Here is our collection of Software

Unleashing the potential of technology. Innovative programs and applications that transform ideas into reality. From productivity tools to entertainment, software drives efficiency, creativity, and connectivity in the digital age. Embrace the power of software to unlock endless possibilities.

  • MICROSOFT SERVERS

    Show
  • OFFICE APPLICATIONS

    Show
  • MICROSOFT OFFICE

    Show
  • WINDOWS

    Show
  • CUSTOMIZED CRM

    Show
  • ID Card Printing Software

    Show
  • Endpoint Security

    Show
  • EDR / XDR

    Show
  • Email Security

    Show
  • Network Security

    Show
  • Cloud Security

    Show
  • SIEM & SOC

    Show
  • Industrial / OT Security

    Show
  • Fraud Prevention

    Show
  • Threat Intelligence

    Show
  • Security Platforms & Tools

    Show
  • OS & Cyber-Immune Systems

    Show

Software Products

About 33 products found for Software
Order by
  • Cyber-Immune Design: Built on KasperskyOS for security by design.
  • VDI Support: Supports virtual desktop infrastructures.
  • Remote Access: Enables secure access to remote applications.
  • Centralized Management: Allows unified control of thin client devices.
  • Secure Microkernel: Uses a minimal and highly secure kernel design.
  • Component Isolation: Isolates system components to limit attack impact.
  • Policy-Based Control: Strictly controls interactions between processes.
  • Reduced Attack Surface: Limits exploitable system functions.
  • Integration Ready: Designed for embedding into third-party solutions.
  • High Performance: Optimized for fast scanning and low latency.
  • File Scanning: Scans files and objects for malicious content.
  • Data Stream Analysis: Analyzes data streams in real time.
  • Machine Learning Analysis: Uses ML models to analyze large data sets.
  • Unknown Threat Detection: Detects threats without known signatures.
  • Behavioral Monitoring: Monitors activity across systems and processes.
  • Early Warning: Value: Provides early alerts for suspicious activity.
  • Phishing Simulations: Tests employee response to phishing attacks.
  • Automated Campaigns: Runs training and simulations automatically.
  • Learning Paths: Provides structured cybersecurity training programs.
  • User Assessment: Measures employee security behavior over time
  • Global Threat Coverage: Covers threats observed worldwide.
  • Indicators of Compromise: Supplies IOCs for faster threat detection.
  • Malware Analysis: Delivers insights into malware behavior and risks.
  • Threat Context: Adds context to security alerts and incidents.
  • Behavioral Analysis: Detects abnormal user behavior patterns.
  • Account Protection: Prevents account takeover attempts.
  • Transaction Monitoring: Analyzes online payment activities.
  • Device Profiling: Identifies suspicious or risky devices.
  • Real-Time Monitoring: Continuously monitors airspace activity.
  • Drone Tracking: Tracks drone movement and flight paths.
  • Threat Identification: Identifies drone types and behavior.
  • Area Protection: Secures restricted and sensitive locations.
  • Asset Visibility: Identifies and monitors OT and ICS assets.
  • Industrial Protocol Support: Supports common industrial communication protocols.
  • Non-Intrusive Monitoring: Operates without disrupting industrial processes.
  • Centralized Management: Provides a unified view of OT security status.
  • Data Sovereignty: Ensures no security data is shared externally.
  • Threat Intelligence: Uses Kaspersky detection technologies locally.
  • Reputation Services: Provides local file and URL reputation checks.
  • Compliance Support: Meets strict regulatory and security requirements.
  • Real-Time Correlation: Correlates events to identify security incidents.
  • Threat Detection: Detects suspicious activity and potential threats.
  • Alerting: Generates alerts for critical security events.
  • Log Management: Stores and manages large volumes of log data.
  • Runtime Protection: Monitors containers for suspicious behavior during execution.
  • Kubernetes Support: Integrates with Kubernetes environments.
  • Vulnerability Detection: Identifies known weaknesses in container images.
  • Policy Enforcement: Applies security rules across container workloads.
  • Virtual Machine Security: Protects VMs from malware and advanced threats.
  • Centralized Management: Manages security policies from a single console.
  • Advanced Threat Detection: Detects sophisticated attacks on cloud workloads.
  • System Integrity Monitoring: Monitors critical system changes in cloud environments.
  • Secure Connectivity: Protects data traffic between network locations.
