Presentation is loading. Please wait.

Presentation is loading. Please wait.

KASPERSKY ENDPOINT SECURITY

Similar presentations


Presentation on theme: "KASPERSKY ENDPOINT SECURITY"— Presentation transcript:

1 KASPERSKY ENDPOINT SECURITY
FOR BUSINESS 2015 The following presentation outlines the features, technologies and applications within Kaspersky Endpoint Security for Business, including new and enhanced functionality introduced in 2015.

2 What we see today 325,000 New Endpoint Threats per day
Targeted attacks and malware campaigns Continued Exploitation of Vulnerabilities in 3rd party software Exponential growth of mobile malware Increased Threats to Mac machines Threat reports Cyber Incidents Investigation Every business, regardless of size is at risk from malware threats. Kaspersky Lab is in a unique position to see and discover many of these threats – during the latter half of 2014, we discovered and reported on many key targeted attacks including“the Mask (Careto)”, “Crouching Yeti”, “Epic Turla”, as well as an attack on the clients of a large European bank that resulted in the theft of half a million euros in just one week. We named this 'Luuuk‘. And few business travelers can forget the threat discovered at the end of 2014 called “Dark Hotel”, infecting hotel guests logging into public Wi-Fi networks. We see the continued exploitation of unpatched vulnerabilities. This remains one of the key mechanisms used by cybercriminals to install malicious code on victims' computers. This relies on the existence of vulnerabilities in widely-used software and the failure of individuals or businesses to patch applications. The number of mobile malware attacks per month increased tenfold – from 69,000 per month in August 2013 to 644,000 in March Even on a straight line graph, this number could be in the millions by the end of 2015! Apple’s “closed-by-default” operating system makes it harder for malware to successfully take hold of the platform, but there remains a risk if users disable Mac OS X security measures – especially people who use pirated software. This is a problem as we continue to see malicious software being pushed via torrents and pirated software packages. And, sadly we see the growth of malware to exceed 325,000 unique threats targeting individuals and businesses like yours – every day. 2

3 What is needed to secure your business?
A comprehensive security platform that leverages all three Multi-layered protection against know, unknown and advanced threats Security Intelligence Innovative Technology At Kaspersky Lab, we are concerned about these threats and the risk they pose to your business – that’s why we feel there are three things required to safeguard your organization against them. The first requirement is having superior threat intelligence. This is a deep understanding of what a threat looks like – how it is written and compiled. It’s important to investigate propagation methods and scour malware hot zones around the globe to see what’s coming next. Security for your business must utilize innovative tools and techniques to detect and eliminate known, unknown and advanced malware. Your security software must minimize the burden on your systems and maintain fast scanning times so as not to disrupt your business. Because you have a complex environment, this technology must extend across multiple platforms whether physical, mobile or virtual. Only Kaspersky can offer both the Threat Intelligence your company needs and the technology to put it to work. No other vendor can provide a comprehensive security platform built from technology that leverages our world-leading threat intelligence. Kaspersky solutions are designed to be flexible, because your business is unlike any other. This mean we are prepared to protect your organization against threats to your physical, mobile and virtual endpoints, your mail systems, collaboration servers, internet gateway, android and iOS devices. 3

4 Global research and analysis team world’s Leading threat research
EXPERTS AUTOMATED SYSTEMS THREAT DISCOVERY CULTURE ACCUMULATED KNOWLEDGE The threat intelligence that informs all our work and helps make Kasperky Lab solutions so powerful is supported by our GReAT team and their colleagues in Kaspersky Lab’s R and D laboratories the researchers and analysts – led, of course by one of our most dedicated and passionate technical experts, who also happens to be our Chief Executive – Eugene Kaspersky. 5

5 Multi-layered Protection
The best security foundation possible – Kaspersky Lab’s industry-leading protection against known, unknown and advanced threats HIPS and Personal Firewall Powerful multi-layered protection from all forms of cyber-threat KNOWN UNKNOWN ADVANCED System watcher Automatic Exploit Prevention Cloud-based protection Heuristic scanning Signature-based protection Kaspersky Lab’s integrated security platform has been built from the ground up, based on the best possible foundation. That foundation is our industry leading anti-malware engine; layer upon layer of powerful, streamlined protection working together to provide unrivalled anti-threat protection. Each layer of security addresses cyber-threats from a different perspective, that providing security that is deep and wide through tightly interlocking technologies Cloud-assisted real-time anti-malware intelligence and Automatic Exploit Prevention, together with signature databases and advanced heuristics, provide multi-layered security against known, unknown and advanced threats, including APT malicious components. Tight integration through a single code-base means that all these technologies and more can be layered together seamlessly for maximum protection with minimum impact on endpoint performance. 4

