Endpoint Security for Business - Select Platform

Kaspersky lab - Endpoint Security for Business - Select

Kaspersky’s ‘Select’ tier includes mobile device deployment and protection via Mobile Device Management (MDM) and mobile anti-malware. Endpoint control tools (web, device and application) help your organization enforce IT policy, keeping the essential elements of your IT environment secure.

The Protection and Management Capabilities You Need.

Kaspersky has built powerful enterprise-class features into the progressive tiers of our off erings, but we’ve made the technology uncomplicated and simple enough for any sized business.

Select Chart


Powerful Endpoint Anti-Malware

Kaspersky’s ‘best of breed’ scanning engine operates at multiple levels in the operating system, rooting out malware. The cloud-based Kaspersky Security Network (KSN) protects users in real time against new threats.

Flexible, Granular Control Tools

A cloud-based, categorized database of safe and unsafe applications and websites helps the administrator to set and enforce policies for applications and web surfi ng, while granular controls ensure that only specifi c devices can plug in to machines on the network.

Efficeint Mobile Deployment and Security for Smartphones and Tablets

Agent-based mobile security is available for Android™, BlackBerry®, Symbian and Windows® Mobile devices. Mobile device policies and software can be securely deployed over the air to these and to iOS devices through Kaspersky MDM.

Vulnerability Scanner

Tuned to flag hardware and software vulnerabilities which could be exposed to an attack.


Frequent Updates and Signature Based Protection

Industry-proven traditional signature-based method for detecting malware threats

Behavioral Analysis Performed By System Watcher

Delivers proactive protection against threats that have not yet been recorded in signature databases.

Cloud Assisted Protection

The Kaspersky Security Network (KSN) provides a response to suspected threats, much faster than traditional methods of protection. KSN's response time to a malware threat can be as little as 0.02 seconds!

Host Based Intrusion Prevention System (HIPS) With Personal Firewall

Predefi ned rules for hundreds of the most commonly used applications reduce time spent on confi guring the fi rewall.


Application Control

Enables IT administrators to set policies that allow, block or regulate applications (or application categories).

Web Control

Means that endpoint-based surfi ng controls follow the user — whether on the corporate network or roaming.

Device Control

Allows users to set, schedule and enforce data policies with removable storage and other peripheral device controls — connected to USB or any other bus type.

Dynamic Whitelisting

Real-time fi le reputations delivered by the Kaspersky Security Network ensure your approved applications are malware free and help maximize user productivity


Innovative Anti-Malware Technologies

Combined signature-based, proactive and cloud-assisted detection results in real-time protection. A safe browser and anti-spam increase the security.

Deployment With Over The Air (OTA) Provisioning

The ability to pre-confi gure and deploy applications centrally using SMS, email and PC.

Remote Anti-Theft Tools

SIM-Watch, Remote Lock, Wipe and Find all prevent unauthorized access to corporate data if a mobile device is lost or stolen.

Application Control for Mobile Devices

Monitors applications installed on a mobile device according to the pre-defined group policies. Includes a "Mandatory Application" group.

Support for Employee Owned Devices

Corporate data and applications are isolated in encrypted containers which are transparent to the user. This data can be wiped seperately.


One Management Console

From one ‘single pane of glass’, the administrator can view and manage the entire security scene — virtual machines, physical and mobile devices alike.

One Security Platform

Kaspersky Lab developed our console, security modules and tools in-house rather than acquiring them from other companies. This means the same programmers working from the same codebase have developed technologies that talk together and work together. The result is stability, integrated policies, useful reporting and intuitive tools

One Cost

All tools are from one vendor, delivered in one installation — so you don’t have to go through a new budgeting and justifi cation process to bring your security risks in line with your business objectives.

To learn more, contact an account manager at 1-800-800-0014.