Professional Documents
Culture Documents
Kaspersky Endpoint Security For Business Sales Training (All Modules) - PDF
Kaspersky Endpoint Security For Business Sales Training (All Modules) - PDF
Giving you the tools for success How the course will help you convert more leads
into sales:
Whether you’re new to selling Kaspersky Lab security solutions or you’ve been
selling our products for many years, this short training course will help you to • By focusing on the business issues that customers face — and avoiding ‘product-
‘position’ and sell Kaspersky Endpoint Security for Business more effectively — led messaging’ — you’ll be able to empathize with customers… and demonstrate
to the widest possible range of business customers. we’re ‘on their side’, ready with solutions to their pain points.
• Because every business suffers these same pain points… you’ll be able to prove
that Kaspersky Endpoint Security for Business delivers functionality that every
Here’s what we’ll cover: size of business needs… from small businesses to medium-size businesses
to multinational enterprises… regardless of which vertical market sector they
• The ‘pain points’ that customers need to address operate within.
• How we help to solve these business issues • You’ll be able to demonstrate that superior security can have a massive effect
on a business’s ‘bottom line’… and prove that Kaspersky Lab’s multi-layered
• Dispelling the myth about anti-malware solutions anti-malware technologies are more effective in defending businesses against
• The Kaspersky Lab difference — and how it generates benefits for customers attacks that can inflict severe damage on reputations, profitability and market
share.
• Which tiers of KESB suit which types of customers
• In addition, you’ll be able to show prospective customers that Kaspersky Lab
• Which business segments we should be targeting isn’t just about superior anti-malware… and that we’ve got business security &
• Links and tips for further viewing & reading management solutions that deliver an extremely rich set of functionality and
generate a wide range of tangible business benefits. This will help you to engage
with customers as a ‘strategically important supplier’ — and work towards
achieving ‘trusted advisor’ status in your customers’ eyes.
Deal with the issues | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Because customers rightly focus on dealing with the issues that they face in
their working lives… we need to focus on showing how we make it easy to solve
those very same issues… before we later go on to explain a few things about our
best-of-breed products and our heritage as a leader in IT securit.
Deal with the issues | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
• Business Continuity — the basic need to minimize downtime and keep the
business running smoothly
• Data Protection — securing the business’s own information and sensitive data
that belongs to third parties
• Mobility — enabling remote access to business systems & data… without
compromising security REGULATORY DATA
• Regulatory Compliance — ensuring the business avoids penalties, prosecution COMPLIANCE PROTECTION
and negative publicity
• Reducing Operating Costs — meeting the ongoing need to ‘Do More and
Spend Less’
Later, we’ll consider how Kaspersky Lab helps to solve each of these issues for
our business customers… but, first, let’s take a closer look at each of these pain
points…
REDUCING MOBILITY
OPERATING
COSTS
Deal with the issues | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Business Continuity
This is all about ensuring the business is able to continue its day-to-day operations:
• Lost sales revenues — if customers can’t access the business online, they may
choose competitors’ offerings
• Financial penalties — for failing to comply with Service Level Agreements or
other contractual commitments
• Damaged relationships with suppliers — if payments are delayed or ‘goods-in
processing’ issues prevent deliveries
Deal with the issues | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Estimates suggest that — for small businesses — the average direct costs of
a malware infection are $50,000 per incident. However, if we add in the indirect
costs of lost sales and reputational damage, the total costs for each infection will
usually greatly exceed this figure.
For larger businesses, the costs of each malware infection incident can be much
higher.
Deal with the issues | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Data Protection
Today, businesses process and store massive volumes of information, including:
• The business’s competitive edge — that may have been achieved as a result of
significant investment in the development of new products and services — can be
totally lost if information finds its way into the wrong hands.
DESIGNS AND
• Business partners may sue for compensation if confidential details about their
‘KNOW HOW’ THAT SENSITIVE
designs and products are revealed.
ARE OWNED BY INFORMATION
• The business’s employees may seek legal recourse if personal data is not BUSINESS ABOUT
protected… and — in addition to financial penalties — this type of data leakage PARTNERS CUSTOMERS
can damage the business’s relationship with its entire workforce.
• Customers may sue the business if confidential information or credit card & bank
account details are leaked.
Again, just as malware attacks can lead to bad publicity, data leakage incidents can
significantly damage a business’s reputation… and dissuade potential customers —
even if the data leakage incident had no direct effect on them.
Deal with the issues | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Mobility
Giving remote or mobile workers direct access to corporate data and systems — via
mobile devices, including smartphones and tablets — has become an essential part
of modern business.
The use of personally-owned mobile devices also greatly increases the chances of
other security problems — including the introduction of malware onto the corporate
network.
Furthermore, because BYOD lets employees choose the manufacturer and model
of device they use to access the corporate network, IT administrators are faced with
having to manage an almost endless range of devices and operating systems.
Deal with the issues | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Regulatory Compliance
In most territories, regulators are placing increased demands on almost all types of
business. Furthermore, within some vertical market sectors — such as healthcare —
there are often additional regulations that must be complied with.