6 Kaspersky Lab Multi-LayerED Security
Vulnerability Assessment & Patch Management Kaspersky Security Network 70% 29% 1% BSS AEP Known Threats Systems Watcher URL Filtering (web traffic) Anti-Spam ( traffic) Unknown Threats Advanced Threats Anti-Phishing ( traffic) Blacklisting Heuristics Whitelisting App Control HIPS & Firewall (network traffic) File Download File Start File Execution Kaspersky Lab’s security elements work together to observe every file minutely through its whole lifecycle – starting from the very moment it is introduced into your system. The file’s origins, reputation, internal structure and its behavioral peculiarities – all are taken into account. The more sophisticated the threat; the more advanced the technologies required for its successful neutralization. But this doesn’t mean that earlier phase technologies are useless, even against APT components. While the names may be familiar, the have, in Kaspersky Lab’s case at least, been subject to ongoing innovation, constantly fine-tuning their performance. And the flow of security intelligence directly from Kaspersky Security Network ensures that all security elements are continuously up-to-date and fully armed. And remember, that final 1% of highly advanced malware detected by technologies unique to Kaspersky Lab may include the attack that could bring down your organization. Reactive Technologies Proactive Technologies

7 powered by global intelligence network Kaspersky Security Network
KASPERSKY GLOBAL USERS KASPERSKY SECURITYNETWORK Global cloud network - threat related information from 60 million+ users Global security intelligence Continuously feeds new data to protection components Our cloud-based reputation system (the Kaspersky Security Network) is one of the key elements in our platform. Over 60 million users of Kaspersky Lab security around the world to provide snapshots of suspicious activity on their systems. This powerful technology provides Kaspersky Lab with data about new and emerging malware threats in real time, so that we can immediately apply protection against these threats to the systems of all our users world-wide. 5

8 System Watcher with Advanced Exploit Prevention
Our Approach to Combating Advanced Threats System Watcher Automatic Exploit Prevention Monitors Applications Activity for Suspicious Behavior Monitors the most frequently targeted applications for exploit attack threats Quarantines suspicious application Rolls back any malicious activity before identification Can block zero-day threats Another layer of protection, System Watcher including Automatic Exploit Prevention, specifically targets advanced threats. When an application launches, System Watcher technology will monitor it’s behavior. If any suspicious behavior is detected, System Watcher will automatically quarantine the application. In addition, System Watcher keeps a dynamic log of important files, so that should any malware - encryption ransomeware for example - succeed in making impacting a file prior to being neutralized, files can be restored to their original status.   Our Automatic Exploit Prevention (AEP) technology, the most effective technology of its kind anywhere in the world, helps to ensure malware can’t exploit vulnerabilities in the operating system or the applications running on our customers’ endpoints. AEP specifically monitors the most frequently targeted applications – including Adobe Reader, Internet Explorer, Microsoft Office, Java and many more – to deliver an extra layer of security monitoring and protection against unknown threats. AEP has even been successful in blocking a number of Zero-Day exploits.

9 KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION*
N of independent tests/reviews Score of TOP 3 places Bitdefender Sophos G DATA Symantec F-Secure Intel Security (McAfee) Trend Micro Avira Avast BullGuard AVG ESET AhnLab Microsoft Panda Security In 2014 Kaspersky Lab products participated in 93 independent tests and reviews. Our products were awarded 51 firsts and received 66 top-three finishes. * Notes: According to summary results of independent tests in 2014 for corporate, consumer and mobile products. Summary includes tests conducted by the following independent test labs and magazines: Test labs: AV-Comparatives, AV-Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, VirusBulletin The size of the bubble reflects the number of 1st places achieved. ThreatTrack (VIPRE) Qihoo 360 Kingsoft Tencent Kaspersky Lab 1st places – 51 Participation in 93 tests/reviews TOP 3 = 71% The levels of IT security achievable by this unique combination of threat intelligence, innovative technology and a single integrated security platform has led to Kaspersky Lab being recognised as an industry leader– with independent tests continuing to award more ‘top scores’ to Kaspersky Lab, compared with any other vendor. In calendar year 2013, we participated in 79 independent tests and reviews. Our next-closest competitor (McAfee), participated in 65. In the results of these tests and reviews, Kaspersky was rated in the “top-3” 61 times. Our next-closest competitor, 35 times. And Kaspersky was rated #1st place 41 times. Our next-closest competitor, 27. So you see, none of the other leading security vendors can come even close to Kaspersky Lab in terms of the most critical aspect of any security system – its ability to detect and neuralise malware threats. 9

10 KASPERSKY ENDPOINT SECURITY
Introducing… KASPERSKY ENDPOINT SECURITY FOR BUSINESS

11 Powerful multi-layered protection against known, unknown and advanced threats, designed and built by the industry’s leading security experts. Kaspersky Endpoint Security for Business, backed by world-renowned threat intelligence, provides unequalled IT security and control

12 In Detail TOTAL ADVANCED SELECT CORE
Internet Gateway Collaboration Mail TOTAL Anti-Malware + Firewall Kaspersky Security Center CORE Vulnerability Assessment & Patch Management Inventories & License Control Software Distribution OS deployment SIEM integration Data Encryption ADVANCED Mobile Application Management Mobile Device Management Device Control Application Control Web Control File Server Security Mobile Security SELECT Cloud-enabled via the Kaspersky Security Network (KSN) Endpoint Management Infrastructure Across 4 broad tiers, Kaspersky Endpoint Security for Business evolves layer by layer – providing a scalable model through which our customers can better address the challenges that are facing them today. The tools and features that Kaspersky offers in these 4 tiers deliver the protection and value IT managers around the globe been looking for. The tiers of Kaspersky endpoint security for business begin with Kaspersky’s award-winning and powerful Anti-Malware technology in the Core tier. But, we know anti-malware by itself isn’t enough to deal with today’s threats. For that reason, in the Select tier, we’ve added Application Whitelisting and Control, Device control and Web control to the protection roster. Also included at this tier is Kaspersky Lab’s mobile security solution. Moving to the Advanced tier – this is where we include data protection in the form of Encryption. Here we also find the IT efficiency features of Kaspersky Systems Management. You’ll experience an immense amount of value in this broad set of features. Our final Tier – Kaspersky Total Security for Business adds the power of Kaspersky Collaboration Server protection - and our popular mail and web gateway security products. This is the perfect solution for organizations with broad security requirements who demand the best protection for each network area.

13 Kaspersky Endpoint Security for Business
Endpoint security technologies built into this single platform include: All managed through a single management console: Kaspersky Security Center SYSTEMS MANAGEMENT Vulnerability detection & patch management plus extended client management capabilities NEW FEATURES ANTI-MALWARE protection against known, unknown and advanced threats Including SIEM support KASPERSKY SECURITY CENTER NEW FEATURES DATA ENCRYPTION fully integrated data protection NEW FEATURES ENDPOINT CONTROL TOOLS application, device And web controls NEW FEATURES Including RBAC Including 2-stage authentification Including Default Deny test environment MOBILE SECURITY smartphone and tablet security and management NEW FEATURES Kaspersky Endpoint Security for Business is a complete endpoint protection, control and management solution integrated into a single platform. These security components include, reading clockwise from the top: Anti-malware protection. Kaspersky's award-winning multi-layered technology incorporating protection against emerging and even unknown advanced threats. Granular applications ,device and web controls augmented by Dynamic Whitelisting and applications privilege control technologies Mobile Security –endpoint security, plus device and applications management for Android, iOS and Windows based mobile phones and tablets, including a self-service user portal. Powerful data encryption fully integrated so that joint control and encryption policies, for example, can be developed, ensuring confidential data is safe even if it falls into the wrong hands. A systems management toolkit, including vulnerability assessment and automated patch management, as well as systems provisioning, inventories and license management Including self-service portal and web console

14 Kaspersky Security Center – Enterprise Mode
Optional Role-Based Access Control (RBAC) for larger IT Departments with distributed management responsibilities Kaspersky Security Centre Kaspersky Endpoint Security for Business. All tiers Single IT Administrator Kaspersky Endpoint Security for Business. Advanced tier Kaspersky Endpoint Security for Business. Advanced Business tier Data Protection Management Patch Management Mobile Endpoint Management Workstation Security and Control This Enterprise slide is for use with organizations with large diversified IT Departments. For larger organizations where security responsibilities extend across a number of IT functions, role based administration is also supported, so that management responsibilities can be allocated in line with IT management functions.

