Free Hotline 01800 81 64 51
 
Kaspersky Total Security for Business

Kaspersky Total Security for Business

€98.14 *

Prices incl. VAT Free shipping

  • 241821621
  • KL4869XAKFS
  • 1 year
  • Multilingual
  • Worldwide

Licence Type:

Year(s):

User(s):

[Backup] Data carrier to your software
1 Year Renewal for Kaspersky Endpoint Security for Business Advanced Download License Tier,... more

Product information "Kaspersky Total Security for Business"

1 Year Renewal for Kaspersky Endpoint Security for Business Advanced Download License Tier, Multilingual

Reliable security for all your endpoints, including laptops, desktops, file servers and mobile devices

Protection for desktops and laptops on Windows, Linux and Mac*
Multi-layered security


Our latest anti-malware engine combines signature-based security, heuristic and behavioral analysis, and cloud-based techniques to protect your business from known, unknown, and advanced threats. The engine protects all combinations of Mac, Linux, and Windows desktops and laptops.

More efficient security updates


Because cybercriminals are constantly introducing new and more complex malware, we deploy our database updates much more frequently than many other security vendors. We also use advanced security technologies that ensure significantly improved detection rates while reducing the size of update files, leaving more of your network bandwidth for other tasks.

Protection against unknown and advanced threats
When a new malware item is introduced into circulation, the risk is initially particularly high. To ensure complete protection against new threats, Kaspersky Lab's technologies and threat analysis are constantly evolving. This ensures that your organization is protected against even the most sophisticated new threats.

Detect suspicious behavior


Whenever a program is launched within your corporate network, our Activity Monitor takes over the monitoring of the program's behavior. If a suspicious behavior pattern is detected, the program is automatically blocked by the activity monitor. Since the activity monitor also keeps a dynamic log of activity in the operating system, registry, etc., it can automatically reset malicious actions that the malware had performed before it was blocked.

Exploit protection


Kaspersky Lab's Automatic Exploit Prevention (AEP) technology ensures that vulnerabilities in your operating system or other applications you use cannot be exploited by malware. AEP specifically monitors the most frequently attacked applications, such as Microsoft Office, Internet Explorer, Adobe Reader, Java, etc., to provide additional protection against and monitoring for unknown threats.

Control over programs and connections


Although some programs are not directly classified as malicious, they are considered high risk. It is often advisable to restrict the activities of such applications. Our Host-Based Intrusion Prevention System (HIPS) restricts activity on the endpoint based on the trust level assigned to a program. HIPS works in conjunction with our personal firewall, which restricts network activity.

Block attacks on the network


The Network Attack Blocker detects and monitors suspicious activity on your corporate network and allows you to determine how your system responds to suspicious behavior.

The power of the cloud - for even more security


Millions of Kaspersky users have chosen to let the cloud-based Kaspersky Security Network (KSN) collect data about malware and suspicious behavior on their computers. Your business can also benefit from improved protection against the latest malware. This real-time data stream allows us to respond extremely quickly to new malware while reducing the number of false positives.

*Some features are not supported on certain platforms.

Protection for your file servers


Security in heterogeneous environments
Our award-winning security technologies protect file servers running Windows, Linux or FreeBSD. Optimized scanning ensures minimal impact on system performance for your servers. In addition to cluster servers, we also protect Citrix and Microsoft terminal servers

Reliable protection


In the event of a failure on one of your file servers, our security technologies will automatically restart when the file server comes back up.

Significantly improved management


Every minute spent on administration and reporting is time that could be better spent on more strategic activities. That's why we work with a single console that lets you manage security on all your endpoints-file servers, workstations, and mobile devices-and easily generate detailed reports.

Mobile device protection*
Solid protection for mobile devices


By combining industry-leading technologies, we deliver effective protection against the latest mobile threats. Our phishing protection keeps you safe from fraudulent websites that target your data and personal information. Spam protection keeps you safe from unwanted calls and text messages. Flexible control tools prevent unauthorized programs from launching and dangerous websites from being accessed. Rooting and jailbreaking attempts are automatically detected and the affected devices are blocked.

Separation of corporate and personal data


Special technologies allow you to create application containers on each of your devices. The containers store enterprise applications - completely isolated from users' personal data. You can enforce encryption of all data within the container and prevent it from being copied and moved to directories outside the container. You can also require additional user authentication before launching a program from the container. If one of your employees leaves the company, you can use the selective delete function to delete the company container remotely without losing the personal data and settings of the device owner.

