Familiarize yourself with the product and what we offer in 7 SIMPLE STEPS. 




File, Web, Mail Threat protection

LICENSE COVERAGE / STEP 1

ADDITIONAL EXCLUDED SHIPPING LOCATION: USA, UK - payment will be return.

  • 25 Workstations / Servers - Windows OS/ Windows Server OS / macOS/ Linux OS - check supported version below
  • 25 Mobile devices - Android OS/ HarmonyOS / iOS
  • License terms: Per Month
  • Can be activated in: Europe
  • Support included for the license period
  • License activation: 1 Digital Certificate Key activates all devices *managed by Kaspersky MSP (You will receive file issued by Kaspersky Security Cernter Administration server so your device can sync with server and activate the security policy)

*IMPORTANT MANAGEMENT OPTIONS:


Management from KSC Cloud Console requires license for a minimum of 20 devices. With a license for less than 20 devices, you must have your own server to configure, activate and manage the product. 

  

You have 2 options: 

  


Option 1: Do it yourself

  • On-premises management & KSC Cloud management
  • Our security experts can help with installation and configuration if you wish (send us only a message)



Option 2: With us in cloud - Recommended (fast, easy, cheap and secure) 

  • No need to have or maintain a server
  • No need to invest time in searching how to install, setup or configure different features
  • As an authorized Kaspersky partner, we can configure your company profile in our Kaspersky Security Center Cloud Console in which you will get a dedicated (your own) instance of KSC Administration server.
  • Management from Kaspersky Security Center Cloud Console - 1:1 management like on-premise
  • Receiving security reports - review them for 5 min/week
  • Get the most out of product effectiveness with the EPIX Security Team who can react in case of issue (according to our Maintenance Policy which you will also receive)




 
WHAT YOU WILL RECIEVE WITH ORDERING THE PRODUCT FROM EPIX / STEP 2

  1. 1 (one) Digital license key ( One Activation code for all devices )
  2. Invoice
  3. Certificate issued by Kaspersky (product license)

    Additional premium gifts included with the product for FREE from our team:

  4. Pre-set customized policy according to the best practices established by EPIX Security Team
  5. Step-by-step Guide with screenshots if you want to configure yourself
  6. Best Practices Guide with screenshots - How to set up the product yourself more effectively

    Technical Support - Free Configuration Included in the purchase of Kaspersky B2B - Pre-set, policies, step by step guide, best practices, technical support by epix.bg 

  7. FREE CONFIGURATION by our team INCLUDED - our experts will configure everything for you - send us only an eBay message
  8. Technical support included for the period of the license terms





WHAT COVER KASPERSKY ENDPOINT SECURITY FOR BUSINESS ADVANCED / STEP 3


Enterprise cyber security solutions for SMBs with small cyber security budget for advanced and unknown threats

Best antivirus endpoint security for business enviroment

Agile adaptive security


Fully protect your dataemployees and infrastructure, without impacting on performance. 
Most reliable threat intelligence to spot and counter new and emerging threats heading your way.
Recognize threat behavior patterns, so even unknown threats can be neutralized. 
Reduce your attack surface by controlling what applications, websites and devices can interact with your endpoints and users. 



A single solution for any platform


The best possible security for every workstation, server and mobile device that carries your data – wherever it sits and whether or not you own it. Think about threat entry-points, too, and how to protect web and email gateways without making more work for yours team.
Cover every OS in your mixed environment - including Windows, Mac, Linux, iOS and Android – with a single solution, working from a single console. 



Flexible management and task automation


High levels of automation – particularly for essential but 
routine tasks like patching and OS deployment. Your team’s time and expertise is too valuable to waste.
Remote management capabilities – whether setting up workstations in home offices, or securing data with encryption options.
Centralization. No dodging between consoles - you need straightforward, integrated single-screen management, at your perimeter or in the cloud. 




