Product information "Kaspersky Total Security for Business"
1 Year Renewal for Kaspersky Endpoint Security for Business Advanced Download License Tier, MultilingualReliable security for all your endpoints, including laptops, desktops, file servers and mobile devices
Protection for desktops and laptops on Windows, Linux and Mac*
Our latest anti-malware engine combines signature-based security, heuristic and behavioral analysis, and cloud-based techniques to protect your business from known, unknown, and advanced threats. The engine protects all combinations of Mac, Linux, and Windows desktops and laptops.
More efficient security updates
Because cybercriminals are constantly introducing new and more complex malware, we deploy our database updates much more frequently than many other security vendors. We also use advanced security technologies that ensure significantly improved detection rates while reducing the size of update files, leaving more of your network bandwidth for other tasks.
Protection against unknown and advanced threats
When a new malware item is introduced into circulation, the risk is initially particularly high. To ensure complete protection against new threats, Kaspersky Lab's technologies and threat analysis are constantly evolving. This ensures that your organization is protected against even the most sophisticated new threats.
Detect suspicious behavior
Whenever a program is launched within your corporate network, our Activity Monitor takes over the monitoring of the program's behavior. If a suspicious behavior pattern is detected, the program is automatically blocked by the activity monitor. Since the activity monitor also keeps a dynamic log of activity in the operating system, registry, etc., it can automatically reset malicious actions that the malware had performed before it was blocked.
Kaspersky Lab's Automatic Exploit Prevention (AEP) technology ensures that vulnerabilities in your operating system or other applications you use cannot be exploited by malware. AEP specifically monitors the most frequently attacked applications, such as Microsoft Office, Internet Explorer, Adobe Reader, Java, etc., to provide additional protection against and monitoring for unknown threats.
Control over programs and connections
Although some programs are not directly classified as malicious, they are considered high risk. It is often advisable to restrict the activities of such applications. Our Host-Based Intrusion Prevention System (HIPS) restricts activity on the endpoint based on the trust level assigned to a program. HIPS works in conjunction with our personal firewall, which restricts network activity.
Block attacks on the network
The Network Attack Blocker detects and monitors suspicious activity on your corporate network and allows you to determine how your system responds to suspicious behavior.
The power of the cloud - for even more security
Millions of Kaspersky users have chosen to let the cloud-based Kaspersky Security Network (KSN) collect data about malware and suspicious behavior on their computers. Your business can also benefit from improved protection against the latest malware. This real-time data stream allows us to respond extremely quickly to new malware while reducing the number of false positives.
*Some features are not supported on certain platforms.
Protection for your file servers
Security in heterogeneous environments
Our award-winning security technologies protect file servers running Windows, Linux or FreeBSD. Optimized scanning ensures minimal impact on system performance for your servers. In addition to cluster servers, we also protect Citrix and Microsoft terminal servers
In the event of a failure on one of your file servers, our security technologies will automatically restart when the file server comes back up.
Significantly improved management
Every minute spent on administration and reporting is time that could be better spent on more strategic activities. That's why we work with a single console that lets you manage security on all your endpoints-file servers, workstations, and mobile devices-and easily generate detailed reports.
Mobile device protection*
Solid protection for mobile devices
By combining industry-leading technologies, we deliver effective protection against the latest mobile threats. Our phishing protection keeps you safe from fraudulent websites that target your data and personal information. Spam protection keeps you safe from unwanted calls and text messages. Flexible control tools prevent unauthorized programs from launching and dangerous websites from being accessed. Rooting and jailbreaking attempts are automatically detected and the affected devices are blocked.
Separation of corporate and personal data
Special technologies allow you to create application containers on each of your devices. The containers store enterprise applications - completely isolated from users' personal data. You can enforce encryption of all data within the container and prevent it from being copied and moved to directories outside the container. You can also require additional user authentication before launching a program from the container. If one of your employees leaves the company, you can use the selective delete function to delete the company container remotely without losing the personal data and settings of the device owner.
Support for widely used MDM platforms
Enhanced Mobile Device Management (MDM) capabilities make it easy to apply group or individual MDM policies to Microsoft Exchange ActiveSync and iOS MDM devices - all from a single console. Support for Samsung KNOX lets you manage multiple settings for Samsung devices.
Lock, wipe and locate missing devices
Remotely enabled security features protect business data on lost devices. Administrators and users can lock the device, delete business data, and track the device's location. If a thief replaces the SIM card, the SIM control feature communicates the new phone number to you so you can still use the anti-theft features. Google Cloud Messaging (GCM) support ensures that Android devices receive the anti-theft commands immediately.
Our dedicated self-service portal simplifies the activation of personal mobile devices on the corporate network. In addition, this portal gives users access to key anti-theft features to quickly respond to device loss, minimizing the risk of data loss without placing an additional burden on administrators.
Reduced burden on IT administrators
Use a single, centralized console to manage your mobile devices and their security, with consistent policies across different mobile platforms. And our web console lets you manage mobile devices and their security, as well as the security of other endpoints, wherever you have Internet access.
*Not all features are available on some supported mobile device platforms.
