Download presentation
Presentation is loading. Please wait.
1
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS The following presentation outlines the features, technologies and applications within Kaspersky Endpoint Security for Business.
2
Business drivers and their impact on IT
Move fast, be nimble and flexible AGILITY 66% of business owners identify business agility as a priority Cut costs Consolidate and streamline EFFICIENCY 54% of organisations say that their business processes could be improved Maximise the value of existing resources Do more with less PRODUCTIVITY 81% of business owners cite operational efficiencies as their top strategic priority At Kaspersky, we know that businesses are under pressure and they all face the same key challenges to stay afloat: they need greater agility, better efficiency and improved productivity. To help meet these challenges, companies are turning to IT to improve processes, deploy and support new systems and technology… and of course manage and protect an ever growing amount of corporate data. But what's the impact of this on IT? And in a tough economic climate how do IT teams… with limited resources and budget… ensure their business achieves its goals? Well quite simply they need to do more with less. IMPACT ON IT IT complexity: more data, more systems, more technology Pressure on resources and budgets
3
And then, there’s the rise of malware…
New Threats Every Day 200K Malicious programs specifically targeting mobile devices >35K Malware files in Kaspersky Lab collection Jan 2013 >100m Malware continues to grow exponentially. We are now seeing more than 200,000 new malware samples every single day. It’s true: Cybercriminals are accelerating their production of malicious software. But now – they’re expanding beyond their traditional methods and are using different vectors. A case in point – we are now tracking over 35,000 different malicious programs designed specifically to target mobile devices like smart phones and tablets. As of January 2013, Kaspersky’s malware collection contains over 100 million threats. Just two years ago, that number was only 50 million. Malware is not a small problem. 1999 2001 2003 2005 2007 2009 2011 2013
4
The impact on IT security
Malware Response: Anti-malware plus management tool / dashboard The #1 target: applications! Response: Systems / patch management Your data Your data is on the move! Response: Data encryption So – how do you deal with all of this? Most likely you’ve already invested in a fairly robust anti-virus solution. But to manage all these new vectors: You also need a systems management solution for patching holes in your applications – the cybercriminals #1 target. You’ll need an encryption tool to protect data on laptops… and a Mobile Device Management tool to secure your mobile phones. That means four, or possibly more, evaluation processes… four or more separate management consoles… and multiple policies to create, maintain and enforce. But more importantly, even if you make the effort to get all of these tools, you're still going to have gaps in your overall security posture. Why? Because you have multiple policy sets and systems that just aren't designed to work well together. As a result of this, IT security professionals tell us that one of the biggest challenges they face is a lack of interoperability between their security systems. Response: Mobile device management (MDM) Mobile / BYOD
5
The impact on IT security
Malware Response: Anti-malware plus management tool / dashboard This is complexity COMPLEXITY IS THE ENEMY OF IT SECURITY The #1 target: applications! Response: Systems / patch management Your data Your data is on the move! Response: Data encryption So this means the core challenge in today's environment isn't that there are no tools available. It's that each individual tool adds to the complexity you face when trying to implement your security policies. And complexity is the enemy of security. Response: Mobile device management (MDM) Mobile / BYOD
6
The #1 target: applications!
What if? Malware The #1 target: applications! 1 Your data platform management console cost Your data is on the move! But what if you could reduce the number of tools you have to work with and the number of consoles you have to manage, while still getting the security that you need? With Kaspersky, you CAN close the gaps in your security posture AND reduce the number of tools you have to work with. Over the next few minutes, I want to share with you how ONLY Kaspersky provides complete, fully integrated protection that gives you the world's best anti-malware protection... robust control tools... plus system management... encryption... and Mobile Device Management… all managed from a single console and available in a single purchase. But this isn't just about getting four separate systems, or a suite of products for one price. This is about a UNIFIED platform that makes it easy for you to see your risk across your systems and endpoints… You can APPLY your policies consistently… AND finally bring your security posture in line with your business objectives. One Platform! One Console! One Cost! So you're able to reduce the risk to your data, reduce the complexity of your security tools, AND reduce your investment. Mobile / BYOD
7
KASPERSKY ENDPOINT SECURITY FOR BUSINESS Introducing . . .