  • Traffic Optimization: Routes traffic based on performance and policies.
  • Centralized Management: Manages all sites from a single console.
  • Link Aggregation: Uses multiple network links for better reliability.
  • Zero-Day Protection: Detects previously unknown exploits.
  • Behavioral Analysis: Analyzes suspicious behavior to identify attacks.
  • Sandbox Analysis: Safely analyzes suspicious files in isolation.
  • Network Traffic Analysis: Detects malicious activity in network communications.
  • URL Filtering: Controls access to websites by category.
  • Real-Time Traffic Scanning: Scans web traffic as it passes through the gateway.
  • Phishing Protection: Prevents access to phishing and fake websites.
  • Malware Detection: Identifies and blocks web-delivered malware.
  • Phishing Defense: Prevents phishing and social engineering attacks.
  • Spam Filtering: Reduces unwanted and harmful email traffic.
  • Real-Time Scanning: Scans emails as they pass through the server.
  • Attachment Control: Inspects and blocks dangerous file types.
  • Malware Detection: Scans attachments and links for malware.
  • Exchange Online Security: Protects Microsoft Exchange Online mailboxes.
  • OneDrive Protection: Scans files stored in OneDrive for threats.
  • SharePoint Protection: Secures shared documents and collaboration spaces.
  • Extended Threat Detection: Identifies advanced and multi-stage cyber attacks.
  • Incident Response Support: Provides expert guidance during security incidents.
  • Centralized Visibility: Offers a unified view of detected threats.
  • Alert Prioritization: Filters and prioritizes critical security alerts.
  • Extended Threat Visibility: Provides deep insight into complex attack chains.
  • Threat Hunting: Enables proactive search for hidden threats.
  • Incident Investigation: Supports detailed attack analysis and timelines.
  • Centralized Workspace: Unifies alerts and investigations in one console.
  • Extended Detection: Detects attacks spanning multiple security layers.
  • Centralized Visibility: Provides a unified view of security incidents.
  • Incident Investigation: Helps analyze attacks across connected systems.
  • Guided Response: Assists teams in responding to incidents effectively.
  • Deep Endpoint Visibility: Provides detailed telemetry from protected endpoints.
  • Incident Investigation: Supports full attack timeline and root cause analysis.
  • Manual Response Actions: Allows precise containment and remediation actions.
  • Automated Response: Supports automated actions for faster threat control.
  • Automated Response: Automatically isolates and contains infected endpoints.
  • Endpoint Monitoring: Continuously tracks endpoint activities in real time.
  • Behavioral Analysis: Identifies threats using behavior-based detection.
  • Incident Investigation: Provides detailed attack context and timelines.
  • Threat Detection: Identifies suspicious and malicious endpoint behavior.
  • Incident Investigation: Provides visibility into attack timelines and activities.
  • Guided Response: Helps security teams contain threats quickly.
  • Behavioral Analysis: Detects threats beyond signature-based methods.
  • Application Control: Allows only trusted applications to run on the system.
  • Device Control: Restricts USB ports and external peripherals.
  • System Hardening: Reduces attack surface by locking down system components.
  • Centralized Management: Managed through Kaspersky Security Center.
  • Ransomware Defense: Advanced ransomware protection with rollback
  • Endpoint Coverage: Windows PCs, laptops, and file servers
  • Email Security: Protection against phishing and malicious attachments
  • Web Security: Blocks unsafe websites and downloads
  • Program license: Microsoft Windows Server CAL 2019
  • Platform: Windows
  • Number of licenses: 1
  • Delivery type: OEM
  • Colour: White
  • Model: 6GQ-01172
  • Type: Software CD
  • Subscription: 1 Year Subscription
  • SKU: T5D-03514-M5
  • User & Subscription: 1 Time Purchase for 1 Device
  • Processor Requirements: Windows 11 or Windows 10 with 1.6 GHz, 2-core processor/recent macOS
  • Operating System Requirements: Windows 11 or Windows 10 for PC; Mac OS for Mac
  • Software type: Original Equipment Manufacturer (OEM)
  • License quantity: 1 license(s)
  • Minimum storage drive space: 64 GB
  • Minimum RAM: 4.1 TB
  • OS: Windows 10
  • Model: Pro
  • Duration: Lifetime
  • Architecture: 64 Bit
  • Part Number: P11065-A21
  • Operating System: Microsoft Windows Server 2019 Standard – After Point of Sale (APOS),Microsoft Certificate of Authenticity (COA)
  • Product Type: Licence
  • Localisation: EMEA
Showing 1-33 of 33 results.
whatsapp