Hotline +49 3221 2292585
 

Kaspersky Endpoint Security for Business Advanced

€69.95 *

incl. VAT Free shipping

  • 241821620.1
  • KL4867XAKFS
  • 1 Year
  • Multilingual
  • Worldwide

License Type:

Year(s):

User(s):

[Backup] Data carrier to your software
1 Year Renewal for Kaspersky Endpoint Security for Business Advanced Download License Tier,... more

Product information "Kaspersky Endpoint Security for Business Advanced"

1 Year Renewal for Kaspersky Endpoint Security for Business Advanced Download License Tier, Multilingual

Product description:

Reliable security capabilities for all your endpoints, including laptops, desktops, file servers, and mobile devices

Protection for desktops and laptops running Windows, Linux, and Mac*
Multi-layered security


Our latest anti-malware engine combines signature-based security, heuristic and behavioral analysis, and cloud-based techniques to protect your business from known, unknown, and advanced threats. The engine protects all combinations of Mac, Linux, and Windows desktops and laptops.

More efficient security updates


Because cybercriminals are constantly introducing new and more complex malware, we deploy our database updates much more frequently than many other security vendors. We also use advanced security technologies that ensure significantly improved detection rates while reducing the size of update files, leaving more of your network bandwidth for other tasks.

Protection against unknown and advanced threats
When a new malware item is introduced into circulation, the risk is initially particularly high. To ensure complete protection against new threats, Kaspersky Lab's technologies and threat analysis are constantly evolving. This ensures that your organization is protected against even the most sophisticated new threats.

Detect suspicious behavior


Whenever a program is launched within your corporate network, our Activity Monitor takes over the monitoring of the program's behavior. If a suspicious behavior pattern is detected, the program is automatically blocked by the activity monitor. Since the activity monitor also keeps a dynamic log of activity in the operating system, registry, etc., it can automatically reset malicious actions that the malware had performed before it was blocked.

Exploit protection


Kaspersky Lab's Automatic Exploit Prevention (AEP) technology ensures that vulnerabilities in your operating system or other applications you use cannot be exploited by malware. AEP specifically monitors the most frequently attacked applications, such as Microsoft Office, Internet Explorer, Adobe Reader, Java, etc., to provide additional protection against and monitoring for unknown threats.

Control over programs and connections


Although some programs are not directly classified as malicious, they are considered high risk. It is often advisable to restrict the activities of such applications. Our Host-Based Intrusion Prevention System (HIPS) restricts activity on the endpoint based on the trust level assigned to a program. HIPS works in conjunction with our personal firewall, which restricts network activity.

Block attacks on the network


The Network Attack Blocker detects and monitors suspicious activity on your corporate network and allows you to determine how your system responds to suspicious behavior.

The power of the cloud - for even more security


Millions of Kaspersky users have chosen to let the cloud-based Kaspersky Security Network (KSN) collect data about malware and suspicious behavior on their computers. Your business can also benefit from improved protection against the latest malware. This real-time data stream allows us to respond extremely quickly to new malware while reducing the number of false positives.

*Some features are not supported on certain platforms.

Protection for your file servers


Security in heterogeneous environments
Our award-winning security technologies protect file servers running Windows, Linux or FreeBSD. Optimized scanning ensures minimal impact on system performance for your servers. In addition to cluster servers, we also protect Citrix and Microsoft terminal servers

Reliable protection


In the event of a failure on one of your file servers, our security technologies will automatically restart when the file server comes back up.

Significantly improved management


Every minute spent on administration and reporting is time that could be better spent on more strategic activities. That's why we work with a single console that lets you manage security on all your endpoints-file servers, workstations, and mobile devices-and easily generate detailed reports.

Mobile device protection*
Solid protection for mobile devices


By combining industry-leading technologies, we deliver effective protection against the latest mobile threats. Our phishing protection keeps you safe from fraudulent websites that target your data and personal information. Spam protection keeps you safe from unwanted calls and text messages. Flexible control tools prevent unauthorized programs from launching and dangerous websites from being accessed. Rooting and jailbreaking attempts are automatically detected and the affected devices are blocked.

Separation of corporate and personal data


Special technologies allow you to create application containers on each of your devices. The containers store enterprise applications - completely isolated from users' personal data. You can enforce encryption of all data within the container and prevent it from being copied and moved to directories outside the container. You can also require additional user authentication before launching a program from the container. If one of your employees leaves the company, you can use the selective delete function to delete the company container remotely without losing the personal data and settings of the device owner.