Multiple protection layers for 

  • Windows, Linux and Mac 
  • Windows and Linux servers 
  • Windows Server containers 
  • Android and other mobile devices 
  • Removable storage 



Unparalleled defense against 

  • Software exploits
  • Ransomware 
  • Mobile malware 
  • Advanced threats 
  • Fileless threats 
  • PowerShell & script-based attacks 
  • Web threats 



Features included 
  • File, web, network and mail threat protection 
  • Protection for Workstations, Servers and mobile devices 
  • Behavior Detection 
  • Ransomware, exploit prevention and remediation 
  • Anti-Malware 
  • Vulnerability Assessment 
  • Security Policy Adviser 
  • Process isolation 
  • Application Control for PC, Server & Mobile 
  • Web Control for PC, Server & Mobile 
  • Device Control for PC, Server & Mobile 
  • Defense for Workstations, Servers 
  • Mobile Threat Defense 
  • Exploit Prevention and Rollback 
  • Host Intrusion Prevention System (HIPS) 
  • Firewall and OS firewall management 
  • Cloud-assisted protection 
  • Reporting 
  • Remote Data Wipe 
  • Cloud console 
  • Web and MMC based consoles 
  • Full integration with Kaspersky EDR Optimum (add-on) 
  • Full integration with Kaspersky Sandbox (add-on)
  • AMSI, Microsoft Active Directory, Syslog, RMM, PSA, EMM integration 

 

Additional features included in Advanced compared to Kaspersky Business Advanced:

  • Adaptive Anomaly Control 
  • Patch management 
  • Encryption management 
  • Hardware & Software Inventory  
  • Web, Email threat protections and controls for servers 
  • Server and container protection   
  • Advanced SIEM integration via Syslog 
  • OS and third-party installation 




EXTRA IS INCLUDED WITH THE PRODUCT FOR FREE /STEP 4



As an authorized KASPERSKY PARTNER for reselling and supporting B2B products in third-party markets, we have developed additional policies and best practices so after purchase you will get the most of the product in a short time without searching how to use it.

  • Step-by-step Guide with screenshots - If you want to configure yourself
  • Best Practices Guide with screenshots - How to set up the product yourself more effectively
  • Free configuration included - our experts will configure everithing for you - send us only a eBay message
  • Technical support in period of the license



  • File, Web, Mail Threat protection

    WHICH SECURITY APPS CAN YOU USE WITH THE PRODUCT LICENSE? / STEP 5
    Kaspersky endpoint security for Business Select vs Advanced License covered

    Any license lets you use all these applications:

    • Kaspersky Security Center
    • Kaspersky Endpoint Security for Windows / Linux / Max
    • Kaspersky Endpoint Security for Windows Server
    • Kaspersky Security for Mobile - Android / iOS/ HarmonyOS



    WINDOWS: General requirements

     CPU: 1 GHz processor for workstations (1.4 GHz for servers) that support the SSE2 instruction setr
     RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS or server)
     Hard drive space: minimum 2 GB of free space

    Operating systems
    •  Windows 11
    •  Windows 10 all versions
    •  Windows 8.1
    •  Windows 8
    •  Windows 7 all versions, Service Pack 1 or later
    •  Windows Server 2008 R2 all versions, Service Pack 1 or later
    •  Windows MultiPoint Server 2011 or later
    •  Small Business Server 2011 or later
    Virtual platforms
    •  VMWare Workstation 16 Pro or later
    •  VMWare ESXi 7.0U1a or later
    •  Microsoft Hyper-V 2019 Server or later
    •  Citrix Virtual Apps and Desktops 7 2009 or later
    •  Citrix Provisioning 2009 or later
    •  Citrix Hypervisor 8.2 LTSR or later



    WINDOWS SERVERGeneral requirements

     CPU: 2.4 GHz quad-core
     RAM: 2 GB
     Hard drive space: minimum 4 GB of free space

    Operating systems

    •  Windows Server 2022
    •  Windows Server 2019 all versions
    •  Windows Server 2016 all versions
    •  Windows Server 2012 all versions
    •  Windows Server 2008 all versions, Service Pack 1 or later
    •  Windows Server 2003 all versions, Service Pack 2 or later
    •  Windows Storage Server 2012 or later
    •  Hyper-V Server 2012 or later
    •  Windows MultiPoint Server 2011 or later
    •  Small Business Server 2008 or later



    LINUX: General requirements

     CPU: Core 2 Duo 1.86 GHz or higher processor
     RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS)
     Hard drive space: minimum 1 GB of free space
     Swap partition of at least 1 GB

