Kaspersky Endpoint Security Cloud
Thank you for staying with us. Upgrade now and get our best security suite at special price.
Why customers love Kaspersky Endpoint Security Cloud Plus
Our next product up from yours comes with features that may be of interest
Advanced cloud-based security: includes everything Kaspersky Endpoint Security Cloud offers plus more manageability opportunities.
- Adopt cloud safely with Shadow IT discovery and blocking as well as free protection for Microsoft 365.
- Control user access to Internet resources depending on a site’s content or location and manage usage of external devices.
- Save time by automating vulnerability check and patch installation.
Everything you need to keep your business running smoothly - and securely
RecommendedKasperskyEndpoint Security Cloud Plus | |||
---|---|---|---|
Protect against known and advanced malware threats | File-, Web-, Mail Threat protection Protect your workstations from known, unknown and advanced malware threats with our most tested, most awarded anti-malware engine. | File-, Web-, Mail Threat protection Protect your workstations from known, unknown and advanced malware threats with our most tested, most awarded anti-malware engine. | File-, Web-, Mail Threat protection Protect your workstations from known, unknown and advanced malware threats with our most tested, most awarded anti-malware engine.
|
Prevent computers from encryption
| Ransomware prevention and malicious activity roll-back The Remediation Engine protects against cryptolockers by rolling back actions performed by malware in the operating system. | Ransomware prevention and malicious activity roll-back The Remediation Engine protects against cryptolockers by rolling back actions performed by malware in the operating system. | Ransomware prevention and malicious activity roll-back The Remediation Engine protects against cryptolockers by rolling back actions performed by malware in the operating system. |
Detect, understand and respond to threats | — | Root Cause Analysis
Detect and root out advanced attacks, perform root-cause analysis with a visualized kill-chain, and drill down into more details for further review. | Endpoint Detection and Response Provides root cause analysis, visualization capabilities and automated response actions to evasive and unknown threats. |
Build skills with cybersecurity training | — | — | Cybersecurity training for administrators Training for IT administrators combining theory with hands-on tuition in simulated environments, operating from the same web management console. |
Take control of device usage
| — | Web Control and Device Control
Control user access to Internet resources and external and removable devices connected to the computer | Application Control, Web Control and Device Control
Control user access to Applications, Internet resources, external and removable devices connected to the computer. |
Ensure safe cloud adoption | Cloud Discovery
See uncontrolled cloud service usage as well as time wasted on social networks and messengers | Cloud blocking and security for Microsoft Office 365 Curb inappropriate cloud app use and protect Microsoft Office 365 apps and services | Cloud blocking and security for Microsoft Office 365 Curb inappropriate cloud app use and protect Microsoft Office 365 apps and services |
Protect sensitive data | — | Data Discovery Prevent data loss and meet compliance with visibility and control of personal data stored in the cloud. | Data Discovery Prevent data loss and meet compliance with visibility and control of personal data stored in the cloud. |
Save time on routine tasks | Vulnerability Scan
Access all the latest available patches to update your applications to the latest versions and fix vulnerabilities. | Patch Management and Encryption Management Stop vulnerabilities from being exploited with automatic OS and application patching, and prevent data leaks with built-in OS encryption. | Patch Management and Encryption Management Stop vulnerabilities from being exploited with automatic OS and application patching, and prevent data leaks with built-in OS encryption. |
Support mobility and BYOD | Two Android/iOS devices per user Protect your Android and iOS devices from threats, and manage them remotely. | Two Android/iOS devices per user Protect your Android and iOS devices from threats, and manage them remotely. | Two Android/iOS devices per user Protect your Android and iOS devices from threats, and manage them remotely. |
Your trust well placed
Last year alone:
- 360K
- new malicious files detected every day
- 240K
- organizations protected globally
- 200
- countries and territories using Kaspersky
File-, Web-, Mail Threat protection
Protect your Windows workstations from known, unknown and advanced malware threats with our most tested, most awarded anti-malware engine.
Ransomware and Exploit prevention
Remediation Engine rolls back actions performed by malware in the operating system, delivering protection against cryptolockers.
Firewall
Protect computers against network threats when browsing the Internet or using a local network.
Frequently Asked Questions
Kaspersky Endpoint Security Cloud