Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Kaspersky Launches New Endpoint Security Products for Business

Kaspersky Lab has released what it declared as the most significant “business related” products it has released in four years. Officially launched on Thursday, Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center include new multi-layer anti-malware protection, powered by Kaspersky’s intelligence network.

Kaspersky Lab has released what it declared as the most significant “business related” products it has released in four years. Officially launched on Thursday, Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center include new multi-layer anti-malware protection, powered by Kaspersky’s intelligence network.

Kaspersky Endpoint Security 8Built from the ground up, the two new endpoint protection products were designed to deliver what the company claims is a new level of threat protection and control that can be centrally deployed, administered and monitored by a unified management system.

Replacing the Kaspersky Administration Kit, Kaspersky Security Center supports Kaspersky Endpoint Security 8 for Windows as well as all existing Open Space Security suite of products. The new Kaspersky Security Center protects both physical and virtual environments. The product offers wizard-driven templates to help manage deployment efficiently.

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center introduce a significant number of new and enhanced features, including:

Cloud Integration: Kaspersky Endpoint Security 8 for Windows integrates with the Kaspersky Security Network, a cloud-based threat intelligence database that gathers reputation data for files, applications and URLs from millions of Kaspersky users worldwide.

Cloud Security Reading: The Big Shift to Cloud-based Security

Application Control and Whitelisting: IT administrators can proactively strengthen their security posture against targeted attacks through system-wide or employee-specific policies, including:

◦ The ability to Allow or block certain applications, or entire application categories. Flexible creation of policies enables an administrator to apply stronger safeguards to critical endpoints.

◦ Monitor and prioritize application vulnerability updates using Application Vulnerability Monitor, providing reports on outdated software with critical vulnerabilities running on the network.

System Watcher: By monitoring and logging system behavior and actions of applications, System Watcher can reverse the damage caused by a program if it is found to be malicious. As a result, harmful registry changes, file modifications and other system settings can revert back to their pre-infected state.

New Anti-Virus Engine: A new antivirus engine brings improved Pattern-Based Signature technology along with smaller update sizes.

Unified Management and Control

Application Privilege Control: Using administrative policies or cloud-assisted categories, application behaviors and their access to system operations can be restricted or blocked. Applications are assigned to one of four existing groups — Trusted, Low Restricted, High Restricted and Untrusted — each with different access rights to system and network resources and users’ data.

Device Control: Allows companies to create flexible and especially granular policies to manage device access privileges to endpoints, which can be tailored for the needs of individual employees based on access policies, or even down to specific device serial numbers.

Web Controls and Content Filtering: Assign administrative access to web resources, based on URL, content type and data type. Control permissions by user groups or other hierarchies to permit, prohibit or limit Internet access. Additionally, flexible scheduling rules and auditing ensure impressive control and oversight of corporate web usage policies. Streamlined Management

Virtualization Support: Kaspersky Security Center supports VMware’s virtual machine management, and provides full management of Kaspersky Lab solutions on non-persistent virtual machines. IT administrators have the ability to create two-level administration server hierarchy on a single physical server in order to reduce operating costs and set up an easily scalable security management system, without the need for third-party virtualization tools. Additionally, Virtual Administration Servers may be defined to simplify and/or share administration among remote offices.

Web Console and Dashboards: In addition to the local management console, a Web Console allows monitoring of network security status from any Internet accessible machine. Uncluttered dashboards provide relevant and actionable information and administration activity logs, allowing IT managers to control from anywhere.

Improved Reporting: A variety of reports are available to provide network administrators with information on Kaspersky Lab system performance and overall security status. IT managers can also prepare and export standard or customizable reports, which can be run on a pre-defined schedule or generated on demand and sent via email in HTML, XML and PDF formats.

IT Security Resource: Justifying IT Security: Managing Risk & Keeping Your Network Secure

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cyberwarfare

Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Malware & Threats

Cybercrime in 2017 was a tumultuous year "full of twists and turns", with new (but old) infection methods, a major return to social engineering,...

Malware & Threats

Norway‎-based DNV said a ransomware attack on its ship management software impacted 1,000 vessels.