Companies that fail to comply with local regulations may be subject to financial
penalties and — in some cases — the company’s senior officials may be liable to
criminal charges that may result in custodial sentences. In some vertical market
sectors, failure to comply with regulations could also result in a business losing its
license to operate.
For multinational businesses, there may be many different regulations that apply
to the different regions that the business operates within — and they all have to be
complied with.
Obviously, compliance is an issue that affects most — if not all — operations across
a business. It’s a complex issue — and not one that any single product or policy can
fully address. Instead, every department within a business has to ensure all of its
processes and practices help to contribute to the business’s overall compliance.
This includes taking care to make the appropriate investments in Systems
Management and IT Security solutions — and ensuring the available product
options are adequately assessed, to evaluate whether they will deliver maximum
benefit in helping the business to achieve overall compliance.
Deal with the issues | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Obviously, the ‘Do More and Spend Less’ mantra means that security breaches —
and the very high costs associated with these incidents — are to be avoided at all
costs. Well… let’s make that almost at all costs. While security incidents have to
be prevented, businesses also have to ensure their choice of IT security product
doesn’t come with a high total cost of ownership and doesn’t place an excessive —
and expensive — load on the business’s IT administration personnel. So it’s
important that a business chooses IT security solutions that combine rigorous
protection technologies… plus ease of use and manageability.
Furthermore, some security solutions and systems management products can also
help to minimize the distractions that can impact the productivity of employees.
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Every day… at Kaspersky Lab, we detect more than 315,000 new items of malware.
So a 0.6% difference in malware detection & blocking means the product that is
only 99.1% effective is potentially letting 1,890 more malicious software programs
slip through onto customers’ systems… every day.
Over a period of a year, that’s an extra 689,850 malware items that a business
could be subjected to… and all for the sake of a 0.6% difference in anti-malware
performance. Faced with that unnecessary level of additional risk, it’s just a matter
of time before one of those malware items causes serious damage to the business.
Although that’s already a compelling argument for taking some extra care over the
selection of anti-malware products… even that’s not the full story about the risks
that some businesses are taking.
It’s not just a matter of the sheer volume of additional malware that can evade
detection… there’s also the question of the exact nature of those threats that are
continually slipping past the average anti-malware product.
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
The most dangerous threats to business … but why does the ‘commodity’ myth persist?
If we divide malware into known threats, unknown threats and advanced threats — Well, perpetuating the myth is in the interests of every vendor that can’t match
it’s the unknown and advanced threats that are both harder to block and are Kaspersky Lab’s performance in detecting and blocking malware. Because they
capable of doing the most damage. The reality is… that extra 0.6% that we protect can’t beat us where it matters — in the vast number of independent tests that we
against could be the most important threats that businesses need to avoid. They’re participate in — some vendors may try to pretend that relative performance is no
some of the most dangerous and most destructive items of malware… including longer important.
Advanced Persistent Threats (APTs) that relentlessly target individual businesses.
Whereas some vendors focus on blocking known threats and other vendors focus
So… anti-malware is not a commodity item. Not all anti-malware solutions are on APTs… our technologies protect against all classes of malware… and that’s one
equal… and that extra 0.6% — that we can detect versus some competitors — can of the reasons why we achieve greater success in reviews and tests.
mean a massive difference to our business customers.
Closer to home, here’s a story from one of our own sales team
What’s all the fuss about APTs?
Before joining Kaspersky Lab, he spent 7 years successfully selling one of our
If you’d like to learn more about why APTs are getting so much coverage in the competitors’ products… but perhaps the competitors’ technologies were rather
press — and why they’re a hot topic for potential business customers — we’ve got less successful when it came to living up to their marketing department’s claims.
a short training module on APTs and how we protect against them. For the majority of his sales… within a few weeks of the software being installed,
he’d have to take a call from the angry customer — questioning him about why their
infrastructure had been penetrated by malware.
Since joining us in mid 2013… and selling a lot of Kaspersky Lab solutions to
businesses, he’s not had to deal with a single complaint about malware penetration.
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
• Business Continuity
• Data Protection
• Mobility
• Regulatory Compliance
• Reducing Operating Costs
REGULATORY DATA
COMPLIANCE PROTECTION
REDUCING MOBILITY
OPERATING
COSTS
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Business Continuity
With nearly 115 million new malware items being unleashed in the last year, the
task of defending a business against infections is no trivial matter. The sheer
volume and variety of malware threats calls for multi-layered defenses that are
capable of protecting a business against:
• Known threats
KNOWN ADVANCED UNKNOWN
• Unknown threats THREATS THREATS THREATS
• Advanced threats
15,000,000
frequently than many other security vendors’ databases. These cloud-assisted
updates help to ensure known malware is effectively added to our ‘black list’ more
rapidly — so malware is prevented from launching on a business’s endpoints.
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Identifying & blocking unknown threats across their entire network — so traffic levels can be easily managed and ‘update
storms’ can be avoided.
Vulnerabilities — within applications or the operating system — are one of the
most common ways in which hackers and cybercriminals attack systems. These
vulnerabilities are effectively bugs inside the application software. Even though the
bugs may be known vulnerabilities, they can enable new, unknown threats… so all
vulnerabilities need to be patched as soon as possible.
