Kaspersky Endpoint Security 8
 Control Technologies




PAGE 1
You’re in control.
You’re in the driver’s seat.




                                    .
                               Applications
                               Devices
                               Web content filtering




PAGE 2
The Need for New Levels of Protection
Business Drivers



          Greater        Higher         Increased
         Efficiency    Productivity       Agility




         Reduced                        Improved IT
                      Competitiveness
          Costs                           Control




PAGE 3
IT Faces the ‘Change’ Reaction
Business Change Produces IT Security Challenges
                      • Efficiency
                      • Flexibility and Agility
                      • Reduce Costs - OPEX
                      • Consolidation
         Business     • Mobility and ‘Me Time’



                      • Virtualization
                      • Mobile Devices
                      • Consumerisation and Social Media
         Technology   • Cloud Services




                      • Malware
                      • Diverse Platform Support
                      • Hacking/Email/Phishing
          Security    • Poor Social Media Security




PAGE 4
The Growing Malware Threat
From 1 every MINUTE to 1 every SECOND


  Signatures
                                                  New Threats Every Day    125k
   5,000,000



   4,000,000                  Malware in Kaspersky Lab Database Jan 2012   67m

   3,000,000

                              Malware in Kaspersky Lab Database Jan 2011
                                                                           50m
   2,000,000



   1,000,000                                     Malware from downloads      1
                                                                           in14

         1999   2001   2003     2005     2007      2009      2011



PAGE 5
The Growing Malware Threat
From 1 every MINUTE to 1 every SECOND




   “     Cyber-gangs are definitely
         expanding their sights and
              targeting B2B.
                                   ”
                                   Roel Schouwenberg
                      Senior Researcher, Kaspersky Lab




PAGE 6
Today’s Real Challenges
The High Cost of Inadequate Protection


     91%          Experienced at least one IT security intrusion


     70%          State their IT department is under-resourced


     61%          Have experienced viruses, worms, spyware and other malware



         #1      Social Networking is seen as the biggest threat to IT security


    Source - 2011 Global IT Security Risks Survey, Kaspersky Lab


PAGE 7
Kaspersky Endpoint Security 8
Protect and Control

Superior, Intelligent Protection  Comprehensive, Flexible Control
  Significantly Reducing Business   Improving Business Efficiency and
  Risks                             Productivity
   Always Ahead of New Threats       Enhancing IT Flexibility




PAGE 8
Elegant Architecture
Fully Integrated from the Ground Up
                         Device
                         Control

                                   System
         Best of Breed             Watcher
         Anti-Malware
           Technology


                                         Application
                                         Control
           Web
         Control



           Firewall                     Kaspersky Security
                                          Network (KSN)




PAGE 9
Kaspersky Security Network (KSN)
Immediate Protection

   Billions of Records
   Uniquely ‘Aware’ Cloud
   Urgent Detection System                          Kaspersky
                                                  Security Network




                                                           Your Office
                         Kaspersky Global Users

PAGE 10
Application Control with Dynamic Whitelisting
Kaspersky’s Exclusive Approach

   Strict Policy
   Enforcement for
   Deeper
   Protection     Classify   Control



                 Enforce     Inspect




PAGE 11
Kaspersky Dynamic Whitelisting



                          Over 500 million unique clean files
                          in the database
                          Dedicated whitelisting lab
                          Whitelist infrastructure
                          (~ 1 million files per day)
                          Based on technologies
                          developed for 4 generations of our
                          consumer products




PAGE 12
Kaspersky Whitelisting Global Partnerships
Over 200 ISV official partners




PAGE 13
Efficiency proved by 1st Whitelisting Test
West Coast Labs
          We know almost all software ever released in the world!




                Source – Kaspersky Application Control and Default Deny using
                Whitelisting Comparative Test Report, West Coast Labs
PAGE 14
Application Control and Default Deny Test Results
West Coast Labs

            Blocks all programmes except those that
                 have specifically been allowed




            Source – Kaspersky Application Control and Default Deny using
            Whitelisting Comparative Test Report, West Coast Labs




PAGE 15
Device Control
Deep Granular Control Over Devices


     Controls device access privileges at the bus, type and device level
     White list categories down to serial number granularity
     Allows the creation of flexible policy scenarios to institute any access
     privilege policy
     Hardware Inventory function provides network-wide endpoint
     accounting




                                                                   Read/Write
   Connection    Time of Day     Device Type       Unique ID       Privileges
    Bus Type



