Kaspersky Endpoint Security for Business - Select Middle East Edition. 250-499 Node 2 year Public Sector License
-
Warranty:No Warranty
-
Condition: New
- Shipping: Ready Stock
With more of your business operations going digital, you need to protect every server, laptop and mobile device on your network. Select tier combines multi-layered technologies with flexible cloud management and centralized application, web and device controls to protect your sensitive data on every endpoint.
- Protects against the latest security threats, including fileless threats
- Reduces your exposure to cyberattacks with endpoint hardening
- Helps boost productivity and keeps employees safe with cloud-enabled controls
- Protects servers and endpoints without damaging performance
- Secures diverse environments – PC, Mac, Linux, iOS & Android
- Simplifies security management with a unified console
-
Performance & multi-layered protection
Security shouldn’t slow you down. That’s why our security has minimal impact on system performance. And if you’re attacked, Automatic Rollback undoes most malicious actions, so users can keep on working.
-
Agile protection technologies
Delivering world-class security – including post execution Behavior Detection and Machine Learning technologies – to help reduce your attack risk and keep all your endpoints safe and secure, with less need to download frequent updates.
-
‘Best of both worlds’ management console
In the cloud, on-premises or both? You decide - and we’ll provide unified management via the cloud console or traditional console deployment on-premises, in AWS or Azure cloud environments. Deploy security and policies rapidly and with minimum hassle, using any of our wide range of preconfigured scenarios.
-
Straightforward migration
Provides straightforward migration from third-party endpoint protection, helping ensure a smooth error-free transition. Our post-deployment quality assurance audit service is on hand to ensure optimum configuration.
The smart choice for security
-
Security tailored to your environmentScales easily, providing the freedom to change any pre-defined settings and to choose when to adopt additional functionality. So you get security that adapts to protect you from new threats whether your IT is on-site or outsourced.
-
Keep tight control of your costsMultiple security technologies, including mobile threat defense, in a single product. One product - and one unified license - is all you need.
-
Benefit from innovation and integrationWith around 900 patents under our belt, we’re one of only six worldwide IT corporations recognized as Derwent Top 100 Global Innovators. All our core technologies are developed in-house – and all delivered through a single agent – for efficient, integrated protection.
-
Customer satisfaction assured - we do more to protectDon’t just take our word for it. Over the years, our products have participated in more customer surveys and independent tests – and achieved more first place positions - than any other vendor.
Find the security solution you need
Select the security option that fits your needs – and, when you want to add more functionality, just upgrade to the next tier of protection.
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Security policy adviser
Security policy adviser
Security policy adviser
EDR agent
EDR agent
EDR agent
Application Control for PCs
Application Control for PCs
Application Control for PCs
Device and Web Controls
Device and Web Controls
Device and Web Controls
Role-based access control1
Role-based access control1
Role-based access control1
Adaptive Anomaly Control
Adaptive Anomaly Control
Adaptive Anomaly Control
Encryption management
Encryption management
Encryption management
Vulnerability and Patch management
Vulnerability and Patch management
Vulnerability and Patch management
OS & 3rd party software installation
OS & 3rd party software installation
OS & 3rd party software installation
Application Control for servers
Application Control for servers
Application Control for servers
Security for web gateways
Security for web gateways
Security for web gateways
Security for email servers
Security for email servers
Security for email servers