Introducing: Kaspersky Endpoint Security for Business - delivering a broad array of tools and technologies that give you the ability to see, control and protect all endpoint devices. Kaspersky lab provides the most complete security platform for the endpoint - from one central console - is easy to deploy - and easy to manage.
8
Kaspersky Endpoint Security for Business
This single platform contains: Anti-malware traditional & cloud-assisted Mobile security MDM plus mobile security agent Systems management including patch management Data encryption file / folder, full-disk This single platform contains: Anti-malware. Kaspersky's award-winning technology – using multiple modules and supported by a cloud-enabled file reputation system. Mobile Security – consisting of MDM and a mobile agent loaded onto the device. Data encryption – those most certain way to ensure your data is safe, even if it falls into the wrong hands. Robust endpoint controls – including application control, device control and web control. And finally – systems management. Kaspersky’s technology has expanded to include several valuable tools designed to enhance IT efficiency. Endpoint control tools: application, device and web control
9
Kaspersky Endpoint Security for Business
All managed through a single management console: Kaspersky Security Center Anti-malware traditional & cloud-assisted Mobile security MDM plus mobile security agent Systems Management including patch management Data encryption file / folder, full-disk And these are all managed from a single administrative console: the Kaspersky Security Center. Kaspersky’s platform doesn’t require administrators to use a separate administrative console for each new feature or technology. All of our technologies were written by Kaspersky engineers from the same code base. Endpoint control tools: application, device and web control
10
For the first time, you can:
Physical, virtual, mobile Identify vulnerabilities Inventory HW and SW Take action with clear reporting SEE Configure and deploy Set and enforce IT policies Manage employee-owned devices Prioritise patches License Management NAC CONTROL Evolve beyond anti-virus Meet security demands Protect data and devices anywhere Rely on Kaspersky expertise PROTECT From one place, you can see and identify all endpoint assets, conduct fast & thorough vulnerability assessments, achieve real-time inventory and take action with clear reporting. Using the default or customised configurations, you can set and enforce security policies to manage application behavior, (you can) control peripherals, web use, encryption, and mobile devices – whether in the office, or on the move. And since protecting your corporate data has become more complicated, you know that anti-virus is no longer enough. Now you can support the demands of your business, confident in Kaspersky’s expertise, now: with even more capabilities to confront today’s emerging threats.
11
Bringing two benefits together
Deeper protection + seamless manageability Anti-malware Endpoint control tools Encryption Mail and internet gateway security Collaboration ENDPOINT / INFRASTRUCTURE Smartphones Tablets Servers Workstations Laptops Mobile Device Management (MDM) Systems Management Security Policy Enforcement KASPERSKY SECURITY CENTER Kaspersky Security Center Many of the technologies we are offering are loaded on the endpoint and are known as “Endpoint Security” offerings. This means our anti-malware, Control tools, Data protection, Mail and Web products are installed on an endpoint for it’s protection. This includes mobile devices such as smartphones and tablets. Specifically the Mobile Device Management and Systems Management are integrated modules of the Kaspersky Security Center and are used by the administrator at the console. Existing customers and new customers alike will discover unprecedented ease of use by having each technology and feature working together within a single, integrated console.
