kaspersky+endpoint+security+8+for+windows

上传人:j7****6 文档编号:62239054 上传时间:2018-12-18 格式:PPT 页数:31 大小:12.16MB
返回 下载 相关 举报
kaspersky+endpoint+security+8+for+windows_第1页
第1页 / 共31页
kaspersky+endpoint+security+8+for+windows_第2页
第2页 / 共31页
kaspersky+endpoint+security+8+for+windows_第3页
第3页 / 共31页
kaspersky+endpoint+security+8+for+windows_第4页
第4页 / 共31页
kaspersky+endpoint+security+8+for+windows_第5页
第5页 / 共31页
点击查看更多>>
资源描述

《kaspersky+endpoint+security+8+for+windows》由会员分享,可在线阅读,更多相关《kaspersky+endpoint+security+8+for+windows(31页珍藏版)》请在金锄头文库上搜索。

1、Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center 9.0,Release version,Corporate Products,2,Kaspersky Managed Security Services,Kaspersky Infrastructure Security,Kaspersky Messaging and Web Security,Kaspersky Endpoint Security,Kaspersky Mobile Security,Market overview,Kaspersky

2、moves E8,Changing the vector of protection,“Endpoint security has always been the final line of defense against malware and other threatsThese solutions are now a primary line of defense as employees become more mobile.” IDC, 2010,Market drivers,Facts and predictions,For today: Data Security - top p

3、riority Managing vulnerabilities and complex threats has risen in importance Security controls swinging back to the endpoint Application security remains an area of underinvestment.,Product Features and Benefits,Deeper protection technologies,Kaspersky Endpoint Security 8,Product Messaging,Kaspersky

4、 Labs leverages its relentless expertise to deliver intelligent hybrid security technologies with the deepest anti-malware protection, easy and efficient deployment and management, and robust reporting and controls to secure your business and improve IT productivity Kaspersky provides: Deeper protec

5、tion technologies Comprehensive manageability Elegant Architecture,Kaspersky Endpoint Security 8,Highlights,Enhanced protection from the latest threats,Enhanced intelligence from the “Cloud”,Greater control of devices and applications,Apply and manage web browsing policies,User and management interf

6、ace improvements,Easier review of security status,Kaspersky Endpoint Security 8,Protection,Advantage,Improved! real-time protection of computers from infection by checking files, email or mail protocols, web traffic, files and links transferred via IM applications. Integration with KSN for getting i

7、nformation on file and URL reputation,Benefits,Provide better detection of malicious files and lower signature update size, instant reaction to new threats with minimal impact on system performance,Protection Protection,Cloud-based,Signature-based,Proactive,Network,NEW! Integration with Kaspersky La

8、bs cloud-based threat identification engine (KSN) associates malware and other suspicious activity with information derived from Kasperskys most current reputation and categorization database,Provides faster reaction to new and unknown threats, allows application launch policies to be flexibly manag

9、ed at the company level, preventing the launch of potentially,NEW! The new System Watcher technology monitors program activity in the system The rollback of malicious activity is performed automatically, depending on product settings,Kaspersky provides proactive protection methods that analyze a pro

10、gram as it is launched and block it if any suspicious behavior is detected,Improved! Firewall for endpoint and servers and Intrusion Detection System (IDS) provides better protection from unsafe network activities,Protects endpoints from network threats and network attacks,Kaspersky Endpoint Securit

11、y 8,Protect : Core Technologies,Behaviour Streaming Signatures BSS works in conjunction with the traditional signature scanning techniques to identify the latest malware, through the behaviour of applications,Kaspersky Security Network Intelligence provided from the KSN, such as from the Urgent Dete

12、ction System, delivers accurate detection with faster threat response times,Pattern Based Signatures Provide better detection of malicious files and lower signature update size,Intrusion Detection System Protects computers by tracking network activity typical of network attacks and if it detects an

13、attempted attack, it responds according to predefined actions.,Kaspersky Endpoint Security 8,Endpoint Control: Problem Statement,Power Tech Corp: 2500 Users The organization needs to protect their infrastructure from access by unauthorized physical devices and applications. In addition, organization

14、 has acceptable usage policies which cover users online behaviour which need to be applied. The organization requires: Only authorized devices are permitted to connect to the endpoint Control of end user applications and resource access Restriction of end user access to web content based on set crit

15、eria,PowerTech,Kaspersky Endpoint Security 8,Control : Device control,Control access to USB storage & devices,Allows blocking of devices with no granularity (user & device) Allows disablement of “Autorun” Monitor and restrict data copied to removable storage devices and media to keep it from leaving

16、 company control,Secure business from external and internal threats posed by users and devices,Kaspersky Endpoint Security 8,Control : Application control,Control applications to run based on security policies,KES 8.0 for Windows Application control allows to monitor compliance of internal policy with application usage policies and standards,Secure business from external and internal threats posed by users and devices,Kaspersky Endpoint Security 8,Control : Application Startup

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 生活休闲 > 社会民生

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号