    Operating systems

    •  CentOS 6.7 or later, x86 / x64
    •  Debian GNU / Linux 9.4 or later, x86 / x64
    •  Red Hat® Enterprise Linux® 6.7 , x86
    •  Red Hat® Enterprise Linux® 7.2 or later, x64
    •  Linux Mint 19 , x86
    •  Linux Mint 20.1 and later, x64
    •  ALT Education/Workstation/Server 9, x86 / x64
    •  AlterOS 7.5 and later, x64
    •  Amazon Linux 2, x64
    •  Astra Linux Common Edition (operational update 2.12), x64
    •  Astra Linux Special Edition RUSB.10015-01 (operational update 1.5 and 1.6), x64
    •  Astra Linux Special Edition RUSB.10015-16 (release 1) (operational update 1.6), x64
    •  EulerOS V2.0SP2 2.2.17, x64
    •  EulerOS V2.0SP5 2.5.6, x64
    •  openSUSE Leap 15.0 and later, x64
    •  Oracle Linux 7.3 and later, x64
    •  Oracle Linux 8.0 and later, x64
    •  Pardus OS 19.1, x64
    •  SUSE Linux Enterprise Server 12 SP5 and later, x64
    •  SUSE Linux Enterprise Server 15 and later, x64
    •  Ubuntu 18.04 LTS and later, x64
    •  Ubuntu 20.04 LTS, x64
    •  GosLinux 7.2 , x64
    •  Mageia 4, x86
    •  Red OS 7.3, x64



    MACGeneral requirements

     CPU: Intel®-based Mac
     RAM: 4 GB
     Hard drive space: minimum 5 GB of free space

    Operating systems

    •  macOS 10.14 or later

    Virtualization

    •  Parallels Desktop 16 for Mac Business Edition
    •  VMware Fusion 11.5 Professional or later

    MOBILE: General requirements

     Screen resolution of 320x480 pixels or more
     65 MB of free space in the main memory of the device

    Operating systems

    •  Android 8 - 13–13.0 (excluding Go Edition)
    •  iOS 10.0–16.0 or iPadOS 13–16



    Supports integration with EMM systems
    •  VMWare AirWatch 9.3 or later
    •  MobileIron 10.0 or later
    •  IBM Maas360 10.68 or later
    •  Microsoft Intune 1908 or later
    •  Citrix Provisioning 2009 or later
    •  CitSOTI MobiControl 14.1.4 (1693) or later



    HOW KASPERSKY ENDPOINT SECURITY FOR BUSINESS ADVANCED PROTECT YOUR BUSINESS ENVIROMENT/ STEP 6





    Multilayered threat detection

    Multi-layered Anti-Malware 

    Our latest anti-malware engine combines signature-based protection, heuristic and behavioral analysis plus cloud-assisted technologies to protect your Windows workstations from known, unknown and advanced malware threats. Pattern-based detection technology improves detection rates and helps us to reduce the size of update files, so you benefit from reliable security that consumes less of your communications bandwidth.




    Progressive spoofing and BEC detection

    File Threat Protection 

    Anti-virus detects and eliminates threats on a device in real-time by using the application’s

    anti-virus databases and the Kaspersky Security Network cloud service.




    Email compromise prevention

    Mail Threat Protection 

    This security application component scans incoming and outgoing email messages for

    threats. It starts when the application starts, resides in the device RAM, and scans all

    messages sent or received via the POP3, SMTP, IMAP and NNTP protocols.




    small-to-medium-business-security-1

    Web Threat Protection 

    This component protects incoming and outgoing data that’s sent to and from a device

    over HTTP, HTTPS and FTP protocols, and prevents dangerous scripts from running on

    the device.




    Firewall 

    The firewall protects each endpoint against network threats when browsing the internet

    or using a local network. It blocks unauthorized network connections to the computer,

    reducing the risk of infection. It monitors the network activity of applications on the

    device, which reduces the risk of malware propagation in the network. It also restricts

    actions performed by users who violate the company’s security policy (intentionally or

    otherwise).




    Host Intrusion Prevention

    Host Intrusion Prevention prevents applications from performing actions that may be

    harmful to the operating system, and controls access to operating system resources and

    personal data.




    Network Threat Protection

    This component scans a device’s inbound network traffic for activity typical of a network

    attack, such as the intrusion of a remote device into the operating system. When

    Network Threat Protection detects an attempted network attack on the device, it blocks

    network activity from the attacking computer.