PAGE 16
Web Control
Effective Productivity, Protection & Policy Enforcement
     Filtering of web resources by URL, content and data type regardless
     of workstation location
     Administrative control to grant permission, prohibit, or limit access
     Conducts audits of user access to certain website categories
     Granular and flexible rules with time-based access/deny scheduling
     on a group or user level

            Adult
            Sites
      Games
        &                                                 Kaspersky
     Gambling
                Social                                  Security Network
                Media


        Restrict specific       Create specific           Powered by
      sites, web pages or         rules and            Kaspersky Security
      complete categories         schedules                Network

PAGE 17
Kaspersky Security Center
Unified Management Console

                                      Impressive
          Single Screen Monitoring    Centralised Security Controls at
                                      Granular Levels
                Deployment
                                      Inclusive
          Protection Policy Setting   One Application, One Console

               Administration         Integrated
                                      Seamless Integration with
           Vulnerability Scanning     Kaspersky Endpoint Security

             Virtual Awareness        Intuitive
                                      No Training Required
                 Reporting




PAGE 18
Summary

    Simplified                   Device                  Application                      Web
   Management                    Control                  Control                       Filtering




       Unified Under a         Block Unauthorised         Block Unauthorised         Restrict Access to
        Single-Pane                Hardware                  Applications            Unauthorised Sites

          Solid Policy         Manage Connection           Classify, Control ,         Block Specific
          Enforcement              Interfaces             Enforce and Inspect          Content Types

    Intuitive Interface and   Create List of Trusted    Apply Granular Rules for     Block Unauthorised
      Robust Reporting              Devices             Whitelisting/ Blacklisting       Downloads

    Physical, Virtual and     Tailor Devices Rules to      Regularly Updated           Pre-configured
    Mobile Environments           Groups or Users           Classifications              Categories




PAGE 19
Be Ready for What’s Next


                           Malware detection, web content
                           filtering, device and application control
                           are all features of Kaspersky Endpoint
                           Security 8.


                           You’re in control.
                           You’re in the driver’s seat.

                           Kaspersky.com/beready




PAGE 20

More Related Content

PPTX
Kaspersky endpoint security business presentation
PDF
Introduction to Kaspersky Endpoint Security for Businesss
PPTX
Introducing Kaspersky Security for Virtualization
PDF
KASPERSKY SECURITY CENTER IMPLEMENTATION
PDF
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
PDF
Kaspersky Endpoint Security for Business 2015
PPTX
Kaspersky
PPTX
Introducing Kaspersky Security for Virtualization - Light Agent
Kaspersky endpoint security business presentation
Introduction to Kaspersky Endpoint Security for Businesss
Introducing Kaspersky Security for Virtualization
KASPERSKY SECURITY CENTER IMPLEMENTATION
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Kaspersky Endpoint Security for Business 2015
Kaspersky
Introducing Kaspersky Security for Virtualization - Light Agent

What's hot (19)

PDF
Kaspersky Lab new Enterprise Portfolio
PPTX
Supply Chain Threats to the US Energy Sector
PDF
kaspersky presentation for palette business solution June 2016 v1.0.
PDF
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
PDF
The Motives, Means and Methods of Cyber-Adversaries
PPTX
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
PPTX
How to Add Advanced Threat Defense to Your EMM
PPTX
Technology Overview - Symantec Endpoint Protection (SEP)
PPTX
Accessibility Clickjacking, Devastating Android Vulnerability
PPTX
Endpoint Security Evasion
PDF
Eset India General Presentation
PPTX
Kaspersky security for virtualization light agent launch presentation
PPTX
Mobile Security: 2016 Wrap-Up and 2017 Predictions
PDF
Endpoint Security
PDF
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
PPTX
Consider Sophos - Security Made Simple
PPT
Top Tactics For Endpoint Security
PPTX
How Aetna Mitigated 701 Malware Infections on Mobile Devices
PPTX
Tools for Evaluating Mobile Threat Defense Solutions
Kaspersky Lab new Enterprise Portfolio
Supply Chain Threats to the US Energy Sector
kaspersky presentation for palette business solution June 2016 v1.0.
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
The Motives, Means and Methods of Cyber-Adversaries
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
How to Add Advanced Threat Defense to Your EMM
Technology Overview - Symantec Endpoint Protection (SEP)
Accessibility Clickjacking, Devastating Android Vulnerability
Endpoint Security Evasion
Eset India General Presentation
Kaspersky security for virtualization light agent launch presentation
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Endpoint Security
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Consider Sophos - Security Made Simple
Top Tactics For Endpoint Security
How Aetna Mitigated 701 Malware Infections on Mobile Devices
Tools for Evaluating Mobile Threat Defense Solutions
Ad