15 KASPERSKY ENDPOINT SECURITY
FOR BUSINESS - select Also includes: Application, Web and Device controls Kaspersky security for mobile .

16 Endpoint Control DEVICE CONTROL WEB CONTROL APPLICATION CONTROL
WITH DYNAMIC WHITELISTING Control tools add a powerful additional layer of protection, allowing the administrator to deploy and enforce policies about how hardware, software and internet connectivity can be accessed and used by different groups of employees, or even single individuals. Device control, for example, allow usage policies to be set right down to the level of a single portable device, identified by serial number, keeping downloaded materials secure and preventing malware from being inadvertently introduced onto the network. Web control protect users from dangerous and from inappropriate sites, supporting compliance with employee protection legislation and, through restricting access to social media during working hours, supporting productivity. Kaspersky Lab’s Applications Control and Whitelisting is different in a number of ways from that offered by other security companies, so it’s worth looking a bit more closely at this area on the next slide.

17 More about Application Control and Whitelisting
Applications Lifecycle Control – Protection from Known and Unknown threats Application Startup Control Application Privilege Control Vulnerability Monitor Behavioral Analysis Local Whitelisting CLOUD Whitelisting Most control solutions offer only basic blocking/access functionality. Kaspersky Lab’s control tools are unique in their use of cloud-based whitelisting databases, enabling near-real-time access to the latest application data. Kaspersky’s Whitelisting technology is the most advanced on the market, and we are as far as we know the only security company with our own in-house Whitelisting laboratory developing our own database, rather than just buying in the same white- and blacklists as everyone else. Continuous monitoring of each application at every stage - download, installation, execution. - is conducted through Heuristic Analysis. If an application be identified as behaving suspiciously Application Privilege Control then intervene by limiting the application’s access. Vulnerability scanning, meanwhile, provides Proactive defense against attacks targeted at vulnerabilities in trusted applications. The quality of our Whitelisting also makes a ‘Default Deny’ based applications control a practical security option. Many IT Managers are understandably reluctant to consider this highly effective and rigorous security scenario, because of natural concerns about the possible impact on users and productivity. So Kaspersky Applications Control includes a ‘ sandbox environment’ where the IT Manager can safely test-run their system in Default Deny mode. Just some of the ways in which Kaspersky Applications Control and Whilelisting technology contributes further layers of powerful protection and control to the Kaspersky Endpoint Security for Business Platform

18 Kaspersky Security for Mobile
Proactive security, management and control for mobile endpoints Mobile Security Multilayered anti-malware Web Protection Rooting/Jailbreak detection Mobile Device Management Exchange ActiveSync iOS MDM Samsung KNOX Mobile Application Management App Wrapping App Control Selective Wipe Anti-Theft Lock/Wipe Locate/Alarm/ Mugshot SIM Watch NEW! Self-Service Portal BYOD enablement Certificate delivery Anti-Theft Centralized Management All major mobile platforms Other IT security areas Web Console NEW! Kaspersky Security for Mobile helps ensure that mobile devices and the data on them is safe, no matter where they are, protecting against malware and giving visibility and control over all smartphones and tablets from one central location and with minimal disruption. Kaspersky Security for Mobile is made up of: An endpoint agent for mobile device protection combining mobile security and anti-theft technologies – even a ‘mugshot’ feature to take Centralized Mobile Device (MDM) and Applications (MAM) Management for Android, IOS and Windows Phone smartphones and tablets. And, to make remotely management of the different mobile device platforms easier, everything is administered together through Kaspersky Security Center. Though users can register devices onto the network themselves and trigger anti-theft measures directly from a self-service web portal in an emergency – for greater efficiency as well as security.

