Cookie preferences
This website uses cookies, which are necessary for the technical operation of the website and are always set. Other cookies, which increase the usability of this website, serve for direct advertising or simplify interaction with other websites and social networks, will only be used with your consent.
Kaspersky Total Security for Business
€94.95 *
Total price: € *
incl. VAT Free shipping
- Item number: 241821621
- Manufacturer No: KL4869XAKFS
- Runtime: 1 Year
- Language(s): All languages
- Countryzone(s): Worldwide
1 Year Renewal for Kaspersky Endpoint Security for Business Advanced Download License Tier,... more
Product information "Kaspersky Total Security for Business"
1 Year Renewal for Kaspersky Endpoint Security for Business Advanced Download License Tier, Multilingual
Reliable security for all your endpoints, including laptops, desktops, file servers and mobile devicesProtection for desktops and laptops on Windows, Linux and Mac*
Multi-layered security
Our latest anti-malware engine combines signature-based security, heuristic and behavioral analysis, and cloud-based techniques to protect your business from known, unknown, and advanced threats. The engine protects all combinations of Mac, Linux, and Windows desktops and laptops.
More efficient security updates
Because cybercriminals are constantly introducing new and more complex malware, we deploy our database updates much more frequently than many other security vendors. We also use advanced security technologies that ensure significantly improved detection rates while reducing the size of update files, leaving more of your network bandwidth for other tasks.
Protection against unknown and advanced threats
When a new malware item is introduced into circulation, the risk is initially particularly high. To ensure complete protection against new threats, Kaspersky Lab's technologies and threat analysis are constantly evolving. This ensures that your organization is protected against even the most sophisticated new threats.
Detect suspicious behavior
Whenever a program is launched within your corporate network, our Activity Monitor takes over the monitoring of the program's behavior. If a suspicious behavior pattern is detected, the program is automatically blocked by the activity monitor. Since the activity monitor also keeps a dynamic log of activity in the operating system, registry, etc., it can automatically reset malicious actions that the malware had performed before it was blocked.
Exploit protection
Kaspersky Lab's Automatic Exploit Prevention (AEP) technology ensures that vulnerabilities in your operating system or other applications you use cannot be exploited by malware. AEP specifically monitors the most frequently attacked applications, such as Microsoft Office, Internet Explorer, Adobe Reader, Java, etc., to provide additional protection against and monitoring for unknown threats.
Control over programs and connections
Although some programs are not directly classified as malicious, they are considered high risk. It is often advisable to restrict the activities of such applications. Our Host-Based Intrusion Prevention System (HIPS) restricts activity on the endpoint based on the trust level assigned to a program. HIPS works in conjunction with our personal firewall, which restricts network activity.
Block attacks on the network
The Network Attack Blocker detects and monitors suspicious activity on your corporate network and allows you to determine how your system responds to suspicious behavior.
The power of the cloud - for even more security
Millions of Kaspersky users have chosen to let the cloud-based Kaspersky Security Network (KSN) collect data about malware and suspicious behavior on their computers. Your business can also benefit from improved protection against the latest malware. This real-time data stream allows us to respond extremely quickly to new malware while reducing the number of false positives.
*Some features are not supported on certain platforms.
Protection for your file servers
Security in heterogeneous environments
Our award-winning security technologies protect file servers running Windows, Linux or FreeBSD. Optimized scanning ensures minimal impact on system performance for your servers. In addition to cluster servers, we also protect Citrix and Microsoft terminal servers
Reliable protection
In the event of a failure on one of your file servers, our security technologies will automatically restart when the file server comes back up.
Significantly improved management
Every minute spent on administration and reporting is time that could be better spent on more strategic activities. That's why we work with a single console that lets you manage security on all your endpoints-file servers, workstations, and mobile devices-and easily generate detailed reports.