    Behavior detection collects information about the actions of applications on a user computer and provides this information to other components for more effective protection

    Behavior Detection

    Behavior Detection collects information about the actions of applications on a user’s

    computer and provides this information to other components for more effective

    protection.




    Flexible protection policies

    Exploit Prevention

    Exploit Prevention tracks executable files run by vulnerable applications.

    When there’s an attempt to run an executable file from a vulnerable application

     that wasn’t initiated by the user, the component blocks the file from running.




    Ransomware prevention and malicious activity roll-back

    Remediation Engine

    The Remediation Engine lets you roll back actions performed by malware in the operating

    system, delivering protection against cryptolockers.




    File, Web, Mail Threat protection

    Advanced Disinfection Technology

     Advanced disinfection technology is aimed at purging the Windows operating system of malicious programs that have already started their processes in RAM and that prevent Kaspersky Security from removing them by using other methods. The threat is neutralized when Advanced Disinfection technology is applied.




    HTML tutorial

    Kaspersky Security Network ( KSN )

    400 million consenting customers and thousands of businesses agree to allow the cloud-based Kaspersky Security Network (KSN) to receive anonymous data about malware and suspicious behavior from their computers.

    This real-time data stream is an infrastructure of cloud services providing access to Kaspersky's online knowledge base, which contains information about the reputation of files, web resources and software.

    The use of data from the Kaspersky Security Network ensures faster responses of Kaspersky Endpoint Security to new threats, improves the performance of some protection components and reduces the likelihood of false positives.




    BadUSB Attack Prevention

    BadUSB Attack Prevention component prevents infected USB devices emulating a keyboard from connecting to the computer. When a USB device is connected to the computer and identified as a keyboard by the operating system, the application prompts the user to enter a numerical code generated by the application. This procedure is known as keyboard authorization.





    SECURITY MANAGEMENT  

     

    Device Control   

    Controls user access to external and removable devices connected to the computer.  

    Administrators can allow or block the use of certain devices by type or create a ‘trusted’ list. 

     





    Web Control  

    Allows control of user access to the internet depending on the site’s content or location.  

    Web URL blacklisting restricts users from accessing potentially harmful or undesirable  

    websites. Whitelisting allows access to safe internet resources only. 

     




     

    Application Control  

    Application Control manages the startup of applications on users’ computers and reduces the risk of computer infection by restricting access to applications. This allows you to implement a corporate security policy when using applications. 

     




     

    System Vulnerability and Patch Management  

    Streamlining and centralizing admin tasks to save time and money, as well as further heightening your security, with: 

    • Remotely manage application updates and patches on your corporate devices 
    • Advanced in-depth scanning for vulnerabilities, and automated patch distribution 
    • Time and resource-saving OS and software deployment 
    • Centralized system image creation, storage and deployment - ideal for upgrade to Microsoft Windows 10/11 
    • Hardware and software inventory reports - helping control software license obligations. 

     




     

    Remote Data Wipe 

    Enables you to remotely delete data from users’ computer. Protect data on a laptop in case it is lost or stolen 





    Installation of operating systems and applications

    Kaspersky Security Center allows you to create operating system images and deploy them on client devices on the network, as well as perform remote installation of applications by Kaspersky or other vendors. 




    Hardware and software inventory 

    Automated discovery and hardware and software tracking give administrators detailed insights into every asset on the corporate network. Automated software scanning enables rapid detection of outdated software that may pose a security risk if not kept up to date. 




    Role Based Access Control (RBAC) 

    You can configure access rights to application features for Kaspersky Security Center users by configuring the rights for each user or group of users individually. Or you can create standard user roles with a predefined set of rights and assigning those roles to users depending on their scope of duties 




    How to deploy and setup kaspersky endpoint security cloud or business select, advanced office 365 

    HOW MUCH EASY IS TO START / STEP 7


    Skills required:  2.0 ( from 1 to 5)

    Budged for business security: 1.5 ( from 1 to 5) or small budged

    Enterprise solutions for small or medium business companies without IT staff




    GET NOW THE MOST AWARDED CYBER SECURITY SOFTWARE FROM AV TEST  SUITABLE FOR SMALL AND MEDIUM BUSINESS COMPANIES FROM AUTHORIZED KASPERSKY PARTNER. 

    Check the product photos to get more insights about the product and it's features.