Back in 2004, we were the first security vendor to identify mobile malware – when we found the Cabir worm. Ever since then, we’ve continued to build on the head start we’ve had against all other security companies.
Our mobile security combines signature-based protection and heuristic analysis – plus our cloud-assisted technology, Kaspersky Security Network (KSN) – to deliver multi-layered, real-time defense against the latest mobile threats. You can scan devices on demand or according to your own pre-defined schedule. Over the Air (OTA) updates help ensure each device has the latest anti-malware installed.
Web Control tools add another layer of security against online risks and also make it easy to manage how users access the Web on their mobile devices. Malicious websites are blocked and you can block access to sites that don’t conform to corporate security or usage policies – including social media, gambling, recruitment, retailing and adult websites, plus proxy servers.
Our latest anti-phishing technologies protect users from phishing websites that can try to capture valuable information and identity details. In addition, anti-spam helps to filter out unwanted calls and texts.
When a user attempts to jailbreak or root a device, security can be compromised. Kaspersky Security for Mobile automatically detects rooting / jailbreak incidents and reports them to you. It can also automatically:
If a mobile device is lost or stolen, confidential corporate information could be at risk. That’s why we’ve included a whole host of anti-theft features that can be operated remotely – so you can:
With support for Google Cloud Messaging (GCM), Kaspersky Security for Mobile helps ensure Android phones receive these commands rapidly. In addition, our new Self-Service Portal lets users lock, wipe and locate their missing devices – without having to request help from an IT administrator.
For effective BYOD network protection and BYOD security policy, it’s essential that you have an appropriate level of control over the corporate applications that are running on employees’ mobile devices – and how each device is being used. Our control tools – together with our ‘app wrapping’ containerization – help to secure corporate data and systems.
Our containerization technology lets you wrap business apps within special containers on each user’s mobile device. Corporate applications and data are stored in the containers – totally separated from the user’s personal data. Data inside the container can’t be copied and pasted outside.
In addition, you can enforce encryption for all corporate data within each container. To help prevent sensitive corporate information being accessed by unauthorized users, Kaspersky Security for Mobile also includes a feature that makes users log into an application again, following a set period of inactivity.
If an employee moves to another company, you can make sure sensitive corporate data doesn’t leave with them. Remotely operated wipe features let you delete the entire corporate container and all data stored within it – without deleting any of the device owner’s photos, playlists, contacts and other personal data and settings.
Our easy-to-configure Application Control tools help you to manage which applications are permitted to install and launch on any of the mobile devices that you allow to access your corporate systems and data. Kaspersky Security for Mobile lets you create whitelists and blacklists of mobile applications, so you can implement a policy that only lets whitelisted applications run – or a policy that lets any application launch, unless that application is on your blacklist.
Safe Browser complements MAM by protecting users when they’re online – on any of the supported platforms. This safe Internet browsing feature blocks access to malicious websites and fraudulent phishing websites.
By enabling access to different platforms’ MDM functions – via a single interface – Kaspersky Security for Mobile saves you time and makes it easier to roll out unified mobile security policies.
With improved MDM capabilities, it’s easy to apply group or individual MDM policies to Microsoft Exchange ActiveSync and iOS MDM devices, through a single interface. For example, administrators can easily enforce the use of complex passwords, encrypt the mobile device, prohibit camera usage and receive detailed information about the device and the apps installed on it. Support for Samsung KNOX 1.0 and 2.0 lets you manage firewall settings, APN, VPN and Exchange Server settings for Samsung devices.
Our MDM functions let you customize your mobile endpoint security and then use Over the Air (OTA) provisioning to deliver the security agent to each employees’ device. You simply send a link or a QR code for each mobile device – via an email or an SMS message. This reduces the time taken to deploy new devices – while also helping you to prevent unprotected mobile devices accessing the corporate network.
Because securing and controlling mobile devices has added to the long list of tasks for IT administrators, we’ve included a range of technologies that help to reduce mobile management complexity.
