The best security makes life easier, not harder, for overworked IT departments. If your business is growing fast, or is in the throes of digital transformation, the chances are that resources are continuously overstretched.
Choose an endpoint product that delivers instant protection and is ready to scale when you need it.
All-in-one, easy to use security for businesses with IT generalists who take care of a range of IT-related tasks, including security.
This product is currently unavailable in your region. Please contact us for further details.
This product is currently unavailable in your region. Please contact us for further details.
The best enterprise-grade security solution for organizations with mixed infrastructures and an IT department
This product is currently unavailable in your region. Please contact us for further details.
This product is currently unavailable in your region. Please contact us for further details.
Selection сriteria | ||||
The best choice for
| Businesses looking for instant and easy-to-use protection | Organizations with more sophisticated IT security needs | ||
Protection
| The world’s most tested, most awarded security, protecting your business against known and emerging cyber threats | |||
Skills required | General IT skills | Advanced IT skills | ||
What you need | Server to deploy management console | |||
Licensing | Per user 1 user = 1 computer or file server & 2 mobile devices | Per device Every device requires 1 license | ||
Protection and management for workstations
| Windows, Mac | Windows, Mac, Linux | ||
Protection and management for servers | Windows file servers | Windows and Linux servers | ||
Protection and management for mobile devices | iOS, Android mobile devices | |||
Product updates | Always runs the latest software | Freedom to choose when to update, supported by fast-upgrade | ||
Application Control ? Sets policies to allow, block or regulate application (or application category) use | ||||
Web & Device Controls for PCs ? Reduces your exposure to attack and mitigates data leakage by hardening your endpoints | ||||
Security Policy Advisor ? Minimizes costly human error by recommending optimized settings for security policies and highlighting potential risks | Predefined policy | Predefined policy | Wizard-assisted | Wizard-assisted |
Cloud Discovery ? Audit and block user access to unsanctioned cloud resources including data sharing, social networks and messengers. | Audit | Audit & Block | ||
Security for Microsoft Office 365 ? All-in-one threat protection for Microsoft Office 365 communication and collaboration services | ||||
Encryption Management ? Provides management features to control encryption built in to most popular desktop platforms | ||||
Patch Management ? Protects user devices from targeted attacks which exploit unpatched vulnerabilities in the OS and common applications | ||||
Adaptive Anomaly Control ? Lowers your exposure to attack and automatically raises security to the highest level appropriate to different groups and users, with no false-positives | ||||
Server hardening ? Enhances high performance and remote access server protection with traffic security, application and device controls | ||||
OS & 3rd party software installation ? Saves you time and money with built-in systems management and software distribution | ||||
Need more than 150 nodes? Send us a request and we’ll respond promptly to share the latest options with you HOW TO BUY MORE | Kaspersky Endpoint Security Cloud | Kaspersky Endpoint Security Cloud Plus | Kaspersky Endpoint Security for Business Select | Kaspersky Endpoint Security for Business Advanced |
Not sure which security product is right for your business?