Antivirus Protection & Internet Security Software
- Ceská republika
- Slovenská republika
- Greece (Ελλάδα)
visit our Global Website
Not all Windows workstation security solutions are equal – and that means a lot of products are letting more of the most dangerous malware and attacks slip through onto the corporate IT networks they’re meant to be protecting.
By combining class-leading security technologies, plus endpoint controls and data encryption – in one integrated solution – Kaspersky Endpoint Security for Windows (for workstations) does more to protect your laptops and desktops. With all functions accessible from one centralized management console, you can also save time on deployment and administration tasks.
Whereas some other products require you to purchase multiple applications – each with a different management console – Kaspersky Endpoint Security for Windows is a single application that delivers a host of security technologies:
Kaspersky Endpoint Security for Windows (for workstations) is included within our range of integrated security solutions for business:
When your security requirements change, it’s easy to upgrade to the next tier of Kaspersky Endpoint Security for Business or to Kaspersky Total Security for Business. You simply use a new license key to access the additional functionality that your new tier provides.
Our latest anti-malware engine combines signature-based protection, heuristic and behavioral analysis plus cloud-assisted technologies – to protect your Windows workstations from known, unknown and advanced malware threats.
Pattern-based detection technology improves detection rates and helps us to reduce the size of update files – so you benefit from superior security that consumes less of your communications bandwidth.
Millions of consenting customers and thousands of businesses let the cloud-based Kaspersky Security Network (KSN) receive data – about malware and suspicious behavior – from their computers. This real-time flow of data helps us to deliver an extremely rapid response to new malware – while also achieving a lower rate of 'false positives'.
By detecting and analyzing suspicious behavior on your workstations, System Watcher technology helps to protect you against new threats that have not yet been added to our signature database. If a malware attack affects the operating system, the system registry or important file types, System Watcher’s activity tracking helps to roll back the changes caused by the attack.
Our innovative Automatic Exploit Prevention (AEP) technology helps to ensure malware can’t exploit vulnerabilities within the operating systems or applications that are running on your network. AEP specifically monitors the most frequently targeted applications – including Adobe Reader, Internet Explorer, Microsoft Office, Java and many more – to deliver an extra layer of security monitoring and protection against unknown threats.
For some applications – even though the applications may not be classed as malicious – their activities may be regarded as high-risk. In many cases, it’s advisable that these activities are restricted. Our Host-Based Intrusion Prevention System (HIPS) restricts activities within the endpoint, according to the ‘trust level’ that has been assigned to the application. HIPS works together with our application-level Personal Firewall – which restricts applications’ network activity.
Our Network Attack Blocker monitors suspicious activity on your network – and lets you pre-define how your systems will respond if any suspicious behavior is detected.
Our Application Control tools go much further than many other vendors’ offerings. We’re the only security vendor that has invested in establishing its own Whitelisting Lab that checks applications for security risks. Our database of whitelisted applications includes over 1.3 billion unique files – and it’s growing by a further 1 million files per day. Application Control and Dynamic Whitelisting makes it easier for you to run a Default Deny policy that blocks all applications, unless they’re on your whitelist. Furthermore, if you’re looking to introduce or update a Default Deny policy, our new test mode lets you set up the policy in a test environment – so you can check your policy is correctly configured, before you ‘go live’.
Device Control tools make it easy to manage which devices are allowed to access your corporate IT network. You can set up controls that are based on the time of day, geographic location or the type of device. You can also align the controls with Active Directory – for granular administration and policy assignment. Administrators can also use masks in the creation of Device Control rules – so multiple devices can easily be whitelisted for use.
Our Web Control tools let you set up Internet access policies and monitor Internet usage. Geographic and time-of-day controls may be aligned with Active Directory – to help in administration and setting policies.
By using an AES encryption algorithm that has 256 bits of key length and is NIST approved (#2980), we deliver strong encryption for your confidential information. If files or systems are lost or stolen, unauthorized users will not be able to access your encrypted data. Our encryption has also been designed to be FIPS 140-2 compliant (validation pending).
For encryption that's 'close to the hardware' – and to make it easy for you to run an 'encrypt everything at once' strategy – Full Disk Encryption (FDE) operates on the physical sectors of the disk. Before a hard disk encryption task is allowed to proceed, the boot hard drive is automatically checked to ensure it is compatible with Kaspersky Endpoint Security for Windows.
File-Level Encryption (FLE) helps you to enable secure sharing of data across your network. For additional security – when a file is encrypted – the original, unencrypted file can be wiped from the hard drive.
