Windows Server Enterprise Edition Antivirus

 

Modern corporate networks are complex systems that typically consist of terminal servers, server clusters and other types of nodes.

Infrastructure like this demands the highest levels of protection, with file servers requiring dedicated software that won’t just protect data from the latest malware, but will also provide uninterrupted performance under the heaviest load conditions with minimal effect on network efficiency. Kaspersky Anti-Virus for Windows Servers Enterprise Edition has been developed specifically for networks like this, making it easy to protect your most valuable business resources today and in the future.

In modern heterogeneous networks, a single virus can spread very quickly as it is virtually impossible to isolate a newly detected network infection immediately. Corporate users often place various files into file storages, thus exposing all nodes on the corporate network to risk, from workstations to shared file storage facilities.

 
  • Best-of-breed anti-malware protection
    Kaspersky Endpoint Security for Windows combines signature-based, proactive defense technologies plus the power of the cloud-assisted Kaspersky Security Network. The application intelligently scans workstations and servers, and analyzes system and application behaviors. Because the Kaspersky architecture is tightly integrated, all program components work together to help maximize protection and minimize the use of computing resources.
  • Flexible, centralized administration
    Kaspersky Security Center lets you remotely install the solution on workstations and servers, set protection parameters, manage anti-malware updates, monitor security status, and respond to events. The application also includes features for centralized vulnerability flagging, virtual machine support, and sub-administration capabilities.
  • Proactive technologies and heuristics
    System Watcher is just one of the application’s proactive components that deliver protection against unknown threats. Using Behavior Streams Signature patterns, the application analyzes suspicious behaviors and takes immediate action. If necessary, unwanted changes can be rolled-back and damaged data can be restored.