12
Kaspersky Anti-malware Technology
The foundation of the platform Multi-point scanning Kaspersky Anti-malware Technology Cloud-assisted Award-winning The starting point of the platform is Kaspersky’s award-winning anti-malware technology. This technology consists of several scanning modules, cloud-assisted protection and a robust firewall. This is the technology you are accustomed to selling and that which has made Kaspersky a leader in our industry. Central management is accomplished by Kaspersky Security Center. Again, as the administrator adds new features, the additional management tools will also be accessed through this same console. Kaspersky Security Center ANTI MALWARE DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS Infrastructure
13
Transparent encryption
Data encryption Keeping your data safe, wherever it goes Encryption features File / folder or full-disk Transparent to end-users Integrates with device control and application control Inside the Network Outside the Network An exciting technology to help companies protect their critical data is Encryption. Encryption technology assures IT that data that gets into the wrong hands, will be un-readable. For example, if a user misplaces a USB storage device, their laptop is stolen, or perhaps malware is present that is designed to steal files – the data on that device is safe from being exploited. Kaspersky employs an AES encryption algorithm with 256 bits of key length. The IT manager can choose what mode of encryption they desire, and feel comfortable in knowing the solution is transparent to the user inside the network – and secure for the external user. On the subject of encryption, one key differentiator that Kaspersky offers is the ability to employ integrated policies. This is important and you'll frequently hear Kaspersky refer to this term. Integrated policies allow the administrator to set a single policy that covers multiple technologies such as application control, device control and encryption. Kaspersky doesn't force you to create three policies from three different consoles. This is a big time saver and it removes the complexity from your IT environment. For example, we can integrate a device control policy, with our encryption technology by mandating that the data on a removable device is encrypted. The encryption technology also intersects with Kaspersky's application controls. This means a single policy creates a transparent experience for the user by restricting access to encrypted files by certain applications. Most solutions in the market today DON'T have this flexibility and FORCE the IT manager to create multiple policies AND manage them from multiple consoles. Transparent encryption and decryption ANTI MALWARE DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS Infrastructure
14
Kaspersky Security Center Mobile Device Management (MDM)
Mobile security Mobile endpoint + MDM Kaspersky Security Center MDM Mobile Device Management (MDM) Microsoft Exchange ActiveSync Apple MDM Two components * Because the IT manager expanded their support from the workplace to include a new era of increasing mobility – Kaspersky has solidified our mobile solutions offering. Kaspersky Security for Mobile is made up of: An endpoint agent for mobile devices. This is an application loaded onto a mobile device such as a smartphone or a tablet. The second component is a new technology for Kaspersky: Mobile Device Management (or MDM). MDM allows the IT manager to securely configure mobile devices. This configuration can include basic device security settings and very advanced security features of our endpoint agent– all of which can be sent to the device either in an SMS message, or via a tether. This means a device can be configured remotely… – the IT manager doesn’t have to physically touch it. Because MDM is a managed component of Kaspersky Security Center – the IT manager uses this already familiar framework to make the mobile deployment even more secure with no additional training. With this new release, our supported platform expands to include iOS. It’s important to know, though that not all features are enabled on all mobile platforms, so consult your product documentation available on the Kaspersky website or pre-sales technical support. Endpoint Agent for Mobile Devices * * Smartphones Tablets iOS devices Android Windows Symbian Blackberry ANTI MALWARE DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS Infrastructure
15
Mobile solution features
CONFIGURE/DEPLOY SECURITY ANTI-THEFT Via SMS, or tether Anti-malware Anti-phishing Anti-spam GPS find Remote block POLICY COMPLIANCE APPLICATIONS DATA ACCESS Set password Jailbreak / Root notice Force settings Containerisation Data access restriction Data Encryption Remote wipe Our Security for Mobile offering addresses 6 key aspects of mobility. First: Simplified configuration and deployment of mobile devices Followed by Essential security features If a device falls into the wrong hands – Kaspersky includes anti-theft features to stop would-be criminals in their tracks. Of course, IT managers want to ensure all devices are configured to ensure compliance And that users are able to keep their work applications separate from their personal items – this is particularly useful for Bring-Your-Own-Device initiatives. Finally, with features like simplified encryption and remote wipe, unauthorised network access to critical data is eliminated. ANTI MALWARE DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS Infrastructure
16
The perfect solution for BYOD
Containerisation Corporate Personal Private ‘App’ Portal App App Keeps corporate data separate Encrypted Selectively wiped App App Kaspersky Security Center App App App App Lets look at some of the features that make our Mobile Security an ideal fit for companies who are employing a “bring your own device” strategy. First, we support the ability to “containerise” data on a mobile device. This means we can keep personal and corporate data in 2 separate ‘containers’ on the device. A policy can be set that forces encryption for the data – and each container can be selectively wiped in case of theft, loss or employee separation. Also, Kaspersky Security Center, enabled with MDM, contains a web server dedicated to serving approved mobile applications for the organization. This means that IT can select which apps have been approved for the user, and present them in a company “app store” or “portal.” ANTI MALWARE DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS Infrastructure
17
VULNERABILITY SCANNING NETWORK ADMISSION CONTROL (NAC)
Systems management Staying up-to-date just got faster and easier Create images Store and update Deploy SYSTEM PROVISIONING Track usage Manage renewals Manage licence compliance LICENCE MANAGEMENT Install applications Update applications Troubleshoot REMOTE TOOLS HW and SW inventory Multiple vulnerability databases VULNERABILITY SCANNING Automated prioritisation Reboot options ADVANCED PATCHING Guest policy management Guest portal NETWORK ADMISSION CONTROL (NAC) Now lets talk about Kaspersky Systems management. Several very useful tools designed to enhance security and streamline IT efficiency are found in this module. IT managers today are forced to use a separate tool to create, store and deploy their disk images. With Kaspersky Systems management, this useful feature is included in their security console. With License management – an organization can save money on valuable application software licenses by keeping track of their usage and paying for only those licenses they actually employ. License compliancy can also be managed along with their expiration dates. From this same console, the IT manager is able to deploy software or updates to an endpoint or group of endpoints. This is especially valuable for organizations with branch or remote offices. Also, remote troubleshooting can be engaged through the familiar Kaspersky Security center rather than use a separate application. An enhanced vulnerability scanning module enables hardware and software inventories and matches them across multiple databases for known vulnerabilities. When used with Kaspersky’s Advanced Patching module, we assist the IT manager in prioritizing which vulnerabilities that require immediate attention – further reducing their workload. And – with Kaspersky network admission control (or NAC), securely allowing guests onto the network in a secure fashion is simplified. Kaspersky even comes with a guest access portal and easy-to-set policies for network resource usage. ANTI MALWARE DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS Infrastructure
18
Control tools Applications, devices and web DEVICE CONTROL WEB CONTROL
Kaspersky’s control tools have become a key part of our protection methods. They have helped our customers implement security policies and are a significant differentiator for us. Device control helps you enforce policies on connected peripheral devices… web control ensures your online polices are maintained, even when the endpoint is off the network… … and lastly and most importantly, application control with dynamic whitelisting, allows IT administrators to create and enforce policies around the usage and privileges of applications in the workplace. APPLICATION CONTROL WITH DYNAMIC WHITELISTING ANTI MALWARE DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS Infrastructure
19
Mail, Internet gateway and collaboration
Comprehensive infrastructure protection Microsoft Exchange Lotus Notes/Domino Linux Mail Servers Security for Mail Microsoft ISA/TMG Squid Firewall Security For Internet Gateways Microsoft SharePoint servers Security For Collaboration Kaspersky users have known and used our award winning protection for mail, internet gateway and collaboration protection. Kaspersky offers businesses 3 key security offerings: Kaspersky Security for Mail Kaspersky Security for Internet Gateways, and Kaspersky Security for Collaboration. Mail, Web and Collaboration security form the peak atop a mountain of protective features, technologies and applications. DATA ENCRYPTION Mobile Security SYSTEMS MANAGEMENT CONTROL TOOLS Infrastructure
20
Supported and powered by the Kaspersky Security Network
