Kaspersky Lab Total Security f/Business, 100-149u, 2Y, EDU RNW KL4869XARDQ Manual Do Utilizador
Códigos do produto
KL4869XARDQ
mAIl, CollABoRATIoN ANd WEB SECURITY:
Mail Server PrOteCtiOn
Protects mail on the latest versions of major mail and
collaboration platforms: Microsoft
collaboration platforms: Microsoft
®
Exchange, IBM
®
, Lotus
®
Domino
®
and Linux
®
-based mail servers.
SeCurity fOr internet GatewayS
Ensures secure Internet access across the organization by
automatically removing malicious and potentially hostile programs
in HTTP(S) / FTP / SMTP and POP3 traffic.
automatically removing malicious and potentially hostile programs
in HTTP(S) / FTP / SMTP and POP3 traffic.
virtual eliMinatiOn Of SPaM
Using Kaspersky’s cloud-based technology, updates are pushed
immediately — reducing spam’s ability to become an epidemic.
Suspected emails are held and re-checked, which increases the
capture rate — and reduces false positives.
immediately — reducing spam’s ability to become an epidemic.
Suspected emails are held and re-checked, which increases the
capture rate — and reduces false positives.
COllabOratiOn SeCurity
Kaspersky defends your SharePoint
®
servers against malware,
while content and file filtering capabilities help prevent the storage
of inappropriate content.
of inappropriate content.
ENCRYPTIoN ANd dATA PRoTECTIoN:
COMPrehenSive enCryPtiOn
Choose from full-disk or file level, backed by Advanced Encryption
Standard (AES) with 256 bit encryption to secure critical business
information in the event of device theft or loss.
Standard (AES) with 256 bit encryption to secure critical business
information in the event of device theft or loss.
SuPPOrt fOr reMOvable DeviCeS
Increases your security through policies that enforce the
encryption of data on removable devices.
encryption of data on removable devices.
SeCure Data SharinG
Means users can easily create encrypted and self-extracting
packages to ensure data is protected when sharing via removable
devices, email, network or web.
packages to ensure data is protected when sharing via removable
devices, email, network or web.
tranSParenCy fOr enD-uSerS
Kaspersky’s encryption solution is seamless and invisible to
users, and has no adverse impact on productivity. No impact on
application settings or updates, either.
users, and has no adverse impact on productivity. No impact on
application settings or updates, either.
SYSTEmS CoNFIgURATIoN ANd PATCh mANAgEmENT:
PatCh ManaGeMent
Advanced in-depth scanning for vulnerabilities combined with the
automated distribution of patches.
automated distribution of patches.
reMOte DePlOyMent Of SOftware
Central deployment of software to client machines, even to
branch offices.
branch offices.
netwOrk aDMiSSiOn COntrOl (naC)
With Network Admission Control (NAC), you can create a network
‘guest’ policy. Guest devices (including mobile devices) are
automatically recognized and sent to a corporate portal where the
correct identification password enables them to use the resources
you’ve approved.
‘guest’ policy. Guest devices (including mobile devices) are
automatically recognized and sent to a corporate portal where the
correct identification password enables them to use the resources
you’ve approved.
OPeratinG SySteM anD aPPliCatiOn iMaGe DePlOyMent
Easy creation, storage and deployment of system images from a
central location. Perfect for a migration to Microsoft
central location. Perfect for a migration to Microsoft
®
Windows
®
8.
harDware, SOftware anD liCenSe ManaGeMent
Hardware and software inventory reports help keep control over
software license obligations. So you can save on costs by centrally
provisioning software rights.
software license obligations. So you can save on costs by centrally
provisioning software rights.
ENdPoINT CoNTRolS:
aPPliCatiOn COntrOl
Enables IT administrators to set policies that allow, block or
regulate applications (or application categories).
regulate applications (or application categories).
DeviCe COntrOl
Allows users to set, schedule and enforce data policies with
removable storage and other peripheral device controls —
connected to USB or any other bus type.
removable storage and other peripheral device controls —
connected to USB or any other bus type.
web COntrOl
Means that endpoint-based surfing controls follow the user —
whether on the corporate network or roaming.
whether on the corporate network or roaming.
DynaMiC whiteliStinG
Real-time file reputations delivered by the Kaspersky Security
Network ensure your approved applications are malware free and
help maximize user productivity.
Network ensure your approved applications are malware free and
help maximize user productivity.
moBIlE SECURITY FEATURES:
innOvative anti-Malware teChnOlOGieS
Combined signature-based, proactive and cloud-assisted
detection results in real-time protection. A safe browser and anti-
spam increase the security.
detection results in real-time protection. A safe browser and anti-
spam increase the security.
SuPPOrt fOr eMPlOyee OwneD DeviCeS
BYOD initiative? Corporate data and applications are isolated in
encrypted containers which are transparent to the user. This data
can be wiped separately.
encrypted containers which are transparent to the user. This data
can be wiped separately.
DePlOyMent with Over the air (Ota) PrOviSiOninG
Preconfigure and deploy applications centrally using SMS, email
and PC.
and PC.
reMOte anti-theft tOOlS
SIM-Watch, Remote Lock, Wipe and Find all prevent unauthorized
access to corporate data if a mobile device is lost or stolen.
access to corporate data if a mobile device is lost or stolen.
aPPliCatiOn COntrOl fOr MObile DeviCeS
Monitors applications installed on a mobile device according to the
pre-defined group policies. Includes a “Mandatory Application” group.
pre-defined group policies. Includes a “Mandatory Application” group.
ENdPoINT PRoTECTIoN:
SuPeriOr enDPOint anti-Malware
Industry-proven traditional signature-based, proactive and cloud
based methods for detecting malware threats.
based methods for detecting malware threats.
ClOuD-aSSiSteD PrOteCtiOn
The Kaspersky Security Network (KSN) provides a response
to suspected threats, much faster than traditional methods of
protection. KSN’s response time to a malware threat can be as little
as 0.02 seconds!
to suspected threats, much faster than traditional methods of
protection. KSN’s response time to a malware threat can be as little
as 0.02 seconds!
KESb-TOT/Version 0.2/Nov12/global
nOt all featureS are available On all PlatfOrMS.
For details, please consult www.kaspersky.com
© 2012 Kaspersky Lab ZAO. All rights reserved. Registered trademarks and service marks are the property of their respective owners. Microsoft, windows and Sharepoint
are registered trademarks of Microsoft Corporation in the united States and other countries. Linux is a registered trademark of Linus Torvalds in the united States and/or
other countries. ibM, Lotus and Domino are trademarks of international business Machines Corporation, registered in many jurisdictions worldwide.