Support for widely used MDM platforms


Enhanced Mobile Device Management (MDM) capabilities make it easy to apply group or individual MDM policies to Microsoft Exchange ActiveSync and iOS MDM devices - all from a single console. Support for Samsung KNOX lets you manage multiple settings for Samsung devices.

Lock, wipe and locate missing devices


Remotely enabled security features protect business data on lost devices. Administrators and users can lock the device, delete business data, and track the device's location. If a thief replaces the SIM card, the SIM control feature communicates the new phone number to you so you can still use the anti-theft features. Google Cloud Messaging (GCM) support ensures that Android devices receive the anti-theft commands immediately.

Self-service portal


Our dedicated self-service portal simplifies the activation of personal mobile devices on the corporate network. In addition, this portal gives users access to key anti-theft features to quickly respond to device loss, minimizing the risk of data loss without placing an additional burden on administrators.

Reduced burden on IT administrators


Use a single, centralized console to manage your mobile devices and their security, with consistent policies across different mobile platforms. And our web console lets you manage mobile devices and their security, as well as the security of other endpoints, wherever you have Internet access.

*Not all features are available on some supported mobile device platforms.
 

Control over programs, devices and Internet usage
Dynamic Whitelisting - for added security


Our program control is among the most comprehensive in the industry. We are the only security vendor to maintain our own whitelisting lab, where programs are screened for security risks. Our safe program database contains over 1.3 billion individual files and grows by another million files every day. With program control and dynamic whitelisting, you can easily implement a default-deny approach, where all programs are blocked unless they are on your whitelist. With our new test mode, you can also try out your default deny policy in a test environment first. This allows you to test the configuration of the policy before applying it to your organization.
 

Prevent access by unauthorized devices


Device control tools make it easy to determine which devices have access to your network. You can control access based on time, geographic location, or device type. You can also combine controls with Active Directory for efficient, fine-grained management and policy assignment. Administrators can also use masks to create device control rules, making it easy to whitelist devices.
 

Monitor and Control Internet Access


Our web control tools allow you to set Internet access policies and monitor Internet usage. Activities of your users on individual websites or categories of sites, such as social networking or gaming and gambling websites, can be easily prohibited, restricted, allowed or monitored. Control capabilities based on location and time of day can be combined with Active Directory information to facilitate management and policy configuration.
 

Centralize management operations


Centralized control of all functions from one console
Kaspersky Endpoint Security for Business | Select includes Kaspersky Security Center - a single, unified management console that gives you visibility and control over file server security and other Kaspersky Lab endpoint security solutions running on your network. With Kaspersky Security Center, you manage security for mobile devices, laptops, desktops, file servers, virtual machines, and more - all from the convenience of one central management console.
 


A higher level of integration


Because tightly integrated code leads to better security, performance, and manageability, all of our endpoint technologies have been developed in-house by our own teams. All of our endpoint security features share a common code base, eliminating compatibility issues from the start. So you benefit from seamlessly integrated security technologies that provide superior protection for your IT environment, and save time thanks to centralized management.

Technical details:

