KasperskyEndpoint Security for BusinessADVANCED
Adaptive security like no other
Your business holds sensitive data that must be kept safe, which is why we do more than just protect every endpoint. Adaptive Security detects advanced threats, while server hardening enhances high-performance protection with additional application, web and device controls, to prevent the theft of corporate and financial information.
- Detects and patches vulnerabilities to reduce attack entry-points
- Saves time by automating OS and software deployment tasks
- Streamlines centralized security management with a cloud or web console
- Encrypts data to prevent damage from data leakage on a lost device
This tier includes all the functionality delivered by Kaspersky Endpoint Security for Business Select, plus additional advanced technologies that do even more to protect your business.
Enter number of desktops and servers from 0 to 0
Advanced endpoint controls
Identifies vulnerabilities and applies the latest patches to close attack entry-points, as well as letting you control which applications are allowed to run on your servers. Complemented by enterprise-grade web and device controls and a centralized security management console.
Adaptive security for everyone
Endpoint detection and response capabilities that identify abnormal behavior, automatically detecting and remediating targeted ransomware and in particular fileless threats which try to mimic common behavior like PowerShell script execution.
Extra protection for servers and data
Our Linux and Windows Server security has been developed specifically for application and terminal servers. Encryption functions – plus OS-embedded firewall and encryption management – guard corporate and customer information to help you achieve key compliance goals, including GDPR.
Simplified systems management
Automates software tasks including the creation, storage and cloning of system images – saving you time whenever you need to roll out new systems or update software on existing systems.
Openness… no other vendor can match
We’re pioneers in providing the highest levels of transparency and data sovereignty, as well as neutrality. We process core data in geopolitically neutral Switzerland, where our partners can review our source code.
We are recognized for innovation – and have identified more advanced threats than any other vendor. Whether your IT is on-site or outsourced, our security adapts to protect you from new threats.
Because we include multiple security technologies – including Adaptive Anomaly Control – you only need buy one EPP product. And you don’t need a dedicated IT security team to use it.
Security shouldn’t slow you down. The unique cloud mode for endpoint components and global threat intelligence delivers powerful defenses with minimal impact on PC resources.
Don’t just take our word for it – over the years, our products have participated in more customer surveys and independent tests – and have achieved more first places - than any other vendor. See our awards.
Our role-based model helps you divide responsibilities across teams. The management console can be configured to ensure that each administrator can only access the tools and data they need.
A new enterprise-grade SaaS console means your team stays focused on important tasks like event processing, rather than being distracted by on-premises maintenance tasks.
TIER COMPARISON
Choose the best option for your business. Want to add more functionality? Just upgrade to the next tier.
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for application and terminal servers
Defense for application and terminal servers
Defense for application and terminal servers
Defense for application and terminal servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Behavior Detection, Remediation Engine
Behavior Detection, Remediation Engine
Behavior Detection, Remediation Engine
Behavior Detection, Remediation Engine
Vulnerability Assessment & Exploit Prevention
Vulnerability Assessment & Exploit Prevention
Vulnerability Assessment & Exploit Prevention
Vulnerability Assessment & Exploit Prevention
Environment variable permissions and HIPS
Environment variable permissions and HIPS
Environment variable permissions and HIPS
Environment variable permissions and HIPS
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Advanced SIEM integration, OS & third-party software installation
Advanced SIEM integration, OS & third-party software installation
Advanced SIEM integration, OS & third-party software installation
Advanced SIEM integration, OS & third-party software installation
Inbound and outbound content filtering
Inbound and outbound content filtering
Inbound and outbound content filtering
Inbound and outbound content filtering
Anti-spam protection at gateway level
Anti-spam protection at gateway level
Anti-spam protection at gateway level
Anti-spam protection at gateway level
Web traffic security and web controls at gateway level
Web traffic security and web controls at gateway level
Web traffic security and web controls at gateway level
Web traffic security and web controls at gateway level
ADDITIONAL DATASHEETS
ADDITIONAL INFORMATION
ADDING MORE SECURITY AS YOU NEED IT
- Scans incoming, outgoing & stored mail
- Intelligent spam filtering reduces traffic
- Prevents the loss of confidential data
- Scans HTTP(s), FTP, SMTP & POP3 traffic
- Regulates internet usage
- Protects multiple infrastructures through a multi-tenancy architecture
- Complements Endpoint Security for Business
- Patented proprietary technology
- Does not require expensive security experts
- Detects and responds to evasive threats
- Real-time situational awareness and control
- Fast, scalable turnkey deployment
Applications Inside
System Requirements
For the most complete, up-to-date requirements, please refer to Kaspersky Knowledge Base.
Version requirements for subscription
Kaspersky Endpoint Security for Business can also be purchased on subscription – with flexible, monthly licensing. Please check with your local partner about subscription availability in your country – and see the relevant system requirements here.
General requirements
- CPU: 1 GHz processor for workstations (1.4 GHz for servers) that support the SSE2 instruction set
- RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS or server)
- Hard drive space: minimum 2 GB of free space
Operating Systems
- Windows 11
- Windows 10 all versions
- Windows 8.1
- Windows 8
- Windows 7 all versions, Service Pack 1 or later
- Windows Server 2022
- Windows Server 2019 Essentials / Standard / Datacenter
- Windows Server 2016 Essentials / Standard / Datacenter
- Windows Server 2012 R2 Foundation / Essentials / Standard / Datacenter
- Windows Server 2012 Foundation / Essentials / Standard / Datacenter
- Windows Server 2008 R2 all versions, Service Pack 1 or later
- Windows MultiPoint Server 2011 or later
- Small Business Server 2011 Essentials / Standard
Virtual platforms
- VMWare Workstation 16.1.1 Pro
- VMWare ESXi 7.0U2a
- Microsoft Hyper-V 2019
- Citrix Virtual Apps and Desktops 7 2103
- Citrix Provisioning 2012
- Citrix Hypervisor 8.2 LTSR
Not sure which Security Product is right for your business?