To protect data that also needs to be transferred on removable devices, Removable Media Encryption can perform Full Disk Encryption and File-Level Encryption.
If you need to transfer sensitive data via email, the Internet or a removable device, you can easily set up password-protected, encrypted, self-extracting packages of files and folders. A special 'portable mode', for File-Level Encryption on removable media, helps enable the secure transfer of data – even onto computers that are not running Kaspersky Endpoint Security for Windows.
When a user switches on their PC and enters their username and password, our Single Sign-On feature will give the user immediate access to the encrypted data on their PC's hard drive. This helps to ensure the encryption & decryption processes are virtually transparent to the user – and that helps to boost efficiency and productivity.
Users can also log on by using a smartcard or token – instead of a username and password. Many popular types of smartcards and tokens are supported.
In the event of a system fault – even if the operating system cannot boot up – our special recovery tools can be used to decrypt the data.
By supporting Intel AES-NI, we enable more rapid encryption and decryption of data – for many Intel processor-based and AMD processor-based systems*. Our Full Disk Encryption technology also supports UEFI-based platforms. There’s also support for non-QWERTY keyboards.
*Not all processors are supported.
Every feature within Kaspersky Endpoint Security for Windows – plus other Kaspersky Lab endpoint security technologies that you’re running – can be managed via one centralized management console. Kaspersky Security Center provides a single easy-to-use console – so you won’t have to waste time getting to grips with a different management interface for every different security technology you need to run. Instead, this one console gives you ‘single pane of glass’ visibility and control of your endpoint security – including:
In addition, the new Role-Based Access Control* (RBAC) feature makes it easier to divide security management responsibilities between multiple administrators. With RBAC, the Kaspersky Security Center console can easily be customized so that each administrator only has access to the tools and information that are relevant to their responsibilities.
*Role-Based Access Control is only included in Kaspersky Endpoint Security for Business | Advanced and Kaspersky Total Security for Business.
For more information on Kaspersky Security Center, please click here.
With signature-based security technologies, heuristic and behavioral analysis plus cloud-assisted detection, Kaspersky Endpoint Security for Windows delivers award-winning, business-grade security. It provides protection against known, unknown and advanced threats.
Integrated Application Control, Web Control and Device Control technologies make it easy for you to:
*Application Control, Web Control and Device Control are only included in Kaspersky Endpoint Security for Business | Select, Kaspersky Endpoint Security for Business | Advanced and Kaspersky Total Security for Business.
Flexible data encryption functionality lets you encrypt individual files and / or entire hard disks. To protect data that also needs to be transferred on removable devices, Removable Media Encryption can perform Full Disk Encryption and File-Level Encryption. When your data is encrypted, if any of your corporate files or systems are lost or stolen, unauthorized users will find that your confidential information is in an unreadable form.
*Data encryption is only included in Kaspersky Endpoint Security for Business | Advanced and Kaspersky Total Security for Business.
Because all of our security solutions are architected 'from the ground up', each application – and every function – is tightly integrated. That way, you benefit from world-class security that makes efficient use of your computing resources. In addition, the latest release of Windows Endpoint Security for Windows is 30% smaller than the previous release – so installation also uses fewer resources.
All security, endpoint controls and data encryption functions can be set up and controlled via our integrated management console – Kaspersky Security Center. Centralized management of deployment, policies, administration and reporting helps to cut through complexity and reduce the time you need to spend on managing your IT security.
Role-Based Access Control* helps you to divide security management responsibilities between multiple administrators. For example, you may want one administrator to control and manage security for laptops and desktops, while another administrator takes care of security across all mobile devices and virtual machines. The Kaspersky Security Center console can easily be customized so that each administrator only has access to the tools and information that are relevant to their responsibilities.
*Role-Based Access Control (RBAC) is only included in Kaspersky Endpoint Security for Business | Advanced and Kaspersky Total Security for Business.
In addition to protecting your desktops and laptops, Kaspersky Endpoint Security for Windows can also safeguard your Windows file servers* – via our anti-malware, firewall & Host-Based Intrusion Prevention System (HIPS) technologies. For more information, please click here.
*Kaspersky Endpoint Security for Windows (for file servers) is not included in Kaspersky Endpoint Security for Business | Core.
Kaspersky Endpoint Security for Windows (for workstations) is included in:
To download your FREE trial of Kaspersky Total Security for Business – or Kaspersky Endpoint Security for Business – please click here.
If you’re currently running Kaspersky Open Space Security, please click here for information on how to upgrade.