Global cloud network of millions of users Dynamic reputation of applications and websites Improves performance and reduces false positives Many of these integrated components work together and are made even STRONGER by our cloud-based reputation system (the Kaspersky Security Network), which is a key element in our platform. Tens of millions of Kaspersky users around the world provide snapshots of suspicious activity on their systems. This powerful technology enables Kaspersky to globally respond to a malware outbreak in seconds! Tightly integrated with protection features KASPERSKY GLOBAL USERS
21
MAIL, WEB AND COLLABORATION
Kaspersky Endpoint Security for Business: Progressive, feature-rich tiers ANTI-MALWARE APP, DEVICE, WEB CONTROL MOBILE SECURITY DATA ENCRYPTION SYSTEMS MANAGEMENT MAIL, WEB AND COLLABORATION TOTAL ADVANCED SELECT Across 4 broad tiers, Kaspersky is evolving from protecting network infrastructure layer by layer – into a model where our customers can better address the challenges that are facing them today. The tools and features that Kaspersky offers in these 4 tiers deliver the protection and value IT managers around the globe been looking for. The tiers of Kaspersky endpoint security for business begin with Kaspersky’s award-winning and powerful Anti-Malware technology in the Core tier. But, we know anti-malware by itself isn’t enough to deal with today’s threats. For that reason, in the Select tier, we’ve added Application Whitelisting and Control, Device control and Web control to the protection roster. Also included at this tier is Kaspersky Lab’s mobile security solution. Moving to the Advanced tier – this is where we include data protection in the form of Encryption. Here we also find the IT efficiency features of Kaspersky Systems Management. You’ll experience an immense amount of value in this broad set of features. Our final Tier – Kaspersky Total Security for Business adds the power of Kaspersky Collaboration Server protection - and our popular mail and web gateway security products. This is the perfect solution for organizations with broad security requirements who demand the best protection for each network area. CORE
22
In detail Total Advanced Select Core Collaboration Mail
Internet Gateway Advanced Licence Management Network Admission (NAC) Software Installation System Provisioning Patch Management Vulnerability Scan Data Encryption Select Mobile Endpoint Security Mobile Device Management (MDM) Kaspersky Security Center File Server Security Application Control Device Control Web Control Core Anti-malware + Firewall So you can see – feature on feature, technology on technology – Kaspersky lab boasts a very comprehensive set of solutions – all working together from the same codebase – to give our customers the world-class protection they need. These features fall across endpoints, management tools and infrastructure protection products. Of course, the Kaspersky Security Network provides the power of cloud-assisted protection to many components of each Tier. We’ve delivered the industry’s first Security Platform, built from the ground up and we’ve made it easy for the administrator to See, Control and Protect their world. Endpoint Management Infrastructure Cloud-enabled via the Kaspersky Security Network (KSN)
23
Plus: additional targeted solutions
Kaspersky Security for... File Servers Systems Management Storage Mail Mobile Virtualization Collaboration Internet Gateways Because everyone’s network is different, Kaspersky offers these “ad-hoc” or “targeted” solutions. These solutions address the security needs of certain network infrastructure areas. For example, if a customer requires only the components of the Select level, but also needs Mail security – a combination can be created by adding the two.
24
Summary: a unique set of benefits
SEE CONTROL PROTECT Deeper protection IT efficiency Unified management REDUCE BUSINESS RISK, WITH MAXIMUM BUSINESS EFFICIENCY – WITH KASPERSKY, NOW YOU CAN With Kaspersky Security for Business, we are delivering the industry's FIRST true Security Platform built from the ground up. We've made it easy for IT administrators within any size of organisation to see, control and protect their world, all from just ONE management console. You get the perfect combination of deep protection, Efficiency AND seamless manageability. AND you can protect your company's data… no matter where it is… without adding to your resource requirements. With an interface that's intuitive, and technology that's easy to use, easy to deploy and easy to manage... you reduce your business risk, and maintain maximum business efficiency. With Kaspersky, Now You Can!
25
Why Kaspersky for your business?
AWARD-WINNING ANTI-MALWARE KASPERSKY INSIDE Over 80 IT, networking security and communications vendors have chosen to embed Kaspersky Lab anti-malware technology inside their own solutions, including Microsoft, IBM, Checkpoint and Juniper. BUILT, NOT BOUGHT We do not acquire technologies and then try to integrate them. Every feature and function is built up from the same, single code base.
26
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.