Support for widely used MDM platforms


Enhanced Mobile Device Management (MDM) capabilities make it easy to apply group or individual MDM policies to Microsoft Exchange ActiveSync and iOS MDM devices - all from a single console. Support for Samsung KNOX lets you manage multiple settings for Samsung devices.

Lock, wipe and locate missing devices


Remotely enabled security features protect business data on lost devices. Administrators and users can lock the device, delete business data, and track the device's location. If a thief replaces the SIM card, the SIM control feature communicates the new phone number to you so you can still use the anti-theft features. Google Cloud Messaging (GCM) support ensures that Android devices receive the anti-theft commands immediately.

Self-service portal


Our dedicated self-service portal simplifies the activation of personal mobile devices on the corporate network. In addition, this portal gives users access to key anti-theft features to quickly respond to device loss, minimizing the risk of data loss without placing an additional burden on administrators.

Reduced burden on IT administrators


Use a single, centralized console to manage your mobile devices and their security, with consistent policies across different mobile platforms. And our web console lets you manage mobile devices and their security, as well as the security of other endpoints, wherever you have Internet access.

*Not all features are available on some supported mobile device platforms.
 

Control over programs, devices and Internet usage
Dynamic Whitelisting - for added security


Our program control is among the most comprehensive in the industry. We are the only security vendor to maintain our own whitelisting lab, where programs are screened for security risks. Our safe program database contains over 1.3 billion individual files and grows by another million files every day. With program control and dynamic whitelisting, you can easily implement a default-deny approach, where all programs are blocked unless they are on your whitelist. With our new test mode, you can also try out your default deny policy in a test environment first. This allows you to test the configuration of the policy before applying it to your organization.
 

Prevent access by unauthorized devices


Device control tools make it easy to determine which devices have access to your network. You can control access based on time, geographic location, or device type. You can also combine controls with Active Directory for efficient, fine-grained management and policy assignment. Administrators can also use masks to create device control rules, making it easy to whitelist devices.
 

Monitor and Control Internet Access


Our web control tools allow you to set Internet access policies and monitor Internet usage. Activities of your users on individual websites or categories of sites, such as social networking or gaming and gambling websites, can be easily prohibited, restricted, allowed or monitored. Control capabilities based on location and time of day can be combined with Active Directory information to facilitate management and policy configuration.
 

Centralize management operations


Centralized control of all functions from one console
Kaspersky Endpoint Security for Business | Select includes Kaspersky Security Center - a single, unified management console that gives you visibility and control over file server security and other Kaspersky Lab endpoint security solutions running on your network. With Kaspersky Security Center, you manage security for mobile devices, laptops, desktops, file servers, virtual machines, and more - all from the convenience of one central management console.
 


A higher level of integration


Because tightly integrated code leads to better security, performance, and manageability, all of our endpoint technologies have been developed in-house by our own teams. All of our endpoint security features share a common code base, eliminating compatibility issues from the start. So you benefit from seamlessly integrated security technologies that provide superior protection for your IT environment, and save time thanks to centralized management.

Technical details:

License
Software type
Renewal
License type
Base license
Number of user licenses
20 - 24
Period
1 year(s)
System requirement
Min. required hard disk space
1000 MB
Min. required RAM
512 MB
Supported Windows operating systems
Yes
Supported Mac operating systems
Yes
Minimum Processor
Intel Pentium
Minimum processor speed required
1000 MHz
Supported Linux operating systems
Yes
Minimum system requirements
IE 7.0+
FireFox 3.5.x+
NET Framework 2.0
Other specifications
Compatible operating systems
Windows 8 Professional (x32/64)
Windows 8 Enterprise (x32/64)
Windows 7 Professional (x32/64)
Windows 7 Enterprise (x32/64)
Windows 7 Ultimate (x32/64)
Windows Vista Business SP2 (x32/64)
Windows Vista Enterprise SP2 (x32/64)
Windows Vista Ultimate SP2 (x32/64)
Windows XP Professional SP3+
Windows SBS 2011 Essentials (64)
Windows SBS 2011 Standard (64)
Windows SBS 2011 Premium (64)
Windows MultiPoint Server 2011 (64)
Windows Server 2012 Foundation (64)
Windows Server 2012 Essentials(64)
Windows Server 2012 Standard (64)
Windows Server 2008 R2 Hyper-V
Windows Server 2008 R2 Standard (64)
Windows Server 2008 R2 Enterprise (64)
Windows Server 2008 R2 Foundation (64)
Windows Server 2008 R2 Datacenter (32/64)
Windows Server 2008 Standard SP2 (32/64)
Windows Server 2008 Enterprise SP2 (32/64)
Windows Server 2008 Datacenter (32/64)
Windows Server 2003 R2 Standard SP2 (32/64)
Windows Server 2003 R2 Enterprise SP2 (32/64)
Windows Server 2003 Standard SP2 (32/64)
Windows Server 2003 Enterprise SP2 (32/64)
Mac OS X 10.8 (x32/64)
Mac OS X 10.7 (x32/64)
Mac OS X 10.6 (x32/64)
Mac OS X 10.5 (x32)
Mac OS X 10.4 (x32)
Mac OS X Server 10.6 (x32/64)
Mac OS X Server 10.7 (x32/64)
Mandriva Linux 2010
Mandriva Enterprise Server 5.2
Red Hat Enterprise Linux 5.5 Desktop
Red Hat Enterprise Linux 5.5 Server
Red Hat Enterprise Linux 6 Server
SUSE Linux Enterprise Desktop 10 SP3
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Server 11 SP1
Novell Open Enterprise Server 2 SP3
openSUSE Linux 11.3
Ubuntu 10.04 LTS Desktop
Ubuntu 10.04.2 LTS Server
Debian GNU/Linux 5.0.5, 6.0.1
FreeBSD 7.4, 8.2
Fedora 13, 14
CentOS-5.5
Novell NetWare 5.x, 6.0, 6.5
Symbian OS 9.1, 9.2, 9.3, 9.4 s60 UI
Symbian^3
Symbian Belle
Windows Mobile 5.0, 6.0, 6.1, 6.5
BlackBerry 4.5, 4.6, 4.7, 5.0, 6.0
Android 1.6, 2.0, 2.1, 2.2, 2.3, 4.0
Features: "Kaspersky Total Security for Business"
Operating system:
Linux
macOS
macOS Big Sur
macOS Catalina
macOS Mojave
macOS Monterey
macOS Sonoma
macOS Ventura
Windows
Windows 7
Windows 8
Windows 8.1
Windows 10
Windows 11
Windows Server 2008
Windows Server 2012
Windows Server 2016
Windows Server 2019
Windows Server 2022
Included Applications:
Firewall
Server Protection
Virus Protection
System requirements for Windows
General requirements CPU: 1 GHz processor for workstations (1.4 GHz for servers) that supports SSE2 instruction set RAM: 1 GB for a 32-bit operating system (2 GB for a 64-bit operating system or server) Hard disk space: at least 2 GB free space Operating systems Windows 11 Windows 10, all versions Windows 8.1 Windows 8 Windows 7, all versions, Service Pack 1 or higher Windows Server 2022 Windows Server 2019 Essentials/Standard/Datacenter Windows Server 2016 Essentials/Standard/Datacenter Windows Server 2012 R2 Foundation/Essentials/Standard/Datacenter Windows Server 2012 Foundation/Essentials/Standard/Datacenter Windows Server 2008 R2, all versions, Service Pack 1 or higher Windows MultiPoint Server 2011 or higher Small Business Server 2011 Essentials/Standard Virtual Platforms VMWare Workstation 16.1.1 Pro VMWare ESXi 7.0U2a Microsoft Hyper-V 2019 Citrix Virtual Apps and Desktops 7 2103 Citrix Provisioning 2012 Citrix Hypervisor 8.2 LTSR
System requirements for Windows Server
General requirements CPU: 2.4 GHz quad core RAM: 2 GB Hard disk space: at least 4 GB free space Operating systems Windows Server 2022 Windows 10 Enterprise with multiple sessions Windows Server 2019, all versions Windows Server 2016, all versions Windows Server 2012 all versions Windows Server 2008 all versions, Service Pack 2 or later Windows Server 2003, all versions, Service Pack 2 or later Windows Storage Server 2012 or higher Hyper-V Server 2012 or higher Windows MultiPoint Server 2011 or higher Small Business Server 2008 or higher
System requirements for Linux
General Requirements CPU: Intel Core 2 Duo processor running at 1.86 GHz or higher RAM: 1 GB for a 32-bit operating system (2 GB for a 64-bit operating system) Hard disk space: at least 4 GB free space Swap partition with at least 1 GB capacity Operating systems CentOS 6.7 or higher, x86 / x64 Debian GNU / Linux 9.4 or higher, x86 / x64 Red Hat® Enterprise Linux® 6.7 , x86 Red Hat® Enterprise Linux® 7.2 or later, x64 Linux Mint 19, x86 Linux Mint 20.1 and higher, x64 ALT Education/Workstation/Server 9, x86/x64 AlterOS 7.5 and later, x64 Amazon Linux 2, x64 Astra Linux Common Edition (operating update 2.12), x64 Astra Linux Special Edition RUSB.10015-01 (operating update 1.5 and 1.6), x64 Astra Linux Special Edition RUSB.10015-16 (version 1) (operating update 1.6), x64 EulerOS V2.0SP2 2.2.17, x64 EulerOS V2.0SP5 2.5.6, x64 openSUSE Leap 15.0 and higher, x64 Oracle Linux 7.3 and higher, x64 Oracle Linux 8.0 and higher, x64 Pardus OS 19.1, x64 SUSE Linux Enterprise Server 12 SP5 and higher, x64 SUSE Linux Enterprise Server 15 and higher, x64 Ubuntu 18.04 LTS and higher, x64 Ubuntu 20.04 LTS, x64 GosLinux 7.2, x64 Mageia 4, x86 Red OS 7.3, x64
System requirements for Mac
General requirements CPU: Intel®, Apple® silicon RAM: 4 GB Hard disk space: at least 5 GB free space Operating systems macOS 10.14 or higher Virtualization Parallels Desktop 16 for Mac Business Edition VMware Fusion 11.5 Professional or higher
System requirements for Mobile Security
General requirements Screen resolution 320 x 480 pixels or more 65 MB free hard disk space on the device Operating systems Android 5.0-12.0 (except Go Edition) iOS 10.0-15.0 or iPadOS 13-15 Supports integration with EMM systems VMware AirWatch 9.3 or higher MobileIron 10.0 or higher IBM Maas360 10.68 or higher Microsoft Intune 1908 or higher SOTI MobiControl 14.1.4 (1693) or higher
How and when do I get my purchased product?
Digital products, product keys and access to the download centre will be made available to you by e-mail immediately after your purchase.
What payment options are available to me?
PayPal, Amazon Pay, Instant bank transfer, Credit card, Apple Pay, Prepayment, Purchase on invoice
What guarantees do I have at Blitzhandel24?
Blitzhandel24 is an EHI, TrustedShops and CHIP certified online brand shop. Blitzhandel24 also offers its customers permanent support, as well as support for the purchased product. If a product has not been used / redeemed, our customers can benefit from the money-back guarantee.
Features: "Kaspersky Total Security for Business"
Operating system:
Linux
macOS
macOS Big Sur
macOS Catalina
macOS Mojave
macOS Monterey
macOS Sonoma
macOS Ventura
Windows
Windows 7
Windows 8
Windows 8.1
Windows 10
Windows 11
Windows Server 2008
Windows Server 2012
Windows Server 2016
Windows Server 2019
Windows Server 2022
Included Applications:
Firewall
Server Protection
Virus Protection
Pricing Policy more