Mobile device protection*
Solid protection for mobile devices
By combining industry-leading technologies, we deliver effective protection against the latest mobile threats. Our phishing protection keeps you safe from fraudulent websites that target your data and personal information. Spam protection keeps you safe from unwanted calls and text messages. Flexible control tools prevent unauthorized programs from launching and dangerous websites from being accessed. Rooting and jailbreaking attempts are automatically detected and the affected devices are blocked.
Separation of corporate and personal data
Special technologies allow you to create application containers on each of your devices. The containers store enterprise applications - completely isolated from users' personal data. You can enforce encryption of all data within the container and prevent it from being copied and moved to directories outside the container. You can also require additional user authentication before launching a program from the container. If one of your employees leaves the company, you can use the selective delete function to delete the company container remotely without losing the personal data and settings of the device owner.
Support for widely used MDM platforms
Enhanced Mobile Device Management (MDM) capabilities make it easy to apply group or individual MDM policies to Microsoft Exchange ActiveSync and iOS MDM devices - all from a single console. Support for Samsung KNOX lets you manage multiple settings for Samsung devices.
Lock, wipe and locate missing devices
Remotely enabled security features protect business data on lost devices. Administrators and users can lock the device, delete business data, and track the device's location. If a thief replaces the SIM card, the SIM control feature communicates the new phone number to you so you can still use the anti-theft features. Google Cloud Messaging (GCM) support ensures that Android devices receive the anti-theft commands immediately.
Self-service portal
Our dedicated self-service portal simplifies the activation of personal mobile devices on the corporate network. In addition, this portal gives users access to key anti-theft features to quickly respond to device loss, minimizing the risk of data loss without placing an additional burden on administrators.
Reduced burden on IT administrators
Use a single, centralized console to manage your mobile devices and their security, with consistent policies across different mobile platforms. And our web console lets you manage mobile devices and their security, as well as the security of other endpoints, wherever you have Internet access.
*Not all features are available on some supported mobile device platforms.
Control over programs, devices and Internet usage
Dynamic Whitelisting - for added security
Our program control is among the most comprehensive in the industry. We are the only security vendor to maintain our own whitelisting lab, where programs are screened for security risks. Our safe program database contains over 1.3 billion individual files and grows by another million files every day. With program control and dynamic whitelisting, you can easily implement a default-deny approach, where all programs are blocked unless they are on your whitelist. With our new test mode, you can also try out your default deny policy in a test environment first. This allows you to test the configuration of the policy before applying it to your organization.
Prevent access by unauthorized devices
Device control tools make it easy to determine which devices have access to your network. You can control access based on time, geographic location, or device type. You can also combine controls with Active Directory for efficient, fine-grained management and policy assignment. Administrators can also use masks to create device control rules, making it easy to whitelist devices.
Monitor and Control Internet Access
Our web control tools allow you to set Internet access policies and monitor Internet usage. Activities of your users on individual websites or categories of sites, such as social networking or gaming and gambling websites, can be easily prohibited, restricted, allowed or monitored. Control capabilities based on location and time of day can be combined with Active Directory information to facilitate management and policy configuration.
Centralize management operations
Centralized control of all functions from one console
Kaspersky Endpoint Security for Business | Select includes Kaspersky Security Center - a single, unified management console that gives you visibility and control over file server security and other Kaspersky Lab endpoint security solutions running on your network. With Kaspersky Security Center, you manage security for mobile devices, laptops, desktops, file servers, virtual machines, and more - all from the convenience of one central management console.
A higher level of integration
Because tightly integrated code leads to better security, performance, and manageability, all of our endpoint technologies have been developed in-house by our own teams. All of our endpoint security features share a common code base, eliminating compatibility issues from the start. So you benefit from seamlessly integrated security technologies that provide superior protection for your IT environment, and save time thanks to centralized management.
