With more of your business operations going digital, you need to protect every server, laptop and mobile device on your network. Select tier combines multi-layered technologies with flexible cloud management and centralized application, web and device controls to protect your sensitive data on every endpoint.
Security shouldn’t slow you down. That’s why our security has minimal impact on system performance. And if you’re attacked, Automatic Rollback undoes most malicious actions, so users can keep on working.
Delivering world-class security – including post execution Behavior Detection and Machine Learning technologies – to help reduce your attack risk and keep all your endpoints safe and secure, with less need to download frequent updates.
In the cloud, on-premises or both? You decide - and we’ll provide unified management via the cloud console or traditional console deployment on-premises, in AWS or Azure cloud environments. Deploy security and policies rapidly and with minimum hassle, using any of our wide range of preconfigured scenarios.
Provides straightforward migration from third-party endpoint protection, helping ensure a smooth error-free transition. Our post-deployment quality assurance audit service is on hand to ensure optimum configuration.
Scales easily, providing the freedom to change any pre-defined settings and to choose when to adopt additional functionality. So you get security that adapts to protect you from new threats whether your IT is on-site or outsourced.
Multiple security technologies, including mobile threat defense, in a single product. One product - and one unified license - is all you need.
With around 900 patents under our belt, we’re one of only six worldwide IT corporations recognized as Derwent Top 100 Global Innovators. All our core technologies are developed in-house – and all delivered through a single agent – for efficient, integrated protection.
Don’t just take our word for it. Over the years, our products have participated in more customer surveys and independent tests – and achieved more first place positions - than any other vendor.
Select the security option that fits your needs – and, when you want to add more functionality, just upgrade to the next tier of protection.
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Security policy adviser
Security policy adviser
Security policy adviser
Security policy adviser
EDR agent
EDR agent
EDR agent
EDR agent
Application Control for PCs
Application Control for PCs
Application Control for PCs
Application Control for PCs
Device and Web Controls
Device and Web Controls
Device and Web Controls
Device and Web Controls
Role-based access control1
Role-based access control1
Role-based access control1
Role-based access control1
Adaptive Anomaly Control
Adaptive Anomaly Control
Adaptive Anomaly Control
Adaptive Anomaly Control
Encryption management
Encryption management
Encryption management
Encryption management
Vulnerability and Patch management
Vulnerability and Patch management
Vulnerability and Patch management
Vulnerability and Patch management
OS & 3rd party software installation
OS & 3rd party software installation
OS & 3rd party software installation
OS & 3rd party software installation
Application Control for servers
Application Control for servers
Application Control for servers
Application Control for servers
Security for web gateways
Security for web gateways
Security for web gateways
Security for web gateways
Security for email servers
Security for email servers
Security for email servers
Security for email servers
Ransomware protection
Ransomware protection
Ransomware protection
Ransomware protection
Cloud-assisted intelligence
Cloud-assisted intelligence
Cloud-assisted intelligence
Cloud-assisted intelligence
Single management console
Single management console
Single management console
Single management console
Integration with SIEM systems1
Integration with SIEM systems1
Integration with SIEM systems1
Integration with SIEM systems1
For the most complete, up-to-date requirements, please refer to Kaspersky Knowledge Base.
Kaspersky Endpoint Security for Business can also be purchased on subscription – with flexible, monthly licensing. Please check with your local partner about subscription availability in your country – and see the relevant system requirements here.
Not sure which Security Solution is right for your business?