Software Products
About 33 products found for Software- Cyber-Immune Design: Built on KasperskyOS for security by design.
- VDI Support: Supports virtual desktop infrastructures.
- Remote Access: Enables secure access to remote applications.
- Centralized Management: Allows unified control of thin client devices.
- Secure Microkernel: Uses a minimal and highly secure kernel design.
- Component Isolation: Isolates system components to limit attack impact.
- Policy-Based Control: Strictly controls interactions between processes.
- Reduced Attack Surface: Limits exploitable system functions.
- Integration Ready: Designed for embedding into third-party solutions.
- High Performance: Optimized for fast scanning and low latency.
- File Scanning: Scans files and objects for malicious content.
- Data Stream Analysis: Analyzes data streams in real time.
- Machine Learning Analysis: Uses ML models to analyze large data sets.
- Unknown Threat Detection: Detects threats without known signatures.
- Behavioral Monitoring: Monitors activity across systems and processes.
- Early Warning: Value: Provides early alerts for suspicious activity.
- Phishing Simulations: Tests employee response to phishing attacks.
- Automated Campaigns: Runs training and simulations automatically.
- Learning Paths: Provides structured cybersecurity training programs.
- User Assessment: Measures employee security behavior over time
- Global Threat Coverage: Covers threats observed worldwide.
- Indicators of Compromise: Supplies IOCs for faster threat detection.
- Malware Analysis: Delivers insights into malware behavior and risks.
- Threat Context: Adds context to security alerts and incidents.
- Behavioral Analysis: Detects abnormal user behavior patterns.
- Account Protection: Prevents account takeover attempts.
- Transaction Monitoring: Analyzes online payment activities.
- Device Profiling: Identifies suspicious or risky devices.
- Real-Time Monitoring: Continuously monitors airspace activity.
- Drone Tracking: Tracks drone movement and flight paths.
- Threat Identification: Identifies drone types and behavior.
- Area Protection: Secures restricted and sensitive locations.
- Asset Visibility: Identifies and monitors OT and ICS assets.
- Industrial Protocol Support: Supports common industrial communication protocols.
- Non-Intrusive Monitoring: Operates without disrupting industrial processes.
- Centralized Management: Provides a unified view of OT security status.
- Data Sovereignty: Ensures no security data is shared externally.
- Threat Intelligence: Uses Kaspersky detection technologies locally.
- Reputation Services: Provides local file and URL reputation checks.
- Compliance Support: Meets strict regulatory and security requirements.
- Real-Time Correlation: Correlates events to identify security incidents.
- Threat Detection: Detects suspicious activity and potential threats.
- Alerting: Generates alerts for critical security events.
- Log Management: Stores and manages large volumes of log data.
- Runtime Protection: Monitors containers for suspicious behavior during execution.
- Kubernetes Support: Integrates with Kubernetes environments.
- Vulnerability Detection: Identifies known weaknesses in container images.
- Policy Enforcement: Applies security rules across container workloads.
- Virtual Machine Security: Protects VMs from malware and advanced threats.
- Centralized Management: Manages security policies from a single console.
- Advanced Threat Detection: Detects sophisticated attacks on cloud workloads.
- System Integrity Monitoring: Monitors critical system changes in cloud environments.
- Secure Connectivity: Protects data traffic between network locations.
- Traffic Optimization: Routes traffic based on performance and policies.
- Centralized Management: Manages all sites from a single console.
- Link Aggregation: Uses multiple network links for better reliability.
- Zero-Day Protection: Detects previously unknown exploits.
- Behavioral Analysis: Analyzes suspicious behavior to identify attacks.
- Sandbox Analysis: Safely analyzes suspicious files in isolation.
- Network Traffic Analysis: Detects malicious activity in network communications.
- URL Filtering: Controls access to websites by category.
- Real-Time Traffic Scanning: Scans web traffic as it passes through the gateway.
- Phishing Protection: Prevents access to phishing and fake websites.
- Malware Detection: Identifies and blocks web-delivered malware.
- Phishing Defense: Prevents phishing and social engineering attacks.
- Spam Filtering: Reduces unwanted and harmful email traffic.
- Real-Time Scanning: Scans emails as they pass through the server.
- Attachment Control: Inspects and blocks dangerous file types.
- Malware Detection: Scans attachments and links for malware.
- Exchange Online Security: Protects Microsoft Exchange Online mailboxes.
- OneDrive Protection: Scans files stored in OneDrive for threats.
- SharePoint Protection: Secures shared documents and collaboration spaces.
- Extended Threat Detection: Identifies advanced and multi-stage cyber attacks.
- Incident Response Support: Provides expert guidance during security incidents.
- Centralized Visibility: Offers a unified view of detected threats.
- Alert Prioritization: Filters and prioritizes critical security alerts.
- Extended Threat Visibility: Provides deep insight into complex attack chains.
- Threat Hunting: Enables proactive search for hidden threats.
- Incident Investigation: Supports detailed attack analysis and timelines.
- Centralized Workspace: Unifies alerts and investigations in one console.
- Extended Detection: Detects attacks spanning multiple security layers.
- Centralized Visibility: Provides a unified view of security incidents.
- Incident Investigation: Helps analyze attacks across connected systems.
- Guided Response: Assists teams in responding to incidents effectively.
- Deep Endpoint Visibility: Provides detailed telemetry from protected endpoints.
- Incident Investigation: Supports full attack timeline and root cause analysis.
- Manual Response Actions: Allows precise containment and remediation actions.
- Automated Response: Supports automated actions for faster threat control.
- Automated Response: Automatically isolates and contains infected endpoints.
- Endpoint Monitoring: Continuously tracks endpoint activities in real time.
- Behavioral Analysis: Identifies threats using behavior-based detection.
- Incident Investigation: Provides detailed attack context and timelines.
- Threat Detection: Identifies suspicious and malicious endpoint behavior.
- Incident Investigation: Provides visibility into attack timelines and activities.
- Guided Response: Helps security teams contain threats quickly.
- Behavioral Analysis: Detects threats beyond signature-based methods.
- Application Control: Allows only trusted applications to run on the system.
- Device Control: Restricts USB ports and external peripherals.
- System Hardening: Reduces attack surface by locking down system components.
- Centralized Management: Managed through Kaspersky Security Center.
- Ransomware Defense: Advanced ransomware protection with rollback
- Endpoint Coverage: Windows PCs, laptops, and file servers
- Email Security: Protection against phishing and malicious attachments
- Web Security: Blocks unsafe websites and downloads
- Program license: Microsoft Windows Server CAL 2019
- Platform: Windows
- Number of licenses: 1
- Delivery type: OEM
- Colour: White
- Model: 6GQ-01172
- Type: Software CD
- Subscription: 1 Year Subscription
- SKU: T5D-03514-M5
- User & Subscription: 1 Time Purchase for 1 Device
- Processor Requirements: Windows 11 or Windows 10 with 1.6 GHz, 2-core processor/recent macOS
- Operating System Requirements: Windows 11 or Windows 10 for PC; Mac OS for Mac
- Software type: Original Equipment Manufacturer (OEM)
- License quantity: 1 license(s)
- Minimum storage drive space: 64 GB
- Minimum RAM: 4.1 TB
- OS: Windows 10
- Model: Pro
- Duration: Lifetime
- Architecture: 64 Bit
- Part Number: P11065-A21
- Operating System: Microsoft Windows Server 2019 Standard – After Point of Sale (APOS),Microsoft Certificate of Authenticity (COA)
- Product Type: Licence
- Localisation: EMEA
Showing 1-33 of 33 results.
