{"id":14908,"date":"2013-11-15T16:26:57","date_gmt":"2013-11-15T16:26:57","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1173"},"modified":"2020-02-26T10:45:23","modified_gmt":"2020-02-26T15:45:23","slug":"the-ten-most-important-features-of-kaspersky-small-office-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/the-ten-most-important-features-of-kaspersky-small-office-security\/14908\/","title":{"rendered":"The ten most important features of Kaspersky Small Office Security"},"content":{"rendered":"<p>The third version of our small business IT protection kit, Kaspersky Small Office Security, has been <a href=\"https:\/\/business.kaspersky.com\/kaspersky-small-office-security-a-solid-defense-for-small-businesses\/\" target=\"_blank\" rel=\"noopener nofollow\">released<\/a>. Let\u2019s take a closer look at what\u2019s available in the new solution. This product review describes the ten most interesting and useful features.<\/p>\n<p>First of all, it should be noted that everyone can try KSOS before purchasing it. The trial version may be downloaded <a href=\"https:\/\/www.kaspersky.com\/small-office-trial?redef=1&amp;reseller=blog_b2b_en-global\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>: for thirty days it will be fully functional. The file size is 205 megabytes.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015737\/1-4.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1174\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015737\/1-4.png\" alt=\"1\" width=\"1024\" height=\"768\"><\/a><\/b><\/p>\n<p>Kaspersky Small Office Security is designed for small companies that may not have full-time professional system administrators. In such cases, employees are engaged in administration and they are not fond not of having to spend a lot of time on these activities since they have other tasks to handle. A key feature of KSOS is the simplicity of the interface.<\/p>\n<p><b>1. Data Protection<\/b><\/p>\n<p><b>Kaspersky Small Office Security<\/b> contains all the necessary tools to protect individual computers and local area networks. Protection components include antivirus software (file antivirus, email antivirus, network antivirus and instant messaging antivirus), applications launch control, firewall, network attacks blocker and other tools.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015736\/2-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1175\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015736\/2-1.png\" alt=\"2\" width=\"1024\" height=\"764\"><\/a><\/b><\/p>\n<p>All of these can be enabled or disabled by the administrator (or whoever performs his\/her function), and may be configured separately.<\/p>\n<p><b>2. Data Backup<\/b><\/p>\n<p>This aspect of the software offers five options for backing up data: folders in \u201cDesktop\u201d and \u201cMy Documents\u201d, video files, images\/photographs and music.<\/p>\n<p>Kapsersky Small Office Security automatically analyzes the contents of folders, counting the number of files and the amount of data.<\/p>\n<p>The fifth option is to manually select folders to back up.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06015811\/3.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1176\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015731\/3-4.png\" alt=\"3\" width=\"1024\" height=\"768\"><\/a><\/b><\/p>\n<p>Auser is asked to set the backup schedule, the number of copies and the location of the archives. There are local drives as well as popular services like Dropbox among the options.<\/p>\n<p><b>3. Web policies \u2013 restricting and logging user activity<\/b><\/p>\n<p><b>Configuring web policies<\/b> may be the most time-consuming for a user when doing it for the first time. Web policies are disabled by default. The options are: Collecting Data (of user actions), Soft Restrictions (with user activities logged and access to undesirable resources blocked), and Hard Restrictions (adding forbidden file downloads).<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06015810\/4.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1177\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015729\/4-1.png\" alt=\"4\" width=\"1024\" height=\"764\"><\/a><\/b><\/p>\n<p>Custom settings are available too, allowing you to set rules for using the computer (or computers) in general.\u00a0 Specific applications, web resources, instant messengers, social networks, and even certain words and phrases can be blocked. The level of strictness is entirely up to the business owner.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015736\/5-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1178\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015736\/5-1.png\" alt=\"5\" width=\"1024\" height=\"764\"><\/a><\/b><\/p>\n<p>By returning to the main screen and clicking the up arrow in the lower right corner you can open the full menu.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06015809\/6.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1179\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/06015809\/6.png\" alt=\"6\" width=\"1024\" height=\"764\"><\/a><\/b><\/p>\n<p>Here, there is a full list of the key program features including:<\/p>\n<p><b>4. <a href=\"https:\/\/www.kaspersky.com\/kaspersky-password-manager\" target=\"_blank\" rel=\"noopener nofollow\">Password Manager<\/a><\/b><\/p>\n<p>This function allows you to reduce the burden of remembering passwords by saving users from having to memorize dozens of passwords for multiple resources.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015735\/7-3.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1180\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015735\/7-3.png\" alt=\"7\" width=\"1024\" height=\"764\"><\/a><\/b><\/p>\n<p>Password Manager allows an administrator to assign a master password, generates crack resistant pairs of logins and passwords for different resources and stores them encrypted in a specified location (for example, on a flash drive). Passwords are entered automatically.