APPLICATION
Kaspersky Lab’s Vulnerability Assessment and Patch Management functions are STARTUP
KASPERSKY CONTROL
an effective way of automatically finding known vulnerabilities on a business’s SECURITY
endpoints… and then automatically patching them… so hackers and malware can’t NETWORK APPLICATION
use those vulnerabilities as an open gateway into a business’s systems.
ACTIVITY
Patch Management can play a vital role in making organizations more secure. MONITOR
However, it’s an area that a lot of businesses struggle with… which means many
APPLICATION
businesses are failing to apply patches that have been available for months or even
PRIVILEGE
years. By automating the entire Vulnerability Assessment and Patch Management
CONTROL
process, we reduce the load on administrators and — most importantly — we rapidly
plug the security ‘holes’ that provide the entry point for the vast majority of malware
penetrations. HOST-BASED
INTRUSION
Businesses that think they’re doing enough… simply by applying Microsoft’s weekly PREVENTION
SYSTEM (HIPS)
updates… are leaving the door open for malware. All applications and operating
& PERSONAL
systems have to be monitored for vulnerabilities — and should have patches applied FIREWALL
as soon as they become available… instead of waiting for a weekly update. - What is Anti-Phishing?
- What is URL Filtering?
Our Vulnerability Assessment and Patch Management technologies don’t just
work with Microsoft software… they also work with a wide range of applications
from many other software vendors. We maintain our own Vulnerability Assessment
database and we gather valuable information from the cloud-assisted Kaspersky
Security Network — so we have up-to-date information on which vulnerabilities are Cloud-assisted anti-malware protection
being exploited and how dangerous each vulnerability is.
We also use the power of the cloud… as one of our methods of protecting
Whereas other vendors may offer only Vulnerability Assessment or Patch businesses against new, unidentified threats. The Kaspersky Security Network
Management tools, Kaspersky Endpoint Security for Business includes fully (KSN) collects anonymized, ‘live field data’ about malware and suspicious
integrated Vulnerability Assessment and Patch Management… and, by working behavior — from 60 million volunteers’ devices. This continual collection of
together, these technologies enable automatic discovery and elimination of depersonalized, real-time data about threats — from every corner of the world —
vulnerabilities. In addition, flexible settings let administrators schedule patching helps us to provide all of our customers with a more rapid response to new attacks.
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Independent tests have shown our cloud-assisted protection can respond to new The team is constantly analyzing new cyberthreats. With this detailed
threats in as little as 0.02 seconds. understanding of new attacks — and the methods they use — we can provide our
customers with more efficient security… and deliver protection against advanced
Further protection technologies… against unknown threats threats much more rapidly.
Our Host-based Intrusion Prevention System (HIPS) and personal firewall help
administrators to manage and control both inbound and outbound traffic on their
network — and this helps us to prevent attacks by hackers. Administrators can set
parameters for individual ports, IP addresses or specific applications.
DYNAMIC
In addition, Kaspersky Lab’s flexible Application Control tools give a business WHITELISTING
granular control over how applications are allowed to run on the corporate
network — and this can be very valuable in protecting against unidentified threats:
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Our Whitelisting Lab receives commonly used applications from various sources Customers are about to get a whole lot more interested in Default Deny
on the Internet and uses intelligent systems to check each application for security
Gartner, Inc has stated: “By 2017, more than 50% of end-user PCs will be restricted
risks. Then, updates for our dynamic whitelist of applications are automatically
to running only apps that have been pre-inspected by a trusted authority or
distributed through the cloud-enabled Kaspersky Security Network onto our
corporate IT, for security and privacy risks — up from less than 20% today.”
customers’ systems — so our customers benefit from our latest whitelist data. Our
database of whitelisted applications already includes more than 1.3 billion unique
With this growing trend, the integrated Default Deny capabilities within Kaspersky
files — and the database is growing by a further 1 million files per day.
Endpoint Security for Business are becoming an increasingly important
differentiator versus other security vendors’ offerings.
Because so many new files appear every day, our Whitelisting Lab quickly detects
and classifies them… so we rapidly react to changes in the ‘global software world’.
That’s why we call it Dynamic Whitelisting. Further protection technologies… against advanced threats
We’ve also developed special technologies — including AEP and System Watcher —
By combining Application Control and Dynamic Whitelisting, we make it easy for
that specifically target advanced threats:
businesses to implement a Default Deny policy… whereby all programs are blocked
from launching — except those applications that the business totally trusts and has • Our innovative Automatic Exploit Prevention (AEP) technology helps to ensure
included on its whitelist of safe applications. malware can’t exploit vulnerabilities within the operating system or the
applications that are running on our customers’ endpoints. AEP specifically
It’s worth remembering that none of our direct competitors offer Default Deny
monitors the most frequently targeted applications — including Adobe Reader,
functionality as part of their standard security offerings. However, Default Deny is
Internet Explorer, Microsoft Office, Java and many more — to deliver an extra layer
provided — as standard — in Kaspersky Endpoint Security for Business — Advanced
of security monitoring and protection against unknown threats. AEP has even
and Kaspersky Endpoint Security for Business — Select.
been successful in blocking a number of Zero-Day exploits.