19 A fully integrated mobility solution
Security for Mobile, Desktop and Virtual Endpoints are managed together through a single console Endpoint protection Self-Service Portal Mobile Security Server protection Control tools Mobile Application Management Kaspersky Security Center Encryption Systems Management Mobile Device Management Virtual infrastructure Managing everything together through Kaspersky Security Center gives administrators a complete unified overview of the organization’s endpoint security, regardless of the nature of the endpoint or its platform. I OS and Android devices, workstations, laptops and virtual desktops are all brought together for remote administration through a single console.

20 KASPERSKY ENDPOINT SECURITY FOR BUSINESS - ADVANCED
Also includes: Data encryption Kaspersky systems management

21 Data Encryption Simple Administration – Complex Capabilities
File/folder (FLE) Full disk (FDE) POWERFUL DATA ENCRYPTION Application controls Device controls RICH UNPARALLELED INTEGRATION WITH CONTROL TOOLS Transparent/single sign-on Minimized footprint OPTIMIZED FOR MINIMAL END-USER IMPACT Pre-boot authentication Non-qwerty keyboards 2-factor authentication via tokens or smart cards NEW! AUTHENTICATION FLEXIBLE Easy password recovery Remote management STREAMLINED ADMINISTRATION Data encryption technology ensures that confidential corporate data becomes useless in the wrong hands. If a user misplaces a USB storage device, their laptop is stolen, or an attachment is intercepted by a third party, encrypted data remains safe from being exploited by unauthorized third parties. Because data encryption is just one integrated, centrally managed component of the overall security platform, it becomes straightforward to create combined policies for mandating, for example, encryption for specific applications or on specified portable devices. This is a major time saver, making the IT administrator’s life so much easier. Confidential data can be encrypted at file/folder, full disk or portable device level, and the use of a token or smart card for 2-factor authentication is just one option for secure user authorization.

22 Kaspersky Systems Management
Enhance security and manage complexity Vulnerability detection & prioritization Distribution of patches & updates Patch delivery status reports VULNERABILITY ASSESSMENT AND PATCH MANAGEMENT NEW! Hardware & software inventories License management & compliance Guest device policies INVENTORIES & LICENSE CONTROL Multicast technology supported Policies for automatic distribution Optional after-hours deployment SOFTWARE DISTRIBUTION Easy image creation & deployment Wake-on-LAN support Post-installation editing support OPERATING SYSTEMS DEPLOYMENT HP ArcSight & IBM QRadar Enterprise-level reporting Improved IT security NEW! INTEGRATION SIEM Remote troubleshooting Role-Based Access Control Control of all IT security areas across the corporate network CENTRALIZED MANAGEMENT NEW! Data encryption technology ensures that confidential corporate data becomes useless in the wrong hands. If a user misplaces a USB storage device, their laptop is stolen, or an attachment is intercepted by a third party, encrypted data remains safe from being exploited by unauthorized third parties. Because data encryption is just one integrated, centrally managed component of the overall security platform, it becomes straightforward to create combined policies for mandating, for example, encryption for specific applications or on specified portable devices. This is a major time saver, making the IT administrator’s life so much easier. Confidential data can be encrypted at file/folder, full disk or portable device level, and the use of a token or smart card for 2-factor authentication is just one option for secure user authorization.

23 Endpoint Software Lifecycle Management
GOLDEN IMAGES REPORTING INVENTORIES PATCH/UPDATE INSTALLATION OS DEPLOYMENT APPLICATION VULNERABILITY DETECTION PATCH/UPDATE DISTRIBUTION VULNERABILITY PRIORITIZATION In fact, if you look at how all the Systems Management tools work together, we have here a complete endpoint lifecycle management system. From creating and deploying golden operating systems images and managing inventories of operation systems and applications software, through to vulnerability detection and patching, and finally providing comprehensive, flexible reporting, Kaspersky Systems Management empowers the administrator to see, control and protect every endpoint on the system, remotely through a single console.

