Selection Criteria
https://static1.tomote.com/uploads/2019/04/Best-for.svg The best choice for

Businesses looking for instant and easy-to-use protection

Organizations with more sophisticated IT security needs

https://static1.tomote.com/uploads/2019/04/Protection.svg Protection

The world most tested, most awarded security, protecting your business against known and emerging cyber threats

https://static1.tomote.com/uploads/2019/04/Necessary-IT-skills.svg Skills required

General IT skills

Advanced IT skills

https://static1.tomote.com/uploads/2019/04/infrastructure-prereq-globe-eye.svg What you need

Web browser and Internet access

Server to deploy management console

https://static1.tomote.com/uploads/2019/04/Licensing-scheme.svg Licensing

Per user

1 user = 1 computer or file server & 2 mobile devices

Per device

Every device requires 1 license

https://static1.tomote.com/uploads/2019/04/protection-and-mngmt-for-workstations.svg Protection and management for workstations

Windows, Mac

Windows, Mac, Linux

https://static1.tomote.com/uploads/2019/04/file-servers.svg Protection and management for servers

Windows file servers

Windows and Linux servers

https://static1.tomote.com/uploads/2019/04/mobile-devices.svg Protection and management for mobile devices

iOS, Android mobile devices

https://static1.tomote.com/uploads/2019/04/Web-control.svg Product updates

Always runs the latest software

Freedom to choose when to update, supported by fast-upgrade

https://static1.tomote.com/uploads/2019/04/compare-table/app-web-device-controls.svg

Application Control

Sets policies to allow, block or regulate application (or application category) use
https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/tick.svg https://static1.tomote.com/uploads/2019/04/tick.svg
https://static1.tomote.com/uploads/2019/04/Device-control.svg

Web & Device Controls for PCs

Reduces your exposure to attack and mitigates data leakage by hardening your endpoints
https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/tick.svg https://static1.tomote.com/uploads/2019/04/tick.svg https://static1.tomote.com/uploads/2019/04/tick.svg
https://static1.tomote.com/uploads/2019/04/Security-Policy-Advisor.svg

Security Policy Advisor

Minimizes costly human error by recommending optimized settings for security policies and highlighting potential risks

Predefined policy

Predefined policy

Wizard-assisted

Wizard-assisted

https://static1.tomote.com/uploads/2019/04/Encryption.svg

Encryption Management

Provides management features to control encryption built in to most popular desktop platforms
https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/tick.svg https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/tick.svg
https://static1.tomote.com/uploads/2019/04/Patch.svg

Patch Management

Protects user devices from targeted attacks which exploit unpatched vulnerabilities in the OS and common applications
https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/tick.svg https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/tick.svg
https://static1.tomote.com/uploads/2019/04/adaptive-anomaly-bell-light.svg

Adaptive Anomaly Control

Lowers your exposure to attack and automatically raises security to the highest level appropriate to different groups and users, with no false-positives
https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/tick.svg
https://static1.tomote.com/uploads/2019/04/server-hardening.svg

Server hardening

Enhances high performance and remote access server protection with traffic security, application and device controls
https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/tick.svg
https://static1.tomote.com/uploads/2019/04/os-3rd-party.svg

OS & 3rd party software installation

Saves you time and money with built-in systems management and software distribution
https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/no.svg https://static1.tomote.com/uploads/2019/04/tick.svg

Need quotation for your company?

Send us a request and we will respond promptly to offer you the best pricing

GET QUOTE NOW
Kaspersky
Endpoint Security Cloud
Kaspersky
Endpoint Security Cloud Plus
Kaspersky
Endpoint Security for Business Select
Kaspersky
Endpoint Security for Business Advanced