Similar to Kaspersky Endpoint Security and Control - ENGLISH (20)

PDF
“8th National Biennial Conference on Medical Informatics 2012”
PPTX
Protecting the Mac Environment: Technical Insight
PDF
Internet Security in corporate environment
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
Total Defense Product Information
PDF
McAffee_Security and System Integrity in Embedded Devices
PDF
Kaspersky Security For Virtualization - ENGLISH
PDF
Session 1: Windows 8 with Gerry Tessier
PPTX
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
PDF
Watchguard security proposal 2012
PDF
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
PPTX
Spiceworld 2011 - AppRiver breakout session
PDF
Kaspersky Endpoint overview
PDF
Kaspersky Endpoint Overview
PPTX
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
PPTX
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
PDF
Dtl 2012 kl-app_ctl1.2
PDF
Revolutionary Security. Ultimate Performance. Minimal Management.
PPTX
Endpoint Protection
PPTX
Kaspersky Kesb ep10 no_cm_v01a
“8th National Biennial Conference on Medical Informatics 2012”
Protecting the Mac Environment: Technical Insight
Internet Security in corporate environment
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Total Defense Product Information
McAffee_Security and System Integrity in Embedded Devices
Kaspersky Security For Virtualization - ENGLISH
Session 1: Windows 8 with Gerry Tessier
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Watchguard security proposal 2012
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Spiceworld 2011 - AppRiver breakout session
Kaspersky Endpoint overview
Kaspersky Endpoint Overview
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Dtl 2012 kl-app_ctl1.2
Revolutionary Security. Ultimate Performance. Minimal Management.
Endpoint Protection
Kaspersky Kesb ep10 no_cm_v01a
Ad

More from Kirill Kertsenbaum (11)

PDF
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
PDF
vForum 2014 - Cloud Security evolution - RUSSIAN
PDF
IDC 2013 - How to provide confidentiality, integrity and availability in time...
PDF
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
PDF
Kaspersky Endpoint Security and Control - RUSSIAN
PDF
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
PDF
Kaspersky Security For Virtualization - RUSSIAN
PPT
Cybercrime: Past, Present and Future - RUSSIAN
PPT
DLP in global view - RUSSIAN
PDF
Russian CSO Summit 2011 - 2 - RUSSIAN
PDF
Russian CSO Summit 2011 - 1 - RUSSIAN
PHD 2014 - MDM, BYOD and etc. - What's next - RUSSIAN
vForum 2014 - Cloud Security evolution - RUSSIAN
IDC 2013 - How to provide confidentiality, integrity and availability in time...
Introducing New Kaspersky Endpoint Security for Business - RUSSIAN
Kaspersky Endpoint Security and Control - RUSSIAN
VMware Forum Moscow 2012 - Security for Virtualization trends in Russia - RUS...
Kaspersky Security For Virtualization - RUSSIAN
Cybercrime: Past, Present and Future - RUSSIAN
DLP in global view - RUSSIAN
Russian CSO Summit 2011 - 2 - RUSSIAN
Russian CSO Summit 2011 - 1 - RUSSIAN