Control over programs, devices and Internet usage
Dynamic Whitelisting - for added security
Our program control is among the most comprehensive in the industry. We are the only security vendor to maintain our own whitelisting lab, where programs are screened for security risks. Our safe program database contains over 1.3 billion individual files and grows by another million files every day. With program control and dynamic whitelisting, you can easily implement a default-deny approach, where all programs are blocked unless they are on your whitelist. With our new test mode, you can also try out your default deny policy in a test environment first. This allows you to test the configuration of the policy before applying it to your organization.
Prevent access by unauthorized devices
Device control tools make it easy to determine which devices have access to your network. You can control access based on time, geographic location, or device type. You can also combine controls with Active Directory for efficient, fine-grained management and policy assignment. Administrators can also use masks to create device control rules, making it easy to whitelist devices.
Monitor and Control Internet Access
Our web control tools allow you to set Internet access policies and monitor Internet usage. Activities of your users on individual websites or categories of sites, such as social networking or gaming and gambling websites, can be easily prohibited, restricted, allowed or monitored. Control capabilities based on location and time of day can be combined with Active Directory information to facilitate management and policy configuration.
Centralize management operations
Centralized control of all functions from one console
Kaspersky Endpoint Security for Business | Select includes Kaspersky Security Center - a single, unified management console that gives you visibility and control over file server security and other Kaspersky Lab endpoint security solutions running on your network. With Kaspersky Security Center, you manage security for mobile devices, laptops, desktops, file servers, virtual machines, and more - all from the convenience of one central management console.
A higher level of integration
Because tightly integrated code leads to better security, performance, and manageability, all of our endpoint technologies have been developed in-house by our own teams. All of our endpoint security features share a common code base, eliminating compatibility issues from the start. So you benefit from seamlessly integrated security technologies that provide superior protection for your IT environment, and save time thanks to centralized management.
NET Framework 2.0
Windows 8 Enterprise (x32/64)
Windows 7 Professional (x32/64)
Windows 7 Enterprise (x32/64)
Windows 7 Ultimate (x32/64)
Windows Vista Business SP2 (x32/64)
Windows Vista Enterprise SP2 (x32/64)
Windows Vista Ultimate SP2 (x32/64)
Windows XP Professional SP3+
Windows SBS 2011 Essentials (64)
Windows SBS 2011 Standard (64)
Windows SBS 2011 Premium (64)
Windows MultiPoint Server 2011 (64)
Windows Server 2012 Foundation (64)
Windows Server 2012 Essentials(64)
Windows Server 2012 Standard (64)
Windows Server 2008 R2 Hyper-V
Windows Server 2008 R2 Standard (64)
Windows Server 2008 R2 Enterprise (64)
Windows Server 2008 R2 Foundation (64)
Windows Server 2008 R2 Datacenter (32/64)
Windows Server 2008 Standard SP2 (32/64)
Windows Server 2008 Enterprise SP2 (32/64)
Windows Server 2008 Datacenter (32/64)
Windows Server 2003 R2 Standard SP2 (32/64)
Windows Server 2003 R2 Enterprise SP2 (32/64)
Windows Server 2003 Standard SP2 (32/64)
Windows Server 2003 Enterprise SP2 (32/64)
Mac OS X 10.8 (x32/64)
Mac OS X 10.7 (x32/64)
Mac OS X 10.6 (x32/64)
Mac OS X 10.5 (x32)
Mac OS X 10.4 (x32)
Mac OS X Server 10.6 (x32/64)
Mac OS X Server 10.7 (x32/64)
Mandriva Linux 2010
Mandriva Enterprise Server 5.2
Red Hat Enterprise Linux 5.5 Desktop
Red Hat Enterprise Linux 5.5 Server
Red Hat Enterprise Linux 6 Server
SUSE Linux Enterprise Desktop 10 SP3
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Server 11 SP1
Novell Open Enterprise Server 2 SP3
openSUSE Linux 11.3
Ubuntu 10.04 LTS Desktop
Ubuntu 10.04.2 LTS Server
Debian GNU/Linux 5.0.5, 6.0.1
FreeBSD 7.4, 8.2
Fedora 13, 14
Novell NetWare 5.x, 6.0, 6.5
Symbian OS 9.1, 9.2, 9.3, 9.4 s60 UI
Windows Mobile 5.0, 6.0, 6.1, 6.5
BlackBerry 4.5, 4.6, 4.7, 5.0, 6.0
Android 1.6, 2.0, 2.1, 2.2, 2.3, 4.0
|Operating system:|| |
|Included applications:|| |
|Operating system:|| |
|Included applications:|| |
How do our prices come about ?
The basic principle of the software trade is the art of omission.
- by quantity bundling
- Opening of delivery and storage fees through virtual merchandise management.
- Direct imports
- Long-term relationship with distributors.
- Low profit margin, main priority at Blitzhandel24 is the valuation as well as the growth of the customer base.
- A central and lean administration.
- Quantity purchases from authorized suppliers/distributors.
- Elimination of high marketing investments, as we respond to the needs of our customers in a targeted manner and can therefore safely implement the concept of ''advertising through references''.
Is the quality therefore worse?
We promise our customers excellent quality. The prices do not affect the quality in any way, our customers get tested verified products. In addition you have with Blitzhandel24 a security up to 20,000€ over Trusted Shops as well as a legally safe Shop, by EHI Prüfsiegel.