《kaspersky+endpoint+security+8+for+windows》由会员分享,可在线阅读,更多相关《kaspersky+endpoint+security+8+for+windows(31页珍藏版)》请在金锄头文库上搜索。
1、Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center 9.0,Release version,Corporate Products,2,Kaspersky Managed Security Services,Kaspersky Infrastructure Security,Kaspersky Messaging and Web Security,Kaspersky Endpoint Security,Kaspersky Mobile Security,Market overview,Kaspersky
2、moves E8,Changing the vector of protection,“Endpoint security has always been the final line of defense against malware and other threatsThese solutions are now a primary line of defense as employees become more mobile.” IDC, 2010,Market drivers,Facts and predictions,For today: Data Security - top p
3、riority Managing vulnerabilities and complex threats has risen in importance Security controls swinging back to the endpoint Application security remains an area of underinvestment.,Product Features and Benefits,Deeper protection technologies,Kaspersky Endpoint Security 8,Product Messaging,Kaspersky
4、 Labs leverages its relentless expertise to deliver intelligent hybrid security technologies with the deepest anti-malware protection, easy and efficient deployment and management, and robust reporting and controls to secure your business and improve IT productivity Kaspersky provides: Deeper protec
5、tion technologies Comprehensive manageability Elegant Architecture,Kaspersky Endpoint Security 8,Highlights,Enhanced protection from the latest threats,Enhanced intelligence from the “Cloud”,Greater control of devices and applications,Apply and manage web browsing policies,User and management interf
6、ace improvements,Easier review of security status,Kaspersky Endpoint Security 8,Protection,Advantage,Improved! real-time protection of computers from infection by checking files, email or mail protocols, web traffic, files and links transferred via IM applications. Integration with KSN for getting i
7、nformation on file and URL reputation,Benefits,Provide better detection of malicious files and lower signature update size, instant reaction to new threats with minimal impact on system performance,Protection Protection,Cloud-based,Signature-based,Proactive,Network,NEW! Integration with Kaspersky La
8、bs cloud-based threat identification engine (KSN) associates malware and other suspicious activity with information derived from Kasperskys most current reputation and categorization database,Provides faster reaction to new and unknown threats, allows application launch policies to be flexibly manag
9、ed at the company level, preventing the launch of potentially,NEW! The new System Watcher technology monitors program activity in the system The rollback of malicious activity is performed automatically, depending on product settings,Kaspersky provides proactive protection methods that analyze a pro
10、gram as it is launched and block it if any suspicious behavior is detected,Improved! Firewall for endpoint and servers and Intrusion Detection System (IDS) provides better protection from unsafe network activities,Protects endpoints from network threats and network attacks,Kaspersky Endpoint Securit
11、y 8,Protect : Core Technologies,Behaviour Streaming Signatures BSS works in conjunction with the traditional signature scanning techniques to identify the latest malware, through the behaviour of applications,Kaspersky Security Network Intelligence provided from the KSN, such as from the Urgent Dete
12、ction System, delivers accurate detection with faster threat response times,Pattern Based Signatures Provide better detection of malicious files and lower signature update size,Intrusion Detection System Protects computers by tracking network activity typical of network attacks and if it detects an
13、attempted attack, it responds according to predefined actions.,Kaspersky Endpoint Security 8,Endpoint Control: Problem Statement,Power Tech Corp: 2500 Users The organization needs to protect their infrastructure from access by unauthorized physical devices and applications. In addition, organization
14、 has acceptable usage policies which cover users online behaviour which need to be applied. The organization requires: Only authorized devices are permitted to connect to the endpoint Control of end user applications and resource access Restriction of end user access to web content based on set crit
15、eria,PowerTech,Kaspersky Endpoint Security 8,Control : Device control,Control access to USB storage & devices,Allows blocking of devices with no granularity (user & device) Allows disablement of “Autorun” Monitor and restrict data copied to removable storage devices and media to keep it from leaving
16、 company control,Secure business from external and internal threats posed by users and devices,Kaspersky Endpoint Security 8,Control : Application control,Control applications to run based on security policies,KES 8.0 for Windows Application control allows to monitor compliance of internal policy with application usage policies and standards,Secure business from external and internal threats posed by users and devices,Kaspersky Endpoint Security 8,Control : Application Startup