Technical details:
License
Software type
Renewal
License type
Base license
Number of user licenses
20 - 24
Period
1 year(s)
System requirement
Min. required hard disk space
1000 MB
Min. required RAM
512 MB
Supported Windows operating systems
Yes
Supported Mac operating systems
Yes
Minimum Processor
Intel Pentium
Minimum processor speed required
1000 MHz
Supported Linux operating systems
Yes
Minimum system requirements
IE 7.0+
FireFox 3.5.x+
NET Framework 2.0
FireFox 3.5.x+
NET Framework 2.0
Other specifications
Compatible operating systems
Windows 8 Professional (x32/64)
Windows 8 Enterprise (x32/64)
Windows 7 Professional (x32/64)
Windows 7 Enterprise (x32/64)
Windows 7 Ultimate (x32/64)
Windows Vista Business SP2 (x32/64)
Windows Vista Enterprise SP2 (x32/64)
Windows Vista Ultimate SP2 (x32/64)
Windows XP Professional SP3+
Windows SBS 2011 Essentials (64)
Windows SBS 2011 Standard (64)
Windows SBS 2011 Premium (64)
Windows MultiPoint Server 2011 (64)
Windows Server 2012 Foundation (64)
Windows Server 2012 Essentials(64)
Windows Server 2012 Standard (64)
Windows Server 2008 R2 Hyper-V
Windows Server 2008 R2 Standard (64)
Windows Server 2008 R2 Enterprise (64)
Windows Server 2008 R2 Foundation (64)
Windows Server 2008 R2 Datacenter (32/64)
Windows Server 2008 Standard SP2 (32/64)
Windows Server 2008 Enterprise SP2 (32/64)
Windows Server 2008 Datacenter (32/64)
Windows Server 2003 R2 Standard SP2 (32/64)
Windows Server 2003 R2 Enterprise SP2 (32/64)
Windows Server 2003 Standard SP2 (32/64)
Windows Server 2003 Enterprise SP2 (32/64)
Mac OS X 10.8 (x32/64)
Mac OS X 10.7 (x32/64)
Mac OS X 10.6 (x32/64)
Mac OS X 10.5 (x32)
Mac OS X 10.4 (x32)
Mac OS X Server 10.6 (x32/64)
Mac OS X Server 10.7 (x32/64)
Mandriva Linux 2010
Mandriva Enterprise Server 5.2
Red Hat Enterprise Linux 5.5 Desktop
Red Hat Enterprise Linux 5.5 Server
Red Hat Enterprise Linux 6 Server
SUSE Linux Enterprise Desktop 10 SP3
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Server 11 SP1
Novell Open Enterprise Server 2 SP3
openSUSE Linux 11.3
Ubuntu 10.04 LTS Desktop
Ubuntu 10.04.2 LTS Server
Debian GNU/Linux 5.0.5, 6.0.1
FreeBSD 7.4, 8.2
Fedora 13, 14
CentOS-5.5
Novell NetWare 5.x, 6.0, 6.5
Symbian OS 9.1, 9.2, 9.3, 9.4 s60 UI
Symbian^3
Symbian Belle
Windows Mobile 5.0, 6.0, 6.1, 6.5
BlackBerry 4.5, 4.6, 4.7, 5.0, 6.0
Android 1.6, 2.0, 2.1, 2.2, 2.3, 4.0
Windows 8 Enterprise (x32/64)
Windows 7 Professional (x32/64)
Windows 7 Enterprise (x32/64)
Windows 7 Ultimate (x32/64)
Windows Vista Business SP2 (x32/64)
Windows Vista Enterprise SP2 (x32/64)
Windows Vista Ultimate SP2 (x32/64)
Windows XP Professional SP3+
Windows SBS 2011 Essentials (64)
Windows SBS 2011 Standard (64)
Windows SBS 2011 Premium (64)
Windows MultiPoint Server 2011 (64)
Windows Server 2012 Foundation (64)
Windows Server 2012 Essentials(64)
Windows Server 2012 Standard (64)
Windows Server 2008 R2 Hyper-V
Windows Server 2008 R2 Standard (64)
Windows Server 2008 R2 Enterprise (64)
Windows Server 2008 R2 Foundation (64)
Windows Server 2008 R2 Datacenter (32/64)
Windows Server 2008 Standard SP2 (32/64)
Windows Server 2008 Enterprise SP2 (32/64)
Windows Server 2008 Datacenter (32/64)
Windows Server 2003 R2 Standard SP2 (32/64)