What Factors Influence Our Pricing?

Our pricing is based on a variety of factors that encompass a combination of proven strategies in the software trade:

  • Procurement Strategies
    Through bulk purchasing, our 14 years of market experience on the international stage, and expertise in software trading, we achieve cost savings and efficient procurement methods.
  • Elimination of Delivery and Storage Fees
    Efficient digital inventory management minimizes storage and logistics costs.
  • Supplier Relationship Management
    Direct imports and long-standing relationships with manufacturers and distributors allow us to forgo intermediary fees and provide exclusive special conditions.
  • Regional Pricing
    We adjust our prices according to region and currency to consider global market conditions.
  • Automation
    The use of modern technologies enables efficient management of orders and customer inquiries, reducing costs.
  • Cost Management in Marketing
    The main advertising strategy focuses on customer satisfaction and relies primarily on recommendations.
  • Low Profit Margin
    Our main focus at Blitzhandel24 is customer satisfaction and expanding our customer base, allowing us to maintain a slim profit margin.

 

Security and Quality: Our Promise to You

Quality Comes First

Despite our price competitiveness, the quality of our products remains at the highest level.

We guarantee our customers top-quality at the best price. All products at Blitzhandel24 are tested and verified.
Safety and Trust

Your safety is important to us. Therefore, we offer you protection of up to €20,000 through Trusted Shops.

Our online shop is legally protected by the EHI seal, allowing you to shop with confidence.

 

If you have any further questions or concerns, please do not hesitate to contact us. We are here to help you!



Read, write and discuss reviews... more
Customer reviews for "Kaspersky Total Security for Business"
Write rating
Reviews will be activated after verification.
Please enter the string in the text box below.

The fields marked with * are required.

Last viewed