We’re the only security vendor that has established a whitelisting partnership with • When an application launches on a customer’s corporate network, our System
400 vendors — including Intel, Asus, MSI, Citrix, HP and many more. Each vendor Watcher technology will monitor the application’s behavior. If any suspicious
regularly sends us their latest software — often before it has been released on behavior is detected, System Watcher will automatically quarantine the
the market — so that we can add their newest applications to our database of application. In addition, because System Watcher keeps a dynamic log of the
whitelisted software. Again, this helps to reduce the incidence of false positives — operating system, registry and more… it enables the roll back of malicious
whereby ‘clean’ software is mistakenly identified as being malicious. For many actions that the new item of malware implemented before it was identified.
applications, we achieve a false positives rate of nearly zero… and that’s a major
efficiency benefit for businesses that are using Kaspersky Lab security.
We’re the only security vendor that has won all independent industry tests related
to Application Control and Whitelisting technologies — including tests by Dennis
Technology Labs, AV-TEST and West Coast Labs.
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Data Protection
There are many ways in which valuable or sensitive information can leak from a
business — and potentially find its way into the wrong hands:
LOSS OR THEFT OF
5% 10%
• Stolen or lost laptops, smartphones and tablets
• Unauthorized copying of data onto removable storage devices TO
• Applications having inappropriate access to data — and sending data outside the
business OF BUSINESS LAPTOPS…
… and Kaspersky Lab has got security technologies that protect against all of these
sources of data leakage.
EVERY YEAR
BAR
Lost laptops and mobile devices
No matter how often a business warns its employees about the costs that can result
from data leakage incidents, the average business will still have to cope with the
loss or theft of 5% to 10% of its business laptops… every year. If we also consider
the compact nature of smartphones and tablets, these devices are even easier to
lose… or for criminals to steal.
Without some method of securing the data on missing laptops, phones and
tablets… there’s a lot of valuable, sensitive information that can leak out of a
business.
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
• File-Level Encryption (FLE) lets businesses encrypt individual files — so they can
be shared securely, across the business’s network
• Full Disk Encryption (FDE) makes it easy to run an ‘encrypt everything at once’
policy
• A combination of both FLE and FDE — on a system’s internal hard drive — lets
a business encrypt the entire hard drive… while ensuring individually encrypted FILE-LEVEL FULL DISK
files can be securely shared across the business’s network ENCRYPTION (FLE) ENCRYPTION (FDE)
… and all encryption and decryption processes are totally transparent to the user.
In addition, users can encrypt removable storage devices.
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Although other data encryption solutions may offer similar functionality, there are Controlling the use of removable storage devices
important differences in how Kaspersky Lab’s data encryption — and other data
protection technologies — are managed… and these differences generate some Small, removable devices can be easily attached to computers — so businesses
major benefits for Kaspersky Lab customers: need to guard against the use of unauthorized devices that can be used to
steal corporate information or could be a source of malware. Our Device Control
• Encryption plus other security technologies — including anti-malware, Application technologies make it easy for a business to:
Control, Device Control and more — are all included within a single set of code
that has been developed in-house at Kaspersky Lab. This means all of our • Control the access privileges granted to devices. The business can set different
security technologies are seamlessly integrated with each other. privileges for:
• Don’t underestimate the value that this level of integration offers our customers. ◦◦ Different types of device
It plays a major role in ensuring stability and high performance… with a very ◦◦ Different device buses
low impact on computing performance. By contrast, the poorly integrated ◦◦ A specific individual device
technologies that some vendors offer within their products can impact IT
• Manage the times during which the business’s device control policies are in
performance and the business customer’s productivity.
operation — for example, to prevent the use of removable devices after office
• Encryption plus other security technologies — including anti-malware, Application hours
Control, Device Control and more — can all be managed via a single, unified
management console. … so data leakage — via removable media — can be avoided.
Again, this is a key differentiator… when compared with some vendors’ products
that have multiple different consoles for managing various different functions. Preventing applications sending data outside the business
Because every function within Kaspersky Endpoint Security for Business can be
managed via a single management console, customers gain greater visibility of As well as giving administrators the ability to block specific applications — or any
their systems and security… plus it’s much easier for administrators to set single of the 89 categories of applications in our database, such as games, multimedia,
policies that cover a wide range of vital security functions — across each different browsers and more — our Application Control technology goes much further than
type of endpoint. These significant manageability benefits help to reduce costs and many other vendors’ offerings.
‘free up’ administrators for other tasks.
Our Application Control tools can easily be configured to control whether specific
• Single sign-on — plus support for smartcards, tokens and non-qwerty applications are permitted to access specific files or folders.
keyboards — help simplify encryption for both users and administrators.
It’s important to note that, as Kaspersky Endpoint Security for Business offers an endpoint security
solution, we enable encryption for data that is stored on the endpoint — including PCs, mobile devices
and removable media. Other encryption functions — such as email encryption — are not included.
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Mobility We make it easy for administrators to set up and enforce mobile security policies —
such as mandating the use of passwords on all devices that are permitted access
to the corporate network.
Although the need for mobile security may be a relatively new concept for some
vendors, Kaspersky Lab has long recognized the risks to mobile devices… and the It’s also essential that each device is capable of storing the user’s personal
data stored on them. We were the first security vendor to find mobile malware. That data… separately from business data. Our mobile security technologies include
was back in 2004 — when we found Cabir. So — compared with other vendors — Mobile Application Management (MAM) functionality that lets businesses set up
we’ve had a significant head start in mobile security. a special container for corporate applications and data… and it’s easy to enable
the encryption of all corporate data and ensure the device requests additional
Today, our mobile security technologies protect a wide range of mobile platforms — authorization before a containerized application is allowed to launch.
including Android (plus special support for Samsung’s SAFE criteria for secure
mobile devices), iOS, Windows Phone 8 and more — against the latest malware This containerization or ‘App Wrapping’ — which places corporate applications into
threats. Because we combine traditional, signature-based protection and proactive, an encrypted and isolated container — also simplifies security when a user leaves
cloud-assisted technologies, we can secure mobile devices against newly the business. If an employee resigns, all corporate data can be selectively wiped
discovered threats. from their mobile device — to prevent the leakage of confidential corporate data —
without deleting the employee’s personal data.
In addition to mobile anti-malware, we also provide:
• Application Control features that give a business control over which applications Dealing with lost or stolen phones and tablets
are allowed to launch on mobile devices that are permitted access to the
corporate network. Administrators can implement a Default Allow policy — that If a mobile device is lost or stolen, Kaspersky Lab’s remotely-operated security
only blocks blacklisted applications — or choose a Default Deny policy, so that features give administrators the ability to: Lock the device; Delete the corporate
only whitelisted applications are allowed to run on the mobile device data — or all the data — that’s stored on the device; Find the device’s approximate
location. If someone changes the SIM in the missing device, Kaspersky’s SIM
• Web Control tools that make it easy to block malicious websites and control Watch technology will automatically send the device’s new phone number to the
access to websites that don’t conform to a business’s corporate security or administrator… so the remote lock, find and data wiping features can still be
Internet usage policies — including social networking, recruitment, retailing, operated.
gambling and adult websites, plus proxy servers
• Technologies that can detect and report jailbreak or rooting incidents
Simplifying mobile device management (MDM)
... plus policy enforcement and anti-theft technologies that help to address the
Extensive MDM capabilities simplify the deployment of Kaspersky Lab’s mobile
additional issues that BYOD can bring.
security agent and any other applications that a business wishes to distribute
to mobile devices — either over the air (OTA) or via a tether. All Kaspersky Lab
Securing BYOD initiatives mobile security and MDM features can be centrally managed, from a single
administration console.
If a business’s employees are using their own devices to access the corporate
network, additional security technologies are required. Our MDM functionality includes support for: Microsoft Exchange ActiveSync; Apple
MDM Server; Samsung SAFE.
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Regulatory Compliance
We’ve seen that Kaspersky Lab’s security technologies help to prevent the leakage
of confidential information — and, of course, that already addresses one very
important compliance requirement. However, there are additional technologies
within Kaspersky Endpoint Security for Business that help to support a business’s
compliance efforts.
It’s worth noting that almost every business that runs our automatic discovery and
inventory generation tools is shocked when its first inventory report reveals the
full range of the applications that are running on the business’s infrastructure…
and many customers even discover that forgotten servers are still running in some
corner of their business!
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Dispelling the anti-malware myth | That’s enough about the myth... | Business Continuity | Data Protection | Mobility | Regulatory Compliance | Reducing Operating Costs
Poorly integrated security solutions — that have not been developed with
manageability in mind — can be time consuming to install, configure and run… and
that leads to increased costs and a greater likelihood of human error and security
gaps. In some cases, vendors offer products that include elements that are not
at all integrated with each other. Instead, individual technologies operate in a
standalone manner — and multiple agents have to be installed and managed.
However, because all of the core technologies within Kaspersky Endpoint Security
for Business have all been developed in house — and are part of one codebase —
all functions are seamlessly integrated… for improved performance and easy
management.
Kaspersky Endpoint Security for Business includes Kaspersky Security Center — the
centralized management console that gives business’s control over all Kaspersky
Endpoint Security for Business security technologies and systems management
tools. Because all functions can be managed from one console, Kaspersky Security
Center helps to simplify day-to-day security and systems management tasks… and
reduce operating costs.
Again, this is another key differentiator for Kaspersky Endpoint Security for
Business.
Our Security Intelligence DNA has seven main elements… so let’s look at each in Global Research
and Analysis Team
turn — and see how, together, they help us to outperform other security vendors.
Leading international
organizations
Developing innovative,
easy-to-manage security
technologies
Security that’s built on world-leading expertise… from the top down GReAT experts dig deeper into the threat landscape — to discover how new cyber
weapons operate and to devise innovative ways to defeat them. At any one time,
Whereas most IT companies are run by managers or accountants, Kaspersky Lab’s GReAT experts are researching several dozen complex, targeted attacks.
Chairman and CEO — Eugene Kaspersky — is a world-renowned IT security expert.
His understanding of malware detection and anti-malware technologies got the
company started — and, today, he presides over a world-leading security business
Committed to maintaining our ‘high hit rate’
that operates in 200 countries and protects over 300 million users.
Over the years, Kaspersky Lab has been the first to discover many of the most
sophisticated threats that cybercriminals have unleashed on the world.
No other IT security vendor can claim to have an IT security visionary at its helm.
Anyone who reads the IT press will know that Kaspersky Lab was the first to
While other companies can be swayed in direction — by short-term business
discover Flame, Gauss, mini-flame, Red October, NetTraveller, The Mask, Darkhotel
objectives that are set by the ‘money men’ — this is never an issue for Kaspersky Lab.
and many more of the most complex security threats. Ask yourself how many times
any of our competitors have featured in press reports about the first vendor to
Global intelligence — boosts local protection discover a new threat.
Because new malware is being released every second… from every corner of the Furthermore, despite the efforts of vendors that offer specialist anti-APT hardware
world… we recognize that speed and ‘global reach’ are essential in helping us products... Kaspersky Lab is still the company that’s recognized for discovering
to deliver effective security. That’s why we established the Kaspersky Security new APTs.
Network (KSN) — a global network of 60 million volunteers that have opted in to
let Kaspersky Lab receive information about potential malware and suspicious Neither politics nor geography influence our work. Because we’re totally
behavior on users’ devices. independent — and have a global vision — we hunt down threats… regardless of
where they originate or who they target. Furthermore, by publicizing our ‘finds’, we
Analyzing this real-time data — from worldwide sources — enables us to provide help to alert the whole world about new threats.
a more rapid response to newly identified threats… wherever they originate. So —
regardless of whether they opt in or opt out of KSN — all of our customers benefit
from a much quicker reaction to new malware… plus a low rate of false positives —
Respected by world-leading security organizations
so they can maintain productivity.
Because we’ve established a reputation for remediating malware attacks —
regardless of their origin or purpose — many of the world’s most respected security
Great… greater… greatest security organizations and law enforcement agencies have actively sought our assistance.
Our Global Research & Analysis Team (GReAT) is an elite group of IT security experts — In addition to INTERPOL and Europol… Computer Emergency Response Teams
strategically located in all regions of the world. Together, they form one of our most (CERTs) from across the world have also invited us to work closely with them.
important assets in the fight against the latest and most sophisticated threats. Naturally, we’re proud to help.
With industry-leading security researchers based in eighteen countries, GReAT No one gets asked to work alongside any of these organizations… unless they really
is constantly analyzing new cyberthreats and developing increasingly powerful know what they’re talking about — and have already proved they can deliver.
protection technologies.
Bigger investment in Research & Development During 2013, Kaspersky Lab products took part in 79 independent tests and
reviews… and the results were impressive:
We’re the world’s largest, privately held IT security company.
• We were awarded first place in 41 reviews
Because we’re privately owned, we’re independent and that means we’re free to • We achieved a Top 3 listing in 61 reviews
run our business without being constrained by short-term aims or having to change
direction in order to satisfy the demands of shareholders or the stock market. You’d be forgiven for thinking that it’s our anti-malware technologies that are
Instead, we can fund our threat intelligence activities on a massive scale… and singled out for awards and accolades. However, that’s not the whole story… a wide
then, when we’re developing innovative security technologies for our customers, we range of our protection technologies have won awards:
can be very agile and responsive in how we run those development projects.
• Application Control with Dynamic Whitelisting
As a technology-driven — not marketing-focused — company, we invest in research
and development at a rate that exceeds the industry average. • Mobile Security
• Systems Management and Patch Management
We take care to invest in our products… and they take care of our customers… so
our business success takes care of itself! • Secure Financial Transactions
Kaspersky Lab develops all of its own core technologies… and because those The fact that so many OEMs rely on our technologies provides further proof of our
technologies are developed and perfected by the same team, our products are position as a leader. With over 130 OEMs using our technologies within their own
more stable and more efficient in their use of our customers’ computing resources. products and services, there’s a high chance that the customer you’re talking to
With a single codebase, our products offer tightly integrated sets of technologies… already depends on Kaspersky Lab technology!
with none of the compatibility issues that can result when a vendor simply ‘bolts on’
new functionality — by acquisition.
Everything adds up to superior security
Proven leaders… and don’t just take our word for it
So those are the seven elements of our Security Intelligence DNA. Any one of
In tests run by independent labs, our products achieve a greater number of ‘top
them — in isolation — would be enough to make a difference… but by combining
scores’ than any other security vendor’s products.
all seven, Kaspersky Lab is an unstoppable force against cybercriminals and the
security threats they devise.
Kaspersky Endpoint Security for Business. Advanced | Kaspersky Endpoint Security for Business. Select and Core | What about customers that need even more…?
• Business Continuity
• Data Protection REGULATORY DATA
• Mobility
COMPLIANCE PROTECTION
• Regulatory Compliance
• Reducing Operational Costs
The names of our products and the exact composition of each Kaspersky Endpoint
Security for Business tier are not relevant during early discussions. However, at
a later point in your conversation with a prospective customer, you’ll need to talk
them through the tier options that Kaspersky Endpoint Security for Business offers.
REDUCING MOBILITY
OPERATING
COSTS
Kaspersky Endpoint Security for Business. Advanced | Kaspersky Endpoint Security for Business. Select and Core | What about customers that need even more…?
Kaspersky Endpoint Security for Business — Similarly, if the prospect also already has an effective Mobile Security solution
(not just a Mobile Device Management application)… plus Systems Management,
Advanced Data Encryption, Endpoint Controls and Anti-Malware for File Servers… Kaspersky
Endpoint Security for Business — Core may be suitable.
Because all sizes of business face the same security risks… and these are risks
that can put a business’s very existence in danger… every business needs all of The benefits of ‘leading’ with the Advanced tier
the rich functionality that is included in Kaspersky Endpoint Security for Business —
Advanced. The point is… we should always start with the very valid assumption that the
customer needs all of the functionality that’s within Kaspersky Endpoint Security for
The Advanced tier of Kaspersky Endpoint Security for Business isn’t some kind Business — Advanced… unless there’s evidence to suggest the customer already
of luxury option that’s reserved for customers that have bigger budgets… there’s has some key security and management functions covered by other products that
nothing superfluous in Kaspersky Endpoint Security for Business — Advanced. they’re happy to continue using.
Yes… Kaspersky Endpoint Security for Business — Advanced delivers multiple layers This approach isn’t simply about maximizing sales revenues (although that is a
of protection… but every function and component technology is essential and aimed useful by-product in helping you to hit your sales target)… instead, it’s about offering
at making our customers more secure. So your focus should be on discussing the the customer more value — by addressing more of the pain points that we know
benefits of Kaspersky Endpoint Security for Business — Advanced… with every every business needs to solve.
business… in every vertical market… unless a specific customer already has some
security issues covered by other solutions. In addition, if you’re able to engage with the customer on a wider range of pain
points that we can help them with… it’ll help you to have more in-depth discussions
For example, if the prospective customer already has a far-reaching Systems with them… and your value as a supplier can greatly increase.
Management solution… and a Data Encryption product that has the necessary
flexibility to help them protect against different forms of data leakage… perhaps
Kaspersky Endpoint Security for Business — Select will be adequate. Here’s what’s included in
Kaspersky Endpoint Security for Business — Advanced
However, even if they already have some management technologies, it’s still
worthwhile checking that the Systems Management solution that they’re running • Anti-Malware and Anti-Phishing for Workstations
is capable of addressing all of the security issues that Kaspersky Lab’s Systems
• Anti-Malware for File Servers
Management functions cover… to ensure the customer isn’t missing out on any of
the vital, security-focused Systems Management functionality that Kaspersky Lab • Systems Management
offers — such as our rigorous Vulnerability Assessment and Patch Management.
• Data Encryption
Because our management functionality will readily work alongside other Systems • Mobile Security and Management
Management applications — and can be integrated into their reporting functions —
• Endpoint Controls
many businesses choose to use our Systems Management capabilities to
complement their main Systems Management solution… by adding extra focus to • Unified Management Console
the security aspects of management.
Kaspersky Endpoint Security for Business. Advanced | Kaspersky Endpoint Security for Business. Select and Core | What about customers that need even more…?
Kaspersky Endpoint Security for Business — Select Kaspersky Endpoint Security for Business — Core
In some regions, we also offer a tier below Kaspersky Endpoint Security for
Here’s what’s included in Business — Select. This lower tier… called Kaspersky Endpoint Security for Business
Kaspersky Endpoint Security for Business — Select — Core… still delivers our award-winning anti-malware technologies. However, it’s
worth remembering that, with today’s wide range of security threats, anti-malware
• Anti-Malware and Anti-Phishing for Workstations isn’t enough to protect against all risks — so we should avoid selling this tier…
• Anti-Malware for File Servers unless the customer already has all other security issues covered.
Kaspersky Endpoint Security for Business. Advanced | Kaspersky Endpoint Security for Business. Select and Core | What about customers that need even more…?
In addition, we also offer a tier above Kaspersky Endpoint Security for Business —
Advanced. It’s called Kaspersky Total Security for Business and it delivers
everything that Kaspersky Endpoint Security for Business — Advanced offers… plus:
… and, again, if the customer needs to add security for virtualized environments
and security for storage, there are Kaspersky Targeted Security Solutions for each
of these requirements.
Large enterprises and multinational businesses Here are three reasons why Kaspersky Endpoint Security for
Business is ideal for large enterprises:
Selling to this size of business isn’t an aim for the future… it’s something for the
• It’s a highly scalable security solution — able to protect the massive numbers of
here and now. Furthermore, we already have a proven track record of success in
endpoints that enterprises run
selling within the enterprise market.
