This tier is designed for organizations that need essential protection and control over their endpoints, including workstations, file servers, and mobile devices.
Key Features:
- Endpoint Protection: Advanced anti-malware and antivirus protection using machine learning and behavior analysis.
- Firewall and Intrusion Prevention: Safeguards against unauthorized access and exploits.
- Web Control: Regulates web usage, blocking harmful or inappropriate websites.
- Device Control: Manages the use of USB and other peripheral devices to prevent data breaches.
- Mobile Security: Protects Android and iOS devices with anti-theft and mobile management capabilities.
- Cloud Management Console: Centralized management via the Kaspersky Security Center (available both on-premises and in the cloud).
Kaspersky Endpoint Security for Business – Advanced
This tier includes all features in the Select package but adds enhanced security and management capabilities, particularly for organizations with complex IT environments.
Key Features (in addition to Select):
- Data Encryption: Encrypts files, folders, and disks to protect sensitive data in case of loss or theft.
- Application Control: Whitelisting, blacklisting, and dynamic default deny to manage applications and prevent unauthorized software from running.
- Patch Management: Identifies and automatically updates vulnerable software across your IT environment.
- Granular Administration Tools: Allows more precise configuration and management of security policies.
- Advanced Threat Detection: Identifies more sophisticated threats through heuristic and behavioral technologies.
Comparison Summary
Feature | Select | Advanced |
---|---|---|
Anti-Malware | ✅ | ✅ |
Device and Web Control | ✅ | ✅ |
Firewall & Network Threat Protection | ✅ | ✅ |
Mobile Device Management | ✅ | ✅ |
File Encryption | ❌ | ✅ |
Application Control | ❌ | ✅ |
Patch Management | ❌ | ✅ |
Licensing and Deployment
Both solutions are available via flexible licensing plans and can be deployed on Windows, macOS, Linux, Android, and iOS devices. They also integrate seamlessly with existing IT infrastructure, including Active Directory and third-party systems.