Kaspersky Endpoint Security Reviews & Details

Are you from this Company ?
KASPERSKY LAB
Online
Moscow, Russia
1997
$500MN to $1BN
Enterprise
89 Likes
70 Buyers are Negotiating "Group Buyer Deal"

KASPERSKY LAB USP

Kaspersky Endpoint Protection solutions do no require any additional server or software deployment costs. The solution provides protection for any endpoint and it offers quick protection with predefined security policies. The solution also saves time by automating OS and software deployment tasks. It streamlines security management fucntion with the help of unified web console. Request KASPERSKY LAB Pricing to get more information.

Summary

Kaspersky Endpoint Security Cloud is developed specifically for small and medium sized businesses and it offers excellent protection against known and unknown threats, that may include cryptors, ransomware and other attacks. Kaspersky Endpoint Security for Business provides an adaptive, well structured security solution that is fully scalable with the business. Kaspersky Endpoint Security for Business Advanced provides the best Patch Management feature. It allows organizations to minimize security vulnerabilities, while encryption allows them to avoid their data being accessed by cybercriminals.

Discussions

1
Add Requirements
Added Requirements
“I am looking for a Endpoint Security Solutions in north America. My budget is $50,000. Looking to buy in 15 days.”
2
Select Vendors
KASPERSKY LAB
70 Buyers Negotiating
3
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
Strengths
  • +13
    Cloud
  • +12
    On-Premises
  • +8
    Android
  • +6
    Installed
  • +7
    iOS
  • +5
    Web-Based
  • +13
    Education & Certification
  • +14
    Free Downloads
  • +12
    Renewals & Registration
  • +10
    Technical Support
  • +11
    Virus & Threat Help
  • +8
    Business
  • +9
    Enterprise
  • +11
    $ per license
  • +10
    $ per Month/Yearly
  • +9
    Automated Malware Removal
  • +12
    Block targeted attacks
  • +11
    Root Cause Analysis
  • +10
    Synchronized Security Heartbeat
  • +6
    Control File Integrity
Weaknesses
  • -5
    Active Adversary Mitigations
  • -7
    Disk and Boot Record Protection (WipeGuard)
  • -14
    Malicious Traffic Detection (MTD)
  • -8
    Man-in-the-Browser Protection (Safe Browsing)
  • -6
    Ransomware File Protection (CryptoGuard)
  • -6
    Anti-Malware File Scanning
  • -13
    Application Control
  • -14
    Client Firewal
  • -5
    Deep Learning malware detection
  • -12
    Exploit Prevention
  • -7
    Live Protection
  • -12
    Peripheral Control (e.g. USB)
  • -9
    Potentially Unwanted Application (PUA) Blocking
  • -8
    Pre-execution Behavior Analysis (HIPS)
  • -11
    Prevent data breaches
  • -10
    Stop fileless attacks
  • -11
    Web Control / Category-based URL Blocking
  • -10
    Web Security
  • -14
    Hybrid
  • -5
    Free Clean-up Tools
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error

360Quadrants