<\/p>\n<p><b>5. Data Encryption<\/b><\/p>\n<p>This function is often neglected. However, if the company processes any sensitive personal information of other people, encryption becomes a necessity.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015733\/8-1-1024x764.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1181\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015733\/8-1.png\" alt=\"8\" width=\"1024\" height=\"764\"><\/a><br>\n<\/b><\/p>\n<p>This option allows users to create a container (or connect one that already exists). For example, a container could be a password-protected folder on a local or external drive where the data is stored in an encrypted form while remaining accessible only to those who know the password.<\/p>\n<p>6. <b><a href=\"https:\/\/www.kaspersky.com\/downloads\/pdf\/kaspersky_lab_whitepaper_safe_money_eng_final.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Safe Money<\/a><\/b><\/p>\n<p>This application protects all financial transactions by automatically launching an ultra-secure browser.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015828\/9-1024x764.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1182\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015828\/9.png\" alt=\"9\" width=\"1024\" height=\"764\"><\/a><\/b><\/p>\n<p>With the growing prevalence of online banking, more and more criminals are eager to profit at the expense of e-banking users. All kinds of phishing or grafted malicious software are used. Safe Money eliminates the likelihood of such attacks.<\/p>\n<p><b>7. Network Monitor<\/b><\/p>\n<p>Kaspersky Small Office Security allows you to monitor all activities in the local area network. We have repeatedly pointed out in our previous publications that it guarantees the secure infrastructure of the company.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015827\/10-1024x764.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1183\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015827\/10.png\" alt=\"10\" width=\"1024\" height=\"764\"><\/a><\/b><\/p>\n<p>By triggering the appropriate function, the administrator (even a provisional one) gets a visual representation of inbound and outbound traffic for each computer on the network, and what applications process what amount of the data.<\/p>\n<p><b>8. Applications Activity<\/b><\/p>\n<p>This feature allows you to inspect every process on your computer: how much memory is used, what share of system resources is taken.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015733\/11-2-1024x764.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1184\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015733\/11-2.png\" alt=\"11\" width=\"1024\" height=\"764\"><\/a><\/b><\/p>\n<p>Moreover, the legitimacy of launching applications is clearly indicated for each action, so activities of questionable applications are instantly visible.<\/p>\n<p><b>9.Management Console<\/b><\/p>\n<p>The General Management Console allows you to remotely change the security settings for each computer with Kaspersky Small Office Security on the local network and scan all resources.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015822\/12-1024x756.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1185\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015822\/12.png\" alt=\"12\" width=\"1024\" height=\"756\"><\/a><\/b><\/p>\n<p><b>10. Auxilliary Tools<\/b><\/p>\n<div class=\"pullquote\">Kaspersky Small Office Security is designed for small companies that may not have full-time professional system administrators, but still require expert protection, like any other.<\/div>\n<p>Tools are a set of additional \u201csafe\u201d instruments for protecting data.<\/p>\n<p>This section allows you to inspect the browser security settings (Internet Explorer) and change them, if necessary. You can create a backup boot disk (CD or flash drive) and reset the Windows settings if they are damaged by malware.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015732\/13-1-1024x764.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1186\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015732\/13-1.png\" alt=\"13\" width=\"1024\" height=\"764\"><\/a><\/b><\/p>\n<p>Functions like File Shredder (complete removal of data without possible restoring), Erase Your Activities History (cleaning activity log) and Unused Data Cleaner (deleting the contents of the recycle bin, browser history, temporary files, and so on) are extremely useful.<\/p>\n<p>In the next post, we will focus more on how and when to use the tools available in Kaspersky Small Office Security. The trial version of the package is available <a href=\"https:\/\/www.kaspersky.com\/small-office-trial?redef=1&amp;reseller=blog_b2b_en-global\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p><i>To be continued<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The third version of our small business IT protection kit, Kaspersky Small Office Security, has been released. Let\u2019s take a closer look at what\u2019s available in the new solution. This<\/p>\n","protected":false},"author":209,"featured_media":16487,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[298,503],"class_list":{"0":"post-14908","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-it-security","10":"tag-kaspersky-small-office-security"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/the-ten-most-important-features-of-kaspersky-small-office-security\/14908\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/the-ten-most-important-features-of-kaspersky-small-office-security\/14908\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/the-ten-most-important-features-of-kaspersky-small-office-security\/14908\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/it-security\/","name":"IT Security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14908"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14908\/revisions"}],"predecessor-version":[{"id":32968,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14908\/revisions\/32968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16487"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}