24 KASPERSKY total SECURITY
FOR BUSINESS Also includes: Security for mail servers Security for web gateways Security for collaboration servers

25 Kaspersky Total Security for Business
Comprehensive infrastructure protection beyond the endpoint Security for Mail Server Kaspersky Security for Linux Mail Server Kaspersky Security for Microsoft Exchange Servers Kaspersky Anti-Virus for Lotus Notes/Domino Security for Internet Gateway Kaspersky Anti-Virus for Proxy Server Kaspersky Anti-Virus for Microsoft ISA Server and Forefront TMG Security for Collaboration Kaspersky Security for Microsoft SharePoint Server Finally Kaspersky Total Security for Business offers all the endpoint products and technologies incorporated into the other tiers of Kaspersky Endpoint Security for business. But now we add three further layers of server and gateway protection, building into the most powerful and comprehensive integrated security solution offered in the industry today : Kaspersky Security for Mail servers Kaspersky Security for Internet Gateways, and Kaspersky Security for Collaboration

26 Kaspersky Endpoint Security For Business
Progressive, feature-rich tiers ANTI-MALWARE APP, DEVICE, WEB CONTROL MOBILE SECURITY DATA ENCRYPTION SYSTEMS MANAGEMENT MAIL, WEB AND COLLABORATION Kaspersky Endpoint Security For Business. TOTAL Kaspersky Endpoint Security For Business. ADVANCED Kaspersky Endpoint Security For Business. SELECT Kaspersky Endpoint Security For Business. CORE Across 4 broad tiers, Kaspersky Endpoint Security for Business evolves layer by layer – providing a scalable model through which our customers can better address the challenges that are facing them today. The tools and features that Kaspersky offers in these 4 tiers deliver the protection and value IT managers around the globe been looking for.

27 KASPERSKY targeted solutions
Including Virtualization And Storage Security Solutions

28 Targeted Solutions File Servers Systems Management Mobile Mail Servers
Virtualization Collaboration Storage Internet Gateways Because everyone’s network is different, Kaspersky offers these “ad-hoc” or “targeted” solutions. These solutions address the security needs of certain network infrastructure areas. Some solutions, like Kaspersky Security for Virtualization and Kaspersky Security for Storage, are offered only as ‘stand-alone’ solutions, and not as part of Kaspersky Endpoint Security for Business. They are, however, built in-house and able to integrate tightly with all other Kaspersky Security for Business solutions – Kaspersky Security for Virtualization, for example, is managed through the same single Kaspersky Security Center console. Other targeted solutions are also included in Kaspersky Endpoint Security for Business are available to allow customers to ‘mix-and-match’ components. For example, if a customer requires only the components of the Select tier, but also needs Mail security – the right solutions can be created by combining the two.

29 SECURITY INTELLIGENCE IS IN OUR DNA
Expertise from the TOP down Independent recognition of our leadership in tests Respected among TOP security organizations Leading global threat intelligence. GREAT team Technology driven. Strong R&D Leading discovery of the most complicated threats See and predict security incidents with Kaspersky Security Network But at the end of it all, the real difference is our commitment to what we do – our passion and our expertise – its in our DNA! Kaspersky Lab delivers the most powerful anti-malware on the market by harnessing the world-leading Security Intelligence that is built into our DNA and influences everything we do – and how we do it. We’re a technology-driven company – from top to bottom – starting with our CEO, Eugene Kaspersky. Our Global Research & Analysis Team (GReAT), an elite group of IT security experts, have been the first to uncover many of the world’s most dangerous malware threats and targeted attacks. Many of the world’s most respected security organizations and law enforcement agencies have actively sought our assistance. Since Kaspersky Lab develops and perfects all of its own core technologies in-house, our products are naturally more stable and more efficient. Each year, Kaspersky Lab participates in more independent tests than any other vendor – and we come top in a much higher percentage of tests than any other vendor! The most widely respected industry analysts – including Gartner, Inc, Forrester Research and International Data Corporation (IDC) – rate us as a Leader within many key IT security categories Over 130 OEMs – including Microsoft, Cisco Meraki, Juniper Networks, Alcatel Lucent and more – use our technologies within their own products and services.   That’s what makes the difference!

30 KASPERSKY ENDPOINT SECURITY
FOR BUSINESS The following presentation outlines the features, technologies and applications within Kaspersky Endpoint Security for Business, including new and enhanced functionality introduced in 2015.


Download ppt "KASPERSKY ENDPOINT SECURITY"

Similar presentations


Ads by Google