Kaspersky Endpoint Security for Business Select

Kaspersky
Endpoint Security for Business
SELECT

Protection and control you can trust – for every endpoint

With more of your business operations going digital, you need to protect every server, laptop and mobile device on your network. Select tier combines multi-layered technologies with flexible cloud management and centralized application, web and device controls to protect your sensitive data on every endpoint.

  • Protects against the latest security threats, including fileless threats
  • Reduces your exposure to cyberattacks with endpoint hardening
  • Helps boost productivity and keeps employees safe with cloud-enabled controls
  • Protects servers and endpoints without damaging performance
  • Secures diverse environments – PC, Mac, Linux, iOS & Android
  • Simplifies security management with a unified console

Enter number of desktops and servers from 0 to 0

Performance & multi-layered protection

Security shouldn’t slow you down. That’s why our security has minimal impact on system performance. And if you’re attacked, Automatic Rollback undoes most malicious actions, so users can keep on working.

Agile protection technologies

Delivering world-class security – including post execution Behavior Detection and Machine Learning technologies – to help reduce your attack risk and keep all your endpoints safe and secure, with less need to download frequent updates.

‘Best of both worlds’ management console

In the cloud, on-premises or both? You decide - and we’ll provide unified management via the cloud console or traditional console deployment on-premises, in AWS or Azure cloud environments. Deploy security and policies rapidly and with minimum hassle, using any of our wide range of preconfigured scenarios.

Straightforward migration

Provides straightforward migration from third-party endpoint protection, helping ensure a smooth error-free transition. Our post-deployment quality assurance audit service is on hand to ensure optimum configuration.

THE SMART CHOICE FOR SECURITY
Security tailored to your environment
Security tailored to your environment

Scales easily, providing the freedom to change any pre-defined settings and to choose when to adopt additional functionality. So you get security that adapts to protect you from new threats whether your IT is on-site or outsourced.

Keep tight control of your costs
Keep tight control of your costs

Multiple security technologies, including mobile threat defense, in a single product. One product - and one unified license - is all you need.

Benefit from innovation and integration
Benefit from innovation and integration

With around 900 patents under our belt, we’re one of only six worldwide IT corporations recognized as Derwent Top 100 Global Innovators. All our core technologies are developed in-house – and all delivered through a single agent – for efficient, integrated protection.

Customer satisfaction assured - we do more to protect
Customer satisfaction assured - we do more to protect

Don’t just take our word for it. Over the years, our products have participated in more customer surveys and independent tests – and achieved more first place positions - than any other vendor.

Find the security solution you need

Select the security option that fits your needs – and, when you want to add more functionality, just upgrade to the next tier of protection.

Security for PC, Linux & Mac

Security for PC, Linux & Mac

Security for PC, Linux & Mac

Security for PC, Linux & Mac

Mobile Threat Defense

Mobile Threat Defense

Mobile Threat Defense

Mobile Threat Defense

Security policy adviser

Security policy adviser

Security policy adviser

Security policy adviser

EDR agent

EDR agent

EDR agent

EDR agent

Application Control for PCs

Application Control for PCs

Application Control for PCs

Application Control for PCs

Device and Web Controls

Device and Web Controls

Device and Web Controls

Device and Web Controls

Role-based access control1

Role-based access control1

Role-based access control1

Role-based access control1

Adaptive Anomaly Control

Adaptive Anomaly Control

Adaptive Anomaly Control

Adaptive Anomaly Control

Encryption management

Encryption management

Encryption management

Encryption management

Vulnerability and Patch management

Vulnerability and Patch management

Vulnerability and Patch management

Vulnerability and Patch management

OS & 3rd party software installation

OS & 3rd party software installation

OS & 3rd party software installation

OS & 3rd party software installation

Application Control for servers

Application Control for servers

Application Control for servers

Application Control for servers

Security for web gateways

Security for web gateways

Security for web gateways

Security for web gateways

Security for email servers

Security for email servers

Security for email servers

Security for email servers

Ransomware protection

Ransomware protection

Ransomware protection

Ransomware protection

Cloud-assisted intelligence

Cloud-assisted intelligence

Cloud-assisted intelligence

Cloud-assisted intelligence

Single management console

Single management console

Single management console

Single management console

Integration with SIEM systems1

Integration with SIEM systems1

Integration with SIEM systems1

Integration with SIEM systems1

1Basic Role-based access control and integration with SIEM systems via Syslog will become available with Kaspersky Endpoint Security for Business Select

ADDITIONAL DATASHEETS

Additional Information

ADDING MORE SECURITY AS YOU NEED IT

Vulnerability & Patch Management
Vulnerability & Patch ManagementEnhance security and reduce complexity
  • Minimize IT security risks
  • Automate vulnerability assessment
  • Distribute patches, updates & applications
Kaspersky Security for Mail Server
Kaspersky Security for Mail ServerFor Microsoft Exchange and Linux mail
  • Scans incoming, outgoing & stored mail
  • Intelligent spam filtering reduces traffic
  • Prevents the loss of confidential data
Kaspersky Security for Storage
Kaspersky Security for StorageSecurity for Network Attached Storage (NAS)
  • Unified, fault-tolerant architecture
  • Minimal impact on NAS performance
  • Highly scalable storage security
Security for Internet Gateway
Security for Internet GatewaySecure internet access for your employees
  • Scans HTTP(s), FTP, SMTP & POP3
  • Governs internet usage
  • Protects multiple infrastructures through a multi-tenancy architecture
Kaspersky Managed Detection and Response
Kaspersky Managed Detection and ResponseManaged protection against evasive threats
  • Detects and responds to evasive threats
  • Real-time situational awareness and control
  • Fast, scalable turnkey deployment

System Requirements

For the most complete, up-to-date requirements, please refer to Kaspersky Knowledge Base.

Version requirements for subscription

Kaspersky Endpoint Security for Business can also be purchased on subscription – with flexible, monthly licensing. Please check with your local partner about subscription availability in your country – and see the relevant system requirements here.

  • General requirements
    • 2 GB of free disk space on the hard drive
    • Intel Pentium 1 GHz processor (that supports the SSE2 instruction set or compatible equivalent)
    • RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS)

    Operating systems
    • Microsoft Windows 10
    • Microsoft Windows 8.1
    • Microsoft Windows 8
    • Microsoft Windows 7 SP1 or later
    • Microsoft Windows XP SP3 or later