Skip to main content

Kaspersky
Endpoint Security for Business
ADVANCED

Adaptive security like no other

Your business holds sensitive data that must be kept safe, which is why we do more than just protect every endpoint. Automated EDR detects advanced threats, while server hardening enhances high-performance protection with additional application, web and device controls, to prevent the theft of corporate and financial information.

  • Detects and patches vulnerabilities to reduce attack entry-points
  • Saves time by automating OS and software deployment tasks
  • Streamlines centralised security management with a web or cloud console
  • Encrypts data to prevent damage from data leakage on a lost device

This tier includes all the functionality delivered by Kaspersky Endpoint Security for Business Select, plus additional advanced technologies that do even more to protect your business.

Enter number of desktops and servers from 0 to 0

Protect more devices

Adaptive security for everyone

Identifies vulnerabilities and applies the latest patches to close attack entry-points, as well as letting you control which applications are allowed to run on your servers. Complemented by enterprise-grade web and device controls and a centralized security management console.

Automated EDR against attacks

Endpoint detection and response capabilities that identify abnormal behaviour, automatically detecting and remediating targeted ransomware and in particular fileless threats which try to mimic common behaviour like PowerShell script execution.

Extra protection for servers and data

Our Linux and Windows Server security has been developed specifically for high-performance servers. Encryption functions – plus OS-embedded firewall and encryption management – guard corporate and customer information to help you achieve key compliance goals, including GDPR.

Simplified systems management

Automates software tasks including the creation, storage and cloning of system images – saving you time whenever you need to roll out new systems or update software on existing systems.

Openness… no other vendor can match

We’re pioneers in providing the highest levels of transparency and data sovereignty, as well as neutrality. We process core data in geopolitically neutral Switzerland, where our partners can review our source code.

THE SMART CHOICE FOR SECURITY
Get endpoint security that adapts to new threats

We are recognized for innovation – and have identified more advanced threats than any other vendor. Whether your IT is on-site or outsourced, our security adapts to protect you from new threats.

Tightly control your costs and TCO

Because we include multiple security technologies – including Adaptive Anomaly Control – you only need buy one EPP product. And you don’t need a dedicated IT security team to use it.

Combine performance & trusted protection

Security shouldn’t slow you down. The  unique cloud mode for endpoint components and global threat intelligence delivers powerful defenses with minimal impact on PC resources.

Tests & reviews help us deliver better security

Don’t just take our word for it – over the years, our products have participated in more customer surveys and independent tests – and have achieved more first places - than any other vendor. See our awards.

Just turn it on - flexible centralized management for admin teams and MSPs

Our role-based model helps you divide responsibilities across teams. The management console can be configured to ensure that each administrator can only access the tools and data they need.

Save time on administration

A new enterprise-grade SaaS console means your team stays focused on important tasks like event processing, rather than being distracted by on-premises maintenance tasks.

TIER COMPARISON

Choose the best option for your business. Want to add more functionality? Just upgrade to the next tier.

Defense for PC, Linux, Mac, Android, iOS

Defense for PC, Linux, Mac, Android, iOS

Defense for PC, Linux, Mac, Android, iOS

Defense for PC, Linux, Mac, Android, iOS

Defense for application and terminal servers

Defense for application and terminal servers

Defense for application and terminal servers

Defense for application and terminal servers

Defense for web gateways and email servers

Defense for web gateways and email servers

Defense for web gateways and email servers

Defense for web gateways and email servers

Mobile Threat Defense

Mobile Threat Defense

Mobile Threat Defense

Mobile Threat Defense

Application, Web & Device Controls for PCs

Application, Web & Device Controls for PCs

Application, Web & Device Controls for PCs

Application, Web & Device Controls for PCs

Behavior Detection, Remediation Engine

Behavior Detection, Remediation Engine

Behavior Detection, Remediation Engine

Behavior Detection, Remediation Engine

Vulnerability Assessment & Exploit Prevention

Vulnerability Assessment & Exploit Prevention

Vulnerability Assessment & Exploit Prevention

Vulnerability Assessment & Exploit Prevention

Environment variable permissions and HIPS

Environment variable permissions and HIPS

Environment variable permissions and HIPS

Environment variable permissions and HIPS

AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration

AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration

AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration

AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration

Kaspersky Sandbox and Kaspersky EDR Optimum integration

Kaspersky Sandbox and Kaspersky EDR Optimum integration

Kaspersky Sandbox and Kaspersky EDR Optimum integration

Kaspersky Sandbox and Kaspersky EDR Optimum integration

Web, Email threat protections and controls for servers

Web, Email threat protections and controls for servers

Web, Email threat protections and controls for servers

Web, Email threat protections and controls for servers

Adaptive Anomaly Control and Patch Management

Adaptive Anomaly Control and Patch Management

Adaptive Anomaly Control and Patch Management

Adaptive Anomaly Control and Patch Management

Encryption and OS-built-in encryption management

Encryption and OS-built-in encryption management

Encryption and OS-built-in encryption management

Encryption and OS-built-in encryption management

Advanced SIEM integration, OS & third-party software installation

Advanced SIEM integration, OS & third-party software installation

Advanced SIEM integration, OS & third-party software installation

Advanced SIEM integration, OS & third-party software installation

ADDITIONAL DATASHEETS

ADDITIONAL INFORMATION

ADDING MORE SECURITY AS YOU NEED IT

Kaspersky Security for Mail ServerFor Microsoft Exchange / Exchange Online and Linux email
  • Scans incoming, outgoing & stored mail
  • Intelligent spam filtering reduces traffic
  • Prevents the loss of confidential data
Kaspersky Security for Internet GatewaySecure internet access for your employees
  • Scans HTTP(s), FTP, SMTP & POP3 traffic
  • Regulates internet usage
  • Protects multiple infrastructures through a multi-tenancy architecture
Kaspersky SandboxAutomatic protection against targeted threats
  • Complements Endpoint Security for Business
  • Patented proprietary technology
  • Does not require expensive security experts
Kaspersky Managed Detection and ResponseManaged protection against evasive threats
  • Detects and responds to evasive threats
  • Real-time situational awareness and control
  • Fast, scalable turnkey deployment

System Requirements