License
Software type
Renewal
License type
Base license
Number of user licenses
20 - 24
Period
1 year(s)
System requirement
Min. required hard disk space
1000 MB
Min. required RAM
512 MB
Supported Windows operating systems
Yes
Supported Mac operating systems
Yes
Minimum Processor
Intel Pentium
Minimum processor speed required
1000 MHz
Supported Linux operating systems
Yes
Minimum system requirements
IE 7.0+
FireFox 3.5.x+
NET Framework 2.0
Other specifications
Compatible operating systems
Windows 8 Professional (x32/64)
Windows 8 Enterprise (x32/64)
Windows 7 Professional (x32/64)
Windows 7 Enterprise (x32/64)
Windows 7 Ultimate (x32/64)
Windows Vista Business SP2 (x32/64)
Windows Vista Enterprise SP2 (x32/64)
Windows Vista Ultimate SP2 (x32/64)
Windows XP Professional SP3+
Windows SBS 2011 Essentials (64)
Windows SBS 2011 Standard (64)
Windows SBS 2011 Premium (64)
Windows MultiPoint Server 2011 (64)
Windows Server 2012 Foundation (64)
Windows Server 2012 Essentials(64)
Windows Server 2012 Standard (64)
Windows Server 2008 R2 Hyper-V
Windows Server 2008 R2 Standard (64)
Windows Server 2008 R2 Enterprise (64)
Windows Server 2008 R2 Foundation (64)
Windows Server 2008 R2 Datacenter (32/64)
Windows Server 2008 Standard SP2 (32/64)
Windows Server 2008 Enterprise SP2 (32/64)
Windows Server 2008 Datacenter (32/64)
Windows Server 2003 R2 Standard SP2 (32/64)
Windows Server 2003 R2 Enterprise SP2 (32/64)
Windows Server 2003 Standard SP2 (32/64)
Windows Server 2003 Enterprise SP2 (32/64)
Mac OS X 10.8 (x32/64)
Mac OS X 10.7 (x32/64)
Mac OS X 10.6 (x32/64)
Mac OS X 10.5 (x32)
Mac OS X 10.4 (x32)
Mac OS X Server 10.6 (x32/64)
Mac OS X Server 10.7 (x32/64)
Mandriva Linux 2010
Mandriva Enterprise Server 5.2
Red Hat Enterprise Linux 5.5 Desktop
Red Hat Enterprise Linux 5.5 Server
Red Hat Enterprise Linux 6 Server
SUSE Linux Enterprise Desktop 10 SP3
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Server 11 SP1
Novell Open Enterprise Server 2 SP3
openSUSE Linux 11.3
Ubuntu 10.04 LTS Desktop
Ubuntu 10.04.2 LTS Server
Debian GNU/Linux 5.0.5, 6.0.1
FreeBSD 7.4, 8.2
Fedora 13, 14
CentOS-5.5
Novell NetWare 5.x, 6.0, 6.5
Symbian OS 9.1, 9.2, 9.3, 9.4 s60 UI
Symbian^3
Symbian Belle
Windows Mobile 5.0, 6.0, 6.1, 6.5
BlackBerry 4.5, 4.6, 4.7, 5.0, 6.0
Android 1.6, 2.0, 2.1, 2.2, 2.3, 4.0
Properties: "Kaspersky Endpoint Security for Business Advanced"
Operating System:
macOS
Windows
Included Applications:
Firewall
Server Protection
Virus Protection
How and when do I get my purchased product?
Digital products, product keys and access to the download centre will be made available to you by e-mail immediately after your purchase.
What payment options are available to me?
PayPal, Amazon Pay, Instant bank transfer, Credit card, Apple Pay, Prepayment, Purchase on invoice
What guarantees do I have at Blitzhandel24?
Blitzhandel24 is an EHI, TrustedShops and CHIP certified online brand shop. Blitzhandel24 also offers its customers permanent support, as well as support for the purchased product. If a product has not been used / redeemed, our customers can benefit from the money-back guarantee.
Properties: "Kaspersky Endpoint Security for Business Advanced"
Operating System:
macOS
Windows
Included Applications:
Firewall
Server Protection
Virus Protection
Pricing Policy more



What Factors Influence Our Pricing?

Our pricing is based on a variety of factors that encompass a combination of proven strategies in the software trade:

  • Procurement Strategies
    Through bulk purchasing, our 14 years of market experience on the international stage, and expertise in software trading, we achieve cost savings and efficient procurement methods.
  • Elimination of Delivery and Storage Fees
    Efficient digital inventory management minimizes storage and logistics costs.
  • Supplier Relationship Management
    Direct imports and long-standing relationships with manufacturers and distributors allow us to forgo intermediary fees and provide exclusive special conditions.
  • Regional Pricing
    We adjust our prices according to region and currency to consider global market conditions.
  • Automation
    The use of modern technologies enables efficient management of orders and customer inquiries, reducing costs.
  • Cost Management in Marketing
    The main advertising strategy focuses on customer satisfaction and relies primarily on recommendations.
  • Low Profit Margin
    Our main focus at Blitzhandel24 is customer satisfaction and expanding our customer base, allowing us to maintain a slim profit margin.

 

Security and Quality: Our Promise to You

Quality Comes First

Despite our price competitiveness, the quality of our products remains at the highest level.

We guarantee our customers top-quality at the best price. All products at Blitzhandel24 are tested and verified.
Safety and Trust

Your safety is important to us. Therefore, we offer you protection of up to €20,000 through Trusted Shops.

Our online shop is legally protected by the EHI seal, allowing you to shop with confidence.

 

If you have any further questions or concerns, please do not hesitate to contact us. We are here to help you!



Read, write and discuss reviews... more
Customer reviews for "Kaspersky Endpoint Security for Business Advanced"
Write rating
Reviews will be activated after verification.
Please enter the string in the text box below.

The fields marked with * are required.

Last viewed