
Giving total control over what software can run when on PCsįor a better applications categorization, Application Control uses a Dynamic Whitelisting Database developed by Kaspersky Lab, based on systemizing knowledge of legitimate software. Network Threat Protection identifies network attacks and stops them in their tracks. Protection against encryption for shared folders Behavior Detection blocks attacks, while Automatic Rollback reverses any Identifies and protects against advanced threats, including ransomware, fileless attacks and admin account takeovers. Sustained performance across multiple tests and products gives a more meaningful assessment than a one-off performance in a single test.īehavioral Detection and Automatic Rollback The TOP3 metric represents the aggregate scores achieved by over 80 well-known vendors in the security industry’s most respected, independent tests and reviews. Our products were awarded 64 firsts and achieved 70 top-three finishes. In 2019 Kaspersky products participated in 86 independent tests and reviews. Statistics data is processed in Switzerland for assured geopolitical neutrality.
Cybersecurity you can trust Businesses require neutrality and data sovereignty – our product scans, but does not harvest information. Behavior Detection blocks attacks, while Automatic Rollback reverses any changes already made. Core threat protection features Behavioral Detection and Automatic Rollback Identifies and protects against advanced threats, including ransomware, fileless attacks and admin account takeovers. It employs a full stack of proven and Next Gen technologies to prevent detected attacks built-insensors and integration with Endpoint Detection and Response (EDR) enable the discovery of even the most obscure, sophisticated cyberattacks. Agile, adaptive security The product is designed to work within any IT environment, adapting to your business needs now – and in the future – while keeping day-to-day IT running smoothly. This helps deploy security rapidly and with minimum interruption or fuss, using the wide range of preconfigured scenarios. One management console From the ‘single pane of glass’ management console, administrators can view and manage the entire security landscape and apply your chosen security policies to every endpoint in your business.