Windows Server 2003 R2 Enterprise SP2 (32/64)
Windows Server 2003 Standard SP2 (32/64)
Windows Server 2003 Enterprise SP2 (32/64)
Mac OS X 10.8 (x32/64)
Mac OS X 10.7 (x32/64)
Mac OS X 10.6 (x32/64)
Mac OS X 10.5 (x32)
Mac OS X 10.4 (x32)
Mac OS X Server 10.6 (x32/64)
Mac OS X Server 10.7 (x32/64)
Mandriva Linux 2010
Mandriva Enterprise Server 5.2
Red Hat Enterprise Linux 5.5 Desktop
Red Hat Enterprise Linux 5.5 Server
Red Hat Enterprise Linux 6 Server
SUSE Linux Enterprise Desktop 10 SP3
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Server 11 SP1
Novell Open Enterprise Server 2 SP3
openSUSE Linux 11.3
Ubuntu 10.04 LTS Desktop
Ubuntu 10.04.2 LTS Server
Debian GNU/Linux 5.0.5, 6.0.1
FreeBSD 7.4, 8.2
Fedora 13, 14
CentOS-5.5
Novell NetWare 5.x, 6.0, 6.5
Symbian OS 9.1, 9.2, 9.3, 9.4 s60 UI
Symbian^3
Symbian Belle
Windows Mobile 5.0, 6.0, 6.1, 6.5
BlackBerry 4.5, 4.6, 4.7, 5.0, 6.0
Android 1.6, 2.0, 2.1, 2.2, 2.3, 4.0
Properties: "Kaspersky Total Security for Business"
Operating system: | macOS Windows |
Included applications: | Firewall Server protection Virus protection |
System requirements for Windows
General requirements CPU: 1 GHz processor for workstations (1.4 GHz for servers) that supports SSE2 instruction set RAM: 1 GB for a 32-bit operating system (2 GB for a 64-bit operating system or server) Hard disk space: at least 2 GB free space Operating systems Windows 11 Windows 10, all versions Windows 8.1 Windows 8 Windows 7, all versions, Service Pack 1 or higher Windows Server 2022 Windows Server 2019 Essentials/Standard/Datacenter Windows Server 2016 Essentials/Standard/Datacenter Windows Server 2012 R2 Foundation/Essentials/Standard/Datacenter Windows Server 2012 Foundation/Essentials/Standard/Datacenter Windows Server 2008 R2, all versions, Service Pack 1 or higher Windows MultiPoint Server 2011 or higher Small Business Server 2011 Essentials/Standard Virtual Platforms VMWare Workstation 16.1.1 Pro VMWare ESXi 7.0U2a Microsoft Hyper-V 2019 Citrix Virtual Apps and Desktops 7 2103 Citrix Provisioning 2012 Citrix Hypervisor 8.2 LTSR
System requirements for Windows Server
General requirements CPU: 2.4 GHz quad core RAM: 2 GB Hard disk space: at least 4 GB free space Operating systems Windows Server 2022 Windows 10 Enterprise with multiple sessions Windows Server 2019, all versions Windows Server 2016, all versions Windows Server 2012 all versions Windows Server 2008 all versions, Service Pack 2 or later Windows Server 2003, all versions, Service Pack 2 or later Windows Storage Server 2012 or higher Hyper-V Server 2012 or higher Windows MultiPoint Server 2011 or higher Small Business Server 2008 or higher
System requirements for Linux
General Requirements CPU: Intel Core 2 Duo processor running at 1.86 GHz or higher RAM: 1 GB for a 32-bit operating system (2 GB for a 64-bit operating system) Hard disk space: at least 4 GB free space Swap partition with at least 1 GB capacity Operating systems CentOS 6.7 or higher, x86 / x64 Debian GNU / Linux 9.4 or higher, x86 / x64 Red Hat® Enterprise Linux® 6.7 , x86 Red Hat® Enterprise Linux® 7.2 or later, x64 Linux Mint 19, x86 Linux Mint 20.1 and higher, x64 ALT Education/Workstation/Server 9, x86/x64 AlterOS 7.5 and later, x64 Amazon Linux 2, x64 Astra Linux Common Edition (operating update 2.12), x64 Astra Linux Special Edition RUSB.10015-01 (operating update 1.5 and 1.6), x64 Astra Linux Special Edition RUSB.10015-16 (version 1) (operating update 1.6), x64 EulerOS V2.0SP2 2.2.17, x64 EulerOS V2.0SP5 2.5.6, x64 openSUSE Leap 15.0 and higher, x64 Oracle Linux 7.3 and higher, x64 Oracle Linux 8.0 and higher, x64 Pardus OS 19.1, x64 SUSE Linux Enterprise Server 12 SP5 and higher, x64 SUSE Linux Enterprise Server 15 and higher, x64 Ubuntu 18.04 LTS and higher, x64 Ubuntu 20.04 LTS, x64 GosLinux 7.2, x64 Mageia 4, x86 Red OS 7.3, x64
System requirements for Mac
General requirements CPU: Intel®, Apple® silicon RAM: 4 GB Hard disk space: at least 5 GB free space Operating systems macOS 10.14 or higher Virtualization Parallels Desktop 16 for Mac Business Edition VMware Fusion 11.5 Professional or higher
System requirements for Mobile Security
General requirements Screen resolution 320 x 480 pixels or more 65 MB free hard disk space on the device Operating systems Android 5.0-12.0 (except Go Edition) iOS 10.0-15.0 or iPadOS 13-15 Supports integration with EMM systems VMware AirWatch 9.3 or higher MobileIron 10.0 or higher IBM Maas360 10.68 or higher Microsoft Intune 1908 or higher SOTI MobiControl 14.1.4 (1693) or higher
How and when do I get my purchased product?
Digital products, product keys and access to the download center will be made available to you by email immediately after your purchase - unless a data medium has been ordered.
What payment options are available to me?
PayPal, Amazon Pay, Instant bank transfer, Credit card, Apple Pay, Prepayment, Purchase on invoice
What guarantees do I have at Blitzhandel24?
Blitzhandel24 is an EHI, TrustedShops and CHIP certified online brand shop. Blitzhandel24 also offers its customers permanent support, as well as support for the purchased product. If a product has not been used / redeemed, our customers can benefit from the money-back guarantee.
Further links to "Kaspersky Total Security for Business"
Available downloads:
Properties: "Kaspersky Total Security for Business"
Operating system: | macOS Windows |
Included applications: | Firewall Server protection Virus protection |
Pricing policy more
How do our prices come about ?
The basic principle of the software trade is the art of omission.
- by quantity bundling
- Opening of delivery and storage fees through virtual merchandise management.
- Direct imports
- Long-term relationship with distributors.
- Low profit margin, main priority at Blitzhandel24 is the valuation as well as the growth of the customer base.
- A central and lean administration.
- Quantity purchases from authorized suppliers/distributors.
- Elimination of high marketing investments, as we respond to the needs of our customers in a targeted manner and can therefore safely implement the concept of ''advertising through references''.
Is the quality therefore worse?
We promise our customers excellent quality. The prices do not affect the quality in any way, our customers get tested verified products. In addition you have with Blitzhandel24 a security up to 20,000€ over Trusted Shops as well as a legally safe Shop, by EHI Prüfsiegel.