KasperskyEndpoint Security for BusinessSELECT
Protection and control you can trust – for every endpoint
With more of your business operations going digital, you need to protect every server, laptop and mobile device on your network. Select tier combines multi-layered technologies with flexible cloud management and centralized application, web and device controls to protect your sensitive data on every endpoint.
- Protects against the latest security threats, including fileless threats
- Reduces your exposure to cyberattacks with endpoint hardening
- Helps boost productivity and keeps employees safe with cloud-enabled controls
- Protects endpoints without impacting on performance
- Secures diverse environments – PC, Mac, Linux, iOS & Android
- Simplifies security management with a unified console
Enter number of desktops and servers from 0 to 0
Performance & multi-layered protection
Security shouldn’t slow you down, so our security has minimal impact on system performance. And if you’re attacked, the Remediation Engine undoes most malicious actions, so users can keep working without interruption.
Agile protection technologies
Delivering world-class security – including post execution Behavior Detection and Machine Learning technologies – to help reduce your attack risk and keep all your endpoints safe and secure, with less need to download frequent updates.
‘Best of both worlds’ management console
In the cloud, on-premises or both? You decide - and we’ll provide unified management via the cloud console or traditional console deployment on-premise, in AWS or Azure cloud environments. Deploy security and policies quickly and easily, using any of our preconfigured scenarios.
Straightforward migration
Provides straightforward migration from third-party endpoint protection, helping to make your transition error-free. Our post-deployment quality assurance audit service will ensure optimum configuration.
Whether your IT is on-site or outsourced, it’s easy to scale, giving you the freedom to change any pre-defined settings and decide when to adopt additional functionality.
Multiple endpoint protection technologies, including malware outbreak policy, vulnerability assessment and mobile threat defense, in a single product. One product - and one license - is all you need to protect user devices.
With 900 patents under our belt, we’re one of only six IT corporations recognized as Derwent Top 100 Global Innovators. All our core technologies are developed in-house – for efficient, integrated protection.
Don’t just take our word for it – our products have participated in more customer surveys and independent tests and achieved more first places than any other vendor.
TIER COMPARISON
Choose the best option for your business. Want to add more functionality? Just upgrade to the next tier.
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for application and terminal servers
Defense for application and terminal servers
Defense for application and terminal servers
Defense for application and terminal servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Behavior Detection, Remediation Engine
Behavior Detection, Remediation Engine
Behavior Detection, Remediation Engine
Behavior Detection, Remediation Engine
Vulnerability Assessment & Exploit Prevention
Vulnerability Assessment & Exploit Prevention
Vulnerability Assessment & Exploit Prevention
Vulnerability Assessment & Exploit Prevention
Environment variable permissions and HIPS
Environment variable permissions and HIPS
Environment variable permissions and HIPS
Environment variable permissions and HIPS
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Advanced SIEM integration, OS & third-party software installation
Advanced SIEM integration, OS & third-party software installation
Advanced SIEM integration, OS & third-party software installation
Advanced SIEM integration, OS & third-party software installation
Inbound and outbound content filtering
Inbound and outbound content filtering
Inbound and outbound content filtering
Inbound and outbound content filtering
Anti-spam protection at gateway level
Anti-spam protection at gateway level
Anti-spam protection at gateway level
Anti-spam protection at gateway level
Web traffic security and web controls at gateway level
Web traffic security and web controls at gateway level
Web traffic security and web controls at gateway level
Web traffic security and web controls at gateway level
Additional Information
ADDING MORE SECURITY AS YOU NEED IT
- Minimize IT security risks
- Automate vulnerability assessment
- Distribute patches, updates & applications
- Scans incoming, outgoing & stored mail
- Intelligent spam filtering reduces traffic
- Prevents the loss of confidential data
- Scans HTTP(s), FTP, SMTP & POP3 traffic
- Regulates internet usage
- Protects multiple infrastructures through a multi-tenancy architecture
- Detects and responds to evasive threats
- Real-time situational awareness and control
- Fast, scalable turnkey deployment
Applications Inside
System Requirements
For the most complete, up-to-date requirements, please refer to Kaspersky Knowledge Base.
Version requirements for subscription
Kaspersky Endpoint Security for Business can also be purchased on subscription – with flexible, monthly licensing. Please check with your local partner about subscription availability in your country – and see the relevant system requirements here.
General requirements
- CPU: 1 GHz processor for workstations (1.4 GHz for servers) that support the SSE2 instruction set
- RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS or server)
- Hard drive space: minimum 2 GB of free space
Operating Systems
- Windows 11
- Windows 10 all versions
- Windows 8.1
- Windows 8
- Windows 7 all versions, Service Pack 1 or later
- Windows Server 2022
- Windows Server 2019 Essentials / Standard / Datacenter
- Windows Server 2016 Essentials / Standard / Datacenter
- Windows Server 2012 R2 Foundation / Essentials / Standard / Datacenter
- Windows Server 2012 Foundation / Essentials / Standard / Datacenter
- Windows Server 2008 R2 all versions, Service Pack 1 or later
- Windows MultiPoint Server 2011 or later
- Small Business Server 2011 Essentials / Standard
Virtual platforms
- VMWare Workstation 16.1.1 Pro
- VMWare ESXi 7.0U2a
- Microsoft Hyper-V 2019
- Citrix Virtual Apps and Desktops 7 2103
- Citrix Provisioning 2012
- Citrix Hypervisor 8.2 LTSR
Not sure which Security Solution is right for your business?