To ease the load on IT administrators, Kaspersky Security for Mobile includes a Self-Service Portal that lets mobile users perform many basic administration tasks – after they’ve entered their username and password. If a user wishes to connect a new device, the Self-Service Portal will guide them through the process – and make sure the required certificates are successfully installed on the device. The portal can also give users access to key anti-theft features – including remote lock, wipe and locate functions.
Kaspersky Security for Mobile is managed from Kaspersky Security Center – a single unified management console that gives you visibility and control of all of the Kaspersky Lab endpoint security technologies that you’re running. In addition to managing the security of mobile devices, Kaspersky Security Center lets you manage security for your laptops, desktops, servers, virtual machines and more – with the convenience of a ‘single pane of glass’ console. This level of integration is only possible because all endpoint security technologies that Kaspersky Lab offers have been developed by our own in-house team.
If you’re running a large network, Role-Based Access Control* helps you to divide security management responsibilities between multiple administrators. For example, you may want one administrator to control and manage security for endpoints and mobile devices, while another administrator takes care of security across all virtual machines. The Kaspersky Security Center console can easily be customized so that each administrator only has access to the tools and information that are relevant to their responsibilities. In addition, our Web Console lets you manage mobile devices and their security – plus the security of other endpoints – from anywhere you can get online.
*Role-Based Access Control (RBAC) is only included in Kaspersky Endpoint Security for Business | Advanced and Kaspersky Total Security for Business.
With support for Android, iOS and Windows Phone, you can secure and manage all of the most popular smartphones and tablets – and all via our single management console.
Whether your business provides phones & tablets to its employees or you run a Bring Your Own Device (BYOD) initiative, keeping track of all those devices – and ensuring corporate security isn’t compromised – can be difficult and time-consuming. However, with the increasing volume of mobile malware – plus phishing attacks and malicious websites – mobile security is just as important as protecting every other endpoint in your business. Kaspersky Security for Mobile gives you security as well as centralized visibility and control – so you can see, secure and manage every mobile device that accesses your network and corporate data.
Our advanced anti-malware technologies protect mobile devices from a wide range of threats – including viruses, Trojans, phishing attacks and more. Flexible configuration tools let you control which applications can be run on each mobile device – and you can enforce different policies for specific groups or individual users within the business.
Kaspersky Security for Mobile eliminates all the guesswork in trying to manage security across all the devices that are trying to access your systems and data. It automatically identifies any new devices that appear on your network, automatically distributes mobile security technologies and simplifies the configuration of data access restrictions.
Mobile devices can store vast quantities of confidential corporate data – and that can introduce significant security issues. Weak passwords, the use of dangerous applications and a failure to encrypt data can all result in sensitive information falling into the wrong hands. Kaspersky Security for Mobile makes it easy to enforce the use of strong passwords and block the launch of inappropriate apps. Furthermore, if you’re running a BYOD initiative, our containerization technology totally separates corporate data & apps from the user’s personal information & apps. You can then apply additional security measures – including encryption – to all containerized apps and data on the device.
Every year, over 30% of all mobile devices are lost or stolen. That’s why Kaspersky Security for Mobile includes extensive anti-theft functionality that helps you to prevent precious data being accessed by unauthorized users. Remotely operated features let you block access to data and applications, wipe data from the device and find the device’s location.
With the typical user operating an average of three mobile devices, the volume and variety of devices that you have to manage can be a challenge. We support smartphones and tablets on all of today’s most popular platforms – Android, iOS and Windows Phone – so you can configure and manage protection for a vast range of devices. Furthermore, a single management console helps you to configure and control security for both mobile devices and all other endpoints that are running Kaspersky Lab security technologies.
How to deliver & manage a secure BYOD program and select technologies that protect your business systems & data.
A short illustrated guide to the solution and its key features.
Say 'yes' to mobile technologies, including BYOD, without opening new doors to security breaches.