Kaspersky Lab Total Security f/Business, 25-49u, 3Y, GOV KL4869XAPTC Manuale Utente

Codici prodotto
KL4869XAPTC
Pagina di 4
mAIl, CollABoRATIoN ANd WEB SECURITY:
Mail Server PrOteCtiOn
Protects mail on the latest versions of major mail and 
collaboration platforms: Microsoft
®
 Exchange, IBM
®
, Lotus
®
 
Domino
®
 and Linux
®
-based mail servers.
SeCurity fOr internet GatewayS
Ensures secure Internet access across the organization by 
automatically removing malicious and potentially hostile programs 
in HTTP(S) / FTP / SMTP and POP3 traffic.
virtual eliMinatiOn Of SPaM
Using Kaspersky’s cloud-based technology, updates are pushed 
immediately — reducing spam’s ability to become an epidemic. 
Suspected emails are held and re-checked, which increases the 
capture rate — and reduces false positives. 
COllabOratiOn SeCurity
Kaspersky defends your SharePoint
®
 servers against malware, 
while content and file filtering capabilities help prevent the storage 
of inappropriate content.
ENCRYPTIoN ANd dATA PRoTECTIoN:
COMPrehenSive enCryPtiOn
Choose from full-disk or file level, backed by Advanced Encryption 
Standard (AES) with 256 bit encryption to secure critical business 
information in the event of device theft or loss.
SuPPOrt fOr reMOvable DeviCeS
Increases your security through policies that enforce the 
encryption of data on removable devices.
SeCure Data SharinG
Means users can easily create encrypted and self-extracting 
packages to ensure data is protected when sharing via removable 
devices, email, network or web.
tranSParenCy fOr enD-uSerS
Kaspersky’s encryption solution is seamless and invisible to 
users, and has no adverse impact on productivity. No impact on 
application settings or updates, either.
SYSTEmS CoNFIgURATIoN ANd PATCh mANAgEmENT:
PatCh ManaGeMent
Advanced in-depth scanning for vulnerabilities combined with the 
automated distribution of patches.
reMOte DePlOyMent Of SOftware
Central deployment of software to client machines, even to 
branch offices.
netwOrk aDMiSSiOn COntrOl (naC)
With Network Admission Control (NAC), you can create a network 
‘guest’ policy. Guest devices (including mobile devices) are 
automatically recognized and sent to a corporate portal where the 
correct identification password enables them to use the resources 
you’ve approved.
OPeratinG SySteM anD aPPliCatiOn iMaGe DePlOyMent 
Easy creation, storage and deployment of system images from a 
central location. Perfect for a migration to Microsoft
®
 Windows
®
 8.
harDware, SOftware anD liCenSe ManaGeMent
Hardware and software inventory reports help keep control over 
software license obligations. So you can save on costs by centrally 
provisioning software rights.
ENdPoINT CoNTRolS:
aPPliCatiOn COntrOl
Enables IT administrators to set policies that allow, block or 
regulate applications (or application categories). 
DeviCe COntrOl  
Allows users to set, schedule and enforce data policies with 
removable storage and other peripheral device controls — 
connected to USB or any other bus type.
web COntrOl
Means that endpoint-based surfing controls follow the user — 
whether on the corporate network or roaming.
DynaMiC whiteliStinG
Real-time file reputations delivered by the Kaspersky Security 
Network ensure your approved applications are malware free and 
help maximize user productivity.
moBIlE SECURITY FEATURES:
innOvative anti-Malware teChnOlOGieS
Combined signature-based, proactive and cloud-assisted 
detection results in real-time protection. A safe browser and anti-
spam increase the security. 
SuPPOrt fOr eMPlOyee OwneD DeviCeS
BYOD initiative? Corporate data and applications are isolated in 
encrypted containers which are transparent to the user. This data 
can be wiped separately.
DePlOyMent with Over the air (Ota) PrOviSiOninG  
Preconfigure and deploy applications centrally using SMS, email 
and PC.
reMOte anti-theft tOOlS
SIM-Watch, Remote Lock, Wipe and Find all prevent unauthorized 
access to corporate data if a mobile device is lost or stolen.
aPPliCatiOn COntrOl fOr MObile DeviCeS
Monitors applications installed on a mobile device according to the 
pre-defined group policies. Includes a “Mandatory Application” group.
ENdPoINT PRoTECTIoN:
SuPeriOr enDPOint anti-Malware
Industry-proven traditional signature-based, proactive and cloud 
based methods for detecting malware threats.
ClOuD-aSSiSteD PrOteCtiOn
The Kaspersky Security Network (KSN) provides a response 
to suspected threats, much faster than traditional methods of 
protection. KSN’s response time to a malware threat can be as little 
as 0.02 seconds!
KESb-TOT/Version 0.2/Nov12/global
nOt all featureS are available On all PlatfOrMS.   
For details, please consult www.kaspersky.com
© 2012 Kaspersky Lab ZAO. All rights reserved. Registered trademarks and service marks are the property of their respective owners. Microsoft, windows and Sharepoint
are registered trademarks of Microsoft Corporation in the united States and other countries. Linux is a registered trademark of Linus Torvalds in the united States and/or
other countries. ibM, Lotus and Domino are trademarks of international business Machines Corporation, registered in many jurisdictions worldwide.