Kaspersky Endpoint Security and Control - ENGLISH

  • 1. Kaspersky Endpoint Security 8 Control Technologies PAGE 1
  • 2. You’re in control. You’re in the driver’s seat. . Applications Devices Web content filtering PAGE 2
  • 3. The Need for New Levels of Protection Business Drivers Greater Higher Increased Efficiency Productivity Agility Reduced Improved IT Competitiveness Costs Control PAGE 3
  • 4. IT Faces the ‘Change’ Reaction Business Change Produces IT Security Challenges • Efficiency • Flexibility and Agility • Reduce Costs - OPEX • Consolidation Business • Mobility and ‘Me Time’ • Virtualization • Mobile Devices • Consumerisation and Social Media Technology • Cloud Services • Malware • Diverse Platform Support • Hacking/Email/Phishing Security • Poor Social Media Security PAGE 4
  • 5. The Growing Malware Threat From 1 every MINUTE to 1 every SECOND Signatures New Threats Every Day 125k 5,000,000 4,000,000 Malware in Kaspersky Lab Database Jan 2012 67m 3,000,000 Malware in Kaspersky Lab Database Jan 2011 50m 2,000,000 1,000,000 Malware from downloads 1 in14 1999 2001 2003 2005 2007 2009 2011 PAGE 5
  • 6. The Growing Malware Threat From 1 every MINUTE to 1 every SECOND “ Cyber-gangs are definitely expanding their sights and targeting B2B. ” Roel Schouwenberg Senior Researcher, Kaspersky Lab PAGE 6
  • 7. Today’s Real Challenges The High Cost of Inadequate Protection 91% Experienced at least one IT security intrusion 70% State their IT department is under-resourced 61% Have experienced viruses, worms, spyware and other malware #1 Social Networking is seen as the biggest threat to IT security Source - 2011 Global IT Security Risks Survey, Kaspersky Lab PAGE 7
  • 8. Kaspersky Endpoint Security 8 Protect and Control Superior, Intelligent Protection Comprehensive, Flexible Control Significantly Reducing Business Improving Business Efficiency and Risks Productivity Always Ahead of New Threats Enhancing IT Flexibility PAGE 8
  • 9. Elegant Architecture Fully Integrated from the Ground Up Device Control System Best of Breed Watcher Anti-Malware Technology Application Control Web Control Firewall Kaspersky Security Network (KSN) PAGE 9
  • 10. Kaspersky Security Network (KSN) Immediate Protection Billions of Records Uniquely ‘Aware’ Cloud Urgent Detection System Kaspersky Security Network Your Office Kaspersky Global Users PAGE 10
  • 11. Application Control with Dynamic Whitelisting Kaspersky’s Exclusive Approach Strict Policy Enforcement for Deeper Protection Classify Control Enforce Inspect PAGE 11
  • 12. Kaspersky Dynamic Whitelisting Over 500 million unique clean files in the database Dedicated whitelisting lab Whitelist infrastructure (~ 1 million files per day) Based on technologies developed for 4 generations of our consumer products PAGE 12
  • 13. Kaspersky Whitelisting Global Partnerships Over 200 ISV official partners PAGE 13
  • 14. Efficiency proved by 1st Whitelisting Test West Coast Labs We know almost all software ever released in the world! Source – Kaspersky Application Control and Default Deny using Whitelisting Comparative Test Report, West Coast Labs PAGE 14
  • 15. Application Control and Default Deny Test Results West Coast Labs Blocks all programmes except those that have specifically been allowed Source – Kaspersky Application Control and Default Deny using Whitelisting Comparative Test Report, West Coast Labs PAGE 15
  • 16. Device Control Deep Granular Control Over Devices Controls device access privileges at the bus, type and device level White list categories down to serial number granularity Allows the creation of flexible policy scenarios to institute any access privilege policy Hardware Inventory function provides network-wide endpoint accounting Read/Write Connection Time of Day Device Type Unique ID Privileges Bus Type PAGE 16
  • 17. Web Control Effective Productivity, Protection & Policy Enforcement Filtering of web resources by URL, content and data type regardless of workstation location Administrative control to grant permission, prohibit, or limit access Conducts audits of user access to certain website categories Granular and flexible rules with time-based access/deny scheduling on a group or user level Adult Sites Games & Kaspersky Gambling Social Security Network Media Restrict specific Create specific Powered by sites, web pages or rules and Kaspersky Security complete categories schedules Network PAGE 17
  • 18. Kaspersky Security Center Unified Management Console Impressive Single Screen Monitoring Centralised Security Controls at Granular Levels Deployment Inclusive Protection Policy Setting One Application, One Console Administration Integrated Seamless Integration with Vulnerability Scanning Kaspersky Endpoint Security Virtual Awareness Intuitive No Training Required Reporting PAGE 18
  • 19. Summary Simplified Device Application Web Management Control Control Filtering Unified Under a Block Unauthorised Block Unauthorised Restrict Access to Single-Pane Hardware Applications Unauthorised Sites Solid Policy Manage Connection Classify, Control , Block Specific Enforcement Interfaces Enforce and Inspect Content Types Intuitive Interface and Create List of Trusted Apply Granular Rules for Block Unauthorised Robust Reporting Devices Whitelisting/ Blacklisting Downloads Physical, Virtual and Tailor Devices Rules to Regularly Updated Pre-configured Mobile Environments Groups or Users Classifications Categories PAGE 19
  • 20. Be Ready for What’s Next Malware detection, web content filtering, device and application control are all features of Kaspersky Endpoint Security 8. You’re in control. You’re in the driver’s seat. Kaspersky.com/beready PAGE 20