page 2 the need for new levels of protection business
play

PAGE 2 The Need for New Levels of Protection Business Drivers - PowerPoint PPT Presentation

Kaspersky Endpoint Security 8 Control Technologies PAGE 1 Youre in c ontrol. Youre in the drivers seat. . Applications Devices Web content filtering PAGE 2 The Need for New Levels of Protection Business Drivers Greater Increased


  1. Kaspersky Endpoint Security 8 Control Technologies PAGE 1

  2. You’re in c ontrol. You’re in the driver’s seat. . Applications Devices Web content filtering PAGE 2

  3. The Need for New Levels of Protection Business Drivers Greater Increased Higher Efficiency Agility Productivity Reduced Improved IT Competitiveness Costs Control PAGE 3

  4. IT Faces the ‘ Change’ Reaction Business Change Produces IT Security Challenges • Efficiency • Flexibility and Agility • Reduce Costs - OPEX • Consolidation Business • Mobility and ‘Me Time’ • Virtualization • Mobile Devices • Consumerisation and Social Media Technology • Cloud Services • Malware • Diverse Platform Support • Hacking/Email/Phishing Security • Poor Social Media Security PAGE 4

  5. The Growing Malware Threat From 1 every MINUTE to 1 every SECOND 125k Signatures New Threats Every Day 5,000,000 67m 4,000,000 Malware in Kaspersky Lab Database Jan 2012 3,000,000 Malware in Kaspersky Lab Database Jan 2011 50m 2,000,000 1 Malware from downloads 1,000,000 in14 1999 2001 2003 2005 2007 2009 2011 PAGE 5

  6. The Growing Malware Threat From 1 every MINUTE to 1 every SECOND “ Cyber-gangs are definitely expanding their sights and ” targeting B2B. Roel el Schouwenbe houwenberg Senior Researcher, Kaspersky Lab PAGE 6

  7. Today’s Real Challenges The High Cost of Inadequate Protection 91% Experienced at least one IT security intrusion 70% State their IT department is under-resourced Have experienced viruses, worms, spyware and other malware 61% Social Networking is seen as the biggest threat to IT security #1 Source - 2011 Global IT Security Risks Survey, Kaspersky Lab PAGE 7

  8. Kaspersky Endpoint Security 8 Protect and Control Superior, Intelligent Protection Comprehensive, Flexible Control Significantly Reducing Business Improving Business Efficiency and Risks Productivity Always Ahead of New Threats Enhancing IT Flexibility PAGE 8

  9. Elegant Architecture Fully Integrated from the Ground Up Device Control System Best of Breed Watcher Anti-Malware Technology Application Control Web Control Kaspersky Security Firewall Network (KSN) PAGE 9

  10. Kaspersky Security Network (KSN) Immediate Protection Billions of Records Uniquely ‘Aware’ Cloud Kaspersky Urgent Detection System Security Network Your Office Kaspersky Global Users PAGE 10

  11. Application Control with Dynamic Whitelisting Kaspersky’s Exclusive Approach Strict Policy Enforcement for Deeper Classify Control Protection Enforce Inspect PAGE 11

  12. Kaspersky Dynamic Whitelisting Over 500 million unique clean files in the database Dedicated whitelisting lab Whitelist infrastructure (~ 1 million files per day) Based on technologies developed for 4 generations of our consumer products PAGE 12

  13. Kaspersky Whitelisting Global Partnerships Over 200 ISV official partners PAGE 13

  14. Efficiency proved by 1 st Whitelisting Test West Coast Labs We know almost all software ever released in the world! Source – Kaspersky Application Control and Default Deny using Whitelisting Comparative Test Report, West Coast Labs PAGE 14

  15. Application Control and Default Deny Test Results West Coast Labs Blocks all programmes except those that have specifically been allowed Source – Kaspersky Application Control and Default Deny using Whitelisting Comparative Test Report, West Coast Labs PAGE 15

  16. Device Control Deep Granular Control Over Devices Controls device access privileges at the bus, type and device level White list categories down to serial number granularity Allows the creation of flexible policy scenarios to institute any access privilege policy Hardware Inventory function provides network-wide endpoint accounting Read/Write Connection Time of Day Device Type Unique ID Privileges Bus Type PAGE 16

  17. Web Control Effective Productivity, Protection & Policy Enforcement Filtering of web resources by URL, content and data type regardless of workstation location Administrative control to grant permission, prohibit, or limit access Conducts audits of user access to certain website categories Granular and flexible rules with time-based access/deny scheduling on a group or user level Adult Sites Games Kaspersky & Security Network Gambling Social Media Restrict specific Create specific Powered by sites, web pages or rules and Kaspersky Security complete categories schedules Network PAGE 17

  18. Kaspersky Security Center Unified Management Console Impressive Centralised Security Controls at Single Screen Monitoring Granular Levels Deployment Inclusive One Application, One Console Protection Policy Setting Administration Integrated Seamless Integration with Vulnerability Scanning Kaspersky Endpoint Security Virtual Awareness Intuitive No Training Required Reporting PAGE 18

  19. Summary Simplified Device Application Web Management Control Control Filtering Restrict Access to Unified Under a Block Unauthorised Block Unauthorised Single-Pane Applications Unauthorised Sites Hardware Solid Policy Classify, Control , Block Specific Manage Connection Enforcement Enforce and Inspect Content Types Interfaces Intuitive Interface and Apply Granular Rules for Block Unauthorised Create List of Trusted Robust Reporting Whitelisting/ Blacklisting Downloads Devices Physical, Virtual and Regularly Updated Pre-configured Tailor Devices Rules to Categories Mobile Environments Classifications Groups or Users PAGE 19

  20. Be Ready for What’s Next Malware detection, web content filtering, device and application control are all features of Kaspersky Endpoint Security 8. You’re in control. You’re in the driver’s seat. Kaspersky.com/beready PAGE 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend