Kaspersky Small Office Security is exclusively designed for small businesses. It delivers highly affordable world-class PC and server protection that is quick and simple to install, configure and use. You can manage your entire business network security from a single PC – performing all the tasks needed to keep your business reputation safe and your confidential information secure, without leaving your desk. Kaspersky Small Office Security takes care of your network’s protection so you can take care of your business.
small office看说明感觉是像国内一些民用的多电脑管理杀软
而Kaspersky Endpoint Security 才算的上真正的企业版
Best-of-breed anti-malware protection
Using signature-based, proactive defense technologies and the power of the cloud-assisted Kaspersky Security Network, the application intelligently scans workstations, servers and analyzes system and application behaviors. Because the Kaspersky architecture is tightly integrated, all program components work together for maximum protection with a light resource footprint.
Powerful controls
Application Control, Device Control and Web Control bring a comprehensive level of manageability and deeper protection to the endpoint. Administrators can restrict access to external devices and non-essential websites. A customizable whitelist or blacklist of applications and tools to limit their privileges add to Kaspersky’s protective measures, which increase employee productivity, data protection and IT policy enforcement.
Flexible, centralized administration
Using the Kaspersky Security Center application, remotely install the solution on workstations and servers, set protection parameters, manage anti-malware updates, monitor security status and respond to events. Features such as centralized vulnerability flagging, virtual machine support and sub-administration capabilities are also included.
Proactive technologies and heuristics
System Watcher and other proactive components in Kaspersky Endpoint Security 8 for Windows deliver protection against threats that have not yet been recorded in signature databases. Using Behavior Streams Signature patterns, suspicious behaviors are analyzed, immediate action is taken and, if necessary, unwanted changes are rolled-back and damaged data is restored.
|