The Product

The calm at the center of Digital Transformation

As a research-driven company, Kaspersky's focus is always on delivering the technologies our users need, not hyped-up applications.

Multiple layers of proactive, intelligent technologies intermesh to provide powerful, resilient defenses with minimal impact on speed or resources, and no software conflicts or security gaps.

Decision-makers like you constantly express their satisfaction with the results Kaspersky Endpoint Security for Business delivers – as confirmed by regular independent surveys and reports.

  • Advanced Threat Protection

    Machine learning and security intelligence combine with leading-edge technologies to protect your endpoints from cyberthreats

  • Adaptive Endpoint Control

    Enterprise-grade security that can be unique to each user - adaptive controls do the work for you

  • Critical Server Protection

    Agile threat protection has been developed specifically for high-performance corporate servers. Business-critical server functions such as email or web access receive dedicated security

  • Anti-Ransomware

    Powerful behavioral analysis helps prevent ransomware attacks, while our remediation engine rolls back any changes resulting from an attack

  • Memory Protection

    Exploit Prevention watches over protected processes and prevents attempts to exploit unpatched or even zero-day vulnerabilities in system components and applications

  • Patch Management

    Vulnerability and Patch Management keeps potentially vulnerable software up to date, leaving your IT administrators with more time to spend on other tasks

  • Enterprise Grade Manageability

    Protection that scales easily, without the need for extensive planning, giving you the freedom to change any pre-defined settings and to choose when to adopt new functionality

  • GDPR Compliance

    Certified encryption functions protect corporate data and confidential customer information to help you achieve key compliance goals, including GDPR

Kaspersky Sandbox

Complementing the functionality of Kaspersky Endpoint Security for Business, Kaspersky Sandbox enables in-depth dynamic analysis – and thus significantly increased blocking – of unknown, targeted and evasive threats.

Suitable For

This product is particularly well suited to addressing the security requirements, concerns and constraints of these enterprise sectors.

Case Studies

Explore Kaspersky Lab solutions at work in these real-world case studies

		Ferrari S.p.A.                
    Ferrari S.p.A.                

    Ferrari took a strategic decision to choose Kaspersky as their IT Security provider. They wanted to introduce more stringent IT security measures to protect their core business and ensure an increase in safety.

		Axel Springer SE           
    Axel Springer SE           

    Axel Springer is one of Europe’s largest media companies and has a clear ambition: to become the leading digital publisher. To ensure that its IT infrastructure was protected against malware and other attacks, Axel Springer chose to redesign its IT security system with a solution from Kaspersky.

Kaspersky Endpoint Security
Common Criteria: EAL 2+ Assurance level certification
Kaspersky Endpoint Security
SE Labs: Enterprise Endpoint Protection comparative test
Kaspersky Endpoint Security
NSS Labs: Advanced Endpoint Protection v.3: Recommended
Kaspersky Endpoint Security
Customer Choice Recognition in Gartner Peer Insights 2018.
Kaspersky Endpoint Security
Gartner Critical Capabilities for Endpoint Protection Platforms, 2018
Kaspersky Endpoint Security
The Forrester Wave™: Endpoint Security Suites, Q3 2019

In Use

  • Adaptive Protection Against All Forms of Cyberthreat

    Several signature-less components provide the ability to detect threats even without frequent updates:

    • Layered and interlocking technologies for ‘gapless’ protection of every endpoint, within and beyond your perimeter.
    • Real time threat intelligence from the global experts.
    • Static machine learning (ML) for pre-execution and dynamic machine learning for post-execution stages of the kill chain.
  • Advanced Control for Every Endpoint

    Our constantly evolving security technologies are further enhanced by powerful control and data protection tools:

    • Adaptive Anomaly Control, Application Control with Dynamic Whitelisting and Default Deny automatically raise security levels to the highest level appropriate to each role in the organization and significantly minimize the risk of zero-day attacks.
    • Device Control guards against the consequences of data loss on unapproved or unencrypted portable devices, and the uploading of infected data from the device.
    • Web Control prevents torrenting use and potential data leakage.
  • Automated Vulnerability Detection and Patch Distribution

    Stretched resources and escalating systems complexity makes effective patching a challenge. Kaspersky Vulnerability and Patch Management saves time and resources, while optimizing security, by centralizing and automating essential security configuration and management tasks, including:

    • Vulnerability assessment
    • Patch and update distribution
    • Inventory management
    • Application rollout.


Premium Support

Professional help is available whenever you need it. Operating in more than 200 countries, from 34 offices worldwide, we have you covered 24/7/365. Take advantage of our Premium support packages, or call on our Professional Services to ensure that you derive maximum benefit and ROI from your Kaspersky security installation.

White Papers

Learn more, with thought leadership from our globally recognized cybersecurity experts

The Threats

The threat environment is advancing exponentially, putting critical business processes, confidential data and financial resources at increasing risk from zero-day attacks. If you want to mitigate the risks to your organization of the following threats, you need to be smarter, better equipped and better informed than the cyber-professionals targeting you:

  • Scan

    Ransomware and crypto-locker attacks threatening your data

  • Scan

    Phishing attacks on employees

  • Scan

    Bodiless malware that's hard to detect

  • Scan

    Exploitation of vulnerabilities, including zero-days

  • Scan

    The physical loss of a device containing sensitive data

  • Scan

    Lost productivity due to a malware epidemic

Let’s start the conversation! To talk to one of our experts about how True Cybersecurity could inform your corporate security strategy, please get in touch.