Key Benefits |
- Enables a secure cloud journey – without
compromising on protection levels
- Patented technologies and our award-winning cybersecurity
engine secure all your workloads – physical, virtualized or
cloud-based.
- Multi-layered real-time protection, powered by machine
learning, secures your data, processes and applications against
emerging threats.
- A holistic approach to data security helps reduce legal
and reputational risks relating to data protection regulations.
- Ensures that you get the most from your resources and
investments
- Agentless and light agent-based protection secure
virtualized assets in regular and software-defined networks without
impacting performance.
- Integration with native public and managed cloud security
helps secure your applications, operating systems, data flows and user
workspaces with the smallest possible resource footprint.
- Single-point-of-view management of physical and virtual
resources saves man-hours during adoption and maintenance.
- Offers transparent visibility and control regardless of
your hybrid infrastructure configuration
- Manageability and security orchestration operate
seamlessly across multiple clouds.
- Full visibility, control and holistic protection against
the most advanced threats for every workload, in every location.
- Easier security services provisioning and policy-based
operations are enabled right across your hybrid cloud.
|
Features |
- Multi-layered threat protection
- Global threat intelligence provides real-time data on the
state of the threat landscape, even as it shifts, ensuring your
protection at all times.
- Machine Learning: The big data of global threat
intelligence is processed by the combined power of machine learning
algorithms and human expertise, for proven high detection levels with
minimal false positives.
- Web and mail threat protection enables the safe
functioning of virtual and remote desktops, protecting them from email-
and web-based threats.
- File Integrity Monitoring helps ensure the integrity of
critical system components and other important files.
- Log Inspection scans internal log files for optimum
operational hygiene.
- Behavior Analysis monitors applications and processes,
protecting against advanced threats including bodiless or script-based
malware.
- Remediation Engine rolls back any malicious changes made
inside cloud workloads, if needed.
- Exploit Prevention provides effective protection against
attack spearheads while ensuring perfect compatibility with protected
applications, all with minimal impact on performance.
- Anti-ransomware functionality protects virtualized
workloads against any attempts to hold business-critical data to
ransom, rolling back affected files to their pre-encrypted state and
blocking remotely initiated encryption.
- Network Threat Protection detects and prevents
network-based intrusions into cloud-based assets.
- Container protection ensures that infections
can’t be transported into your hybrid IT infrastructure via
compromised Docker or Windows Server 2016 containers.
- System hardening boosts resilience
- Application Control lets you lock down all your hybrid
cloud workloads in Default Deny mode for optimum system hardening,
allowing you to limit your range of running applications to legitimate
and trusted only.
- Device Control specifies which virtualized devices can
access individual cloud workloads.
- Web Control regulates the use of web resources by virtual
and remote desktops to lower risks and boost productivity.
- Host-based Intrusion Prevention System (HIPS) assigns
trust categories to launched applications, restricting their access to
critical resources and limiting their capabilities.
- Borderless visibility
- Unified Security Management from Kaspersky Security
Center facilitates singlepoint-of-view security administration across
the whole infrastructure, endpoints and servers – in the
office, in your data center and in the cloud.
- Cloud API: Seamless integration with public AWS and Azure
environments enables infrastructure discovery, automated security agent
deployment and policy-based management, as well as easier
inventory and security provisioning.
- Flexible management options feature multi-tenancy
capabilities, permission-based account management and role-based access
control, providing flexibility while retaining the benefits of unified
orchestration from a single server.
- SIEM Integration: In infrastructures with more mature IT,
Security Information and Management Systems can be used as a unified
window for different aspects of a company’s cybersecurity
– across the entire hybrid IT network.
|