Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Kaspersky Launches New Endpoint Security Products for Business

Kaspersky Lab has released what it declared as the most significant “business related” products it has released in four years. Officially launched on Thursday, Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center include new multi-layer anti-malware protection, powered by Kaspersky’s intelligence network.

Kaspersky Lab has released what it declared as the most significant “business related” products it has released in four years. Officially launched on Thursday, Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center include new multi-layer anti-malware protection, powered by Kaspersky’s intelligence network.

Kaspersky Endpoint Security 8Built from the ground up, the two new endpoint protection products were designed to deliver what the company claims is a new level of threat protection and control that can be centrally deployed, administered and monitored by a unified management system.

Replacing the Kaspersky Administration Kit, Kaspersky Security Center supports Kaspersky Endpoint Security 8 for Windows as well as all existing Open Space Security suite of products. The new Kaspersky Security Center protects both physical and virtual environments. The product offers wizard-driven templates to help manage deployment efficiently.

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center introduce a significant number of new and enhanced features, including:

Cloud Integration: Kaspersky Endpoint Security 8 for Windows integrates with the Kaspersky Security Network, a cloud-based threat intelligence database that gathers reputation data for files, applications and URLs from millions of Kaspersky users worldwide.

Cloud Security Reading: The Big Shift to Cloud-based Security

Application Control and Whitelisting: IT administrators can proactively strengthen their security posture against targeted attacks through system-wide or employee-specific policies, including:

◦ The ability to Allow or block certain applications, or entire application categories. Flexible creation of policies enables an administrator to apply stronger safeguards to critical endpoints.

◦ Monitor and prioritize application vulnerability updates using Application Vulnerability Monitor, providing reports on outdated software with critical vulnerabilities running on the network.

Advertisement. Scroll to continue reading.

System Watcher: By monitoring and logging system behavior and actions of applications, System Watcher can reverse the damage caused by a program if it is found to be malicious. As a result, harmful registry changes, file modifications and other system settings can revert back to their pre-infected state.

New Anti-Virus Engine: A new antivirus engine brings improved Pattern-Based Signature technology along with smaller update sizes.

Unified Management and Control

Application Privilege Control: Using administrative policies or cloud-assisted categories, application behaviors and their access to system operations can be restricted or blocked. Applications are assigned to one of four existing groups — Trusted, Low Restricted, High Restricted and Untrusted — each with different access rights to system and network resources and users’ data.

Device Control: Allows companies to create flexible and especially granular policies to manage device access privileges to endpoints, which can be tailored for the needs of individual employees based on access policies, or even down to specific device serial numbers.

Web Controls and Content Filtering: Assign administrative access to web resources, based on URL, content type and data type. Control permissions by user groups or other hierarchies to permit, prohibit or limit Internet access. Additionally, flexible scheduling rules and auditing ensure impressive control and oversight of corporate web usage policies. Streamlined Management

Virtualization Support: Kaspersky Security Center supports VMware’s virtual machine management, and provides full management of Kaspersky Lab solutions on non-persistent virtual machines. IT administrators have the ability to create two-level administration server hierarchy on a single physical server in order to reduce operating costs and set up an easily scalable security management system, without the need for third-party virtualization tools. Additionally, Virtual Administration Servers may be defined to simplify and/or share administration among remote offices.

Web Console and Dashboards: In addition to the local management console, a Web Console allows monitoring of network security status from any Internet accessible machine. Uncluttered dashboards provide relevant and actionable information and administration activity logs, allowing IT managers to control from anywhere.

Improved Reporting: A variety of reports are available to provide network administrators with information on Kaspersky Lab system performance and overall security status. IT managers can also prepare and export standard or customizable reports, which can be run on a pre-defined schedule or generated on demand and sent via email in HTML, XML and PDF formats.

IT Security Resource: Justifying IT Security: Managing Risk & Keeping Your Network Secure

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.