• It can be tailored to meet specific infrastructure needs — by adding any of our
Many large-scale enterprises — that are recognized across the globe — are already wide range of Targeted Security Solutions, including:
using Kaspersky Lab security technologies to protect their mission-critical business
◦◦ Kaspersky Security for Virtualization
operations. These customers include:
◦◦ Kaspersky Security for Storage
◦◦ Kaspersky Security for Mail Server
• Telefonica
◦◦ Kaspersky Security for Internet Gateway
• International Atomic Energy Agency ◦◦ Kaspersky Security for Collaboration
• Axel Springer • It lets administrators set single policies that cover multiple security technology
• Ferrari settings… across multiple different types of endpoints
• Swarovski In addition, we offer a range of services that meet the needs of large enterprises
• TeleMadrid and mid-sized businesses, including:
If you consider that over 130 OEMs also use our technologies within their own
products and services — including Microsoft, Cisco Meraki, Juniper Networks,
Alcatel Lucent, Blue Coat, Check Point, D-Link, Clearswift, Netgear, ZyXel, General
Dynamics, BAe Systems and more — it’s no surprise that we have a big profile within
enterprise level organizations.
It’s also worth noting that the latest version of Kaspersky Endpoint Security for For enterprise-level customers, Kaspersky Lab’s simple formula…
Business includes additional functions that are particularly suited to enterprise-
level customers, including: Best Security Intelligence + Best Security Technologies = Best Protection
• Support for access / sign-in via smartcards and tokens — including the two-factor … provides a compelling argument for choosing Kaspersky Endpoint Security for
authentication mechanisms that enterprises demand for functions such as Business — Advanced.
encryption
• Role-based access control — based on user profile — for hierarchical access
that takes account of different administrators’ roles and lets different groups or
departments manage functions as they require
• Support for a wider range of platforms — including Microsoft Surface devices and
UEFI & GPT disks
• Optimized code — for a smaller ‘footprint’, more efficient use of computing
resources & improved productivity… plus a 30% reduction in network load during
distribution
• Integration with SIEM (security information and event management) products —
including HP ArcSight and IBM QRadar
• Support for Samsung KNOX 2.0
In fact, it’s only difficult… until the customer finds Kaspersky Endpoint Security for • It’s easy to install, configure and set up — with a short ‘learning curve’ — yet it
Business! offers world-class security
• It gives small business ready access to some enterprise-class systems
Here are three reasons why Kaspersky Endpoint Security for management tools — that help boost efficiency
Business is ideal for mid-size businesses: • It’s easy to manage — both for security management and systems management
functions
• Its wide range of protection technologies deliver multi-layered security — so
the business is protected against all types of malware and Internet threats —
while the product’s systems management capabilities help to drive efficiency
improvements
• The flexible reporting functionality gives administrators improved visibility of
security and management issues
• It’s designed for ease of use and manageability — yet it can also scale to cover
increasing demands… so there’s no need to ‘rip out and replace’ — and that
eliminates disruption, reduces capital costs and avoids the need for retraining
administrators
Additional information
Glossary Anti-Spam
Filtering out spam – a never-ending stream of unsolicited email advertisements –
has become an absolute necessity for any company using electronic mail ; spam
Agentless Protection consumes disk space and bandwidth, slows down working processes and, in
amongst the generally harmless rubbish, can carry with it lethal threats in the form
Thanks to VMware VShield technology, it is possible to provide anti-malware of phishing emails. And there should no mis-identifications – or precious business
protection for a number of virtual machines (VMs) running under a hypervisor correspondence could be lost, along with potential business opportunities.
without the need to install a software agent on each VM. Instead, a single That’s why Kaspersky Lab’s anti-spam system employs layers of sophisticated
dedicated “Virtual Security Appliance” serves all the machines. While offering technologies – such as Urgent Detection System 2, Enforced Anti-Spam Updates,
multiple benefits, such as “instant” protection for emerging VMs and “update/ Content Reputation — reducing the number of mis-identifications or ‘false positives’
scanning storms” immunity, this VMware-introduced approach does have significant practically to zero.
drawbacks including the lack of access to processes in the VM’s memory. Still, it
is a solution of choice for a number of applications, particularly in virtual server
environments. Application Control (technology)
This technology allows admins to monitor and control the installation and launch of
Anti-malware (technology) software applications. This proactive layer of protection is also useful for blocking
out executable malware, including malicious apps which are yet unknown to the
The core element of most known security solutions. It consists of many different developer. According to leading consulting agencies such as Gartner, contemporary
technological components united by a common goal: to fight malware. An effective Application Control solutions should be built and employed in conjunction with
contemporary anti-malware solution usually is able to work with both the file system dynamically updated Whitelisting, which contains data on existing legitimate,
and processes in memory, though there are certain cases and conditions when trusted and safe applications and their components — which is exactly the way it
certain functions may not be applicable. Nowadays, anti-malware is often found as is implemented in Kaspersky Lab’s products. Many IT risk mitigation strategies
a part of comprehensive security solutions. include recommendations for using Application Control.
Software Management
A number of options within Kaspersky Security Center empower the system
administrator to track and manipulate software. The Inventory option allows the
tracking of installed software; invaluable when implementing Application Control
scenarios. Package Installation allows the creation and management of installation
packages — including Kaspersky Lab apps or sets of standalone packages. Image
Deployment facilitates the rollout of whole system images comprising all the apps
necessary for ongoing business processes; it speeds up new system installation
as well as allowing for rollback in the case of a software malfunction that’s beyond
immediate repair.