered by the Kaspersky Security Network Global cloud network of millions of users Dynamic reputation of applications and websites Improves performance and reduces false positives Tightly integrated with protection features KASPERSKY GLOBAL USERS 20
  • 21. Kaspersky Endpoint Security for Business: Progressive, feature-rich tiers APP, DEVICE, MOBILE DATA SYSTEMS MAIL, WEB AND ANTI-MALWARE WEB CONTROL SECURITY ENCRYPTION MANAGEMENT COLLABORATION TOTAL ADVANCED SELECT CORE 21
  • 22. In detail Total Collaboration Mail Internet Gateway Advanced Licence Management Network Admission (NAC) Software Installation System Provisioning Patch Management Vulnerability Scan Kaspersky Security Center Data Encryption Select Mobile Endpoint Security Mobile Device Management (MDM) File Server Security Application Control Device Control Web Control Core Anti-malware + Firewall Endpoint Management Infrastructure Cloud-enabled via the Kaspersky Security Network (KSN) 22
  • 23. Plus: additional targeted solutions Kaspersky Security for... File Systems Storage Mail Servers Management Mobile Virtualization Collaboration Internet Gateways 23
  • 24. Summary: a unique set of benefits SEE CONTROL PROTECT Deeper IT Unified protection efficiency management REDUCE BUSINESS RISK, WITH MAXIMUM BUSINESS EFFICIENCY – WITH KASPERSKY, NOW YOU CAN 24
  • 25. Why Kaspersky for your business? AWARD-WINNING ANTI-MALWARE Over 80 IT, networking security and communications vendors have KASPERSKY INSIDE chosen to embed Kaspersky Lab anti-malware technology inside their own solutions, including Microsoft, IBM, Checkpoint and Juniper. We do not acquire technologies and then try to integrate them. BUILT, NOT BOUGHT Every feature and function is built up from the same, single code base. 25
  • 26. KASPERSKY ENDPOINT SECURITY FOR BUSINESS www.kaspersky.com/business 26