{"id":6057,"date":"2016-09-20T14:31:18","date_gmt":"2016-09-20T14:31:18","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=6057"},"modified":"2019-11-15T06:53:24","modified_gmt":"2019-11-15T11:53:24","slug":"cloud-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cloud-security\/6057\/","title":{"rendered":"Cloud control: Manage IT security from anywhere"},"content":{"rendered":"<p>Cyberthreats today target businesses of all sizes, so a unified solution to cover the full range of companies might seem to make sense. However, after analyzing the ways different firms protect their information infrastructure, we found it clear that small to medium-size companies operate under different conditions than larger ones. For that reason, we have developed a distinct solution to provide information security tailored specifically for SMBs \u2014 Kaspersky Endpoint Security Cloud.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Cloud control: Manage IT security from anywhere. #protectmybiz #smb<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fbe2N&amp;text=%23Cloud+control%3A+Manage+IT+security+from+anywhere.+%23protectmybiz+%23smb\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>How are SMBs different with regard to security? The big reason is easy to guess: It\u2019s about the resources businesses are willing to spend to secure themselves. Addressing that issue requires more than simply scaling down the solution according to the number of endpoints used in a company. Larger corporations can afford a special information security department; SMBs typically have to settle for generalist IT staff that, honestly, doesn\u2019t have the time to keep track of advanced security solutions. Some smaller companies have no IT department at all and have to outsource information security services.<\/p>\n<p>In other words, medium and small business require a security solution that is comprehensive and efficient, and at the same time easy to manage even in a highly diverse information infrastructure comprising servers, mobile phones, PCs, and so on. It is also highly desirable for such solution to be managed remotely, via the cloud (which would ease a lot of headaches for managed service providers).<\/p>\n<p>We kept all of that in mind while creating Kaspersky Endpoint Security Cloud. To create the product, we added cloud management features to our existing protection technologies. Fortunately, we are okay with security technologies \u2013 they work fine in other solutions of ours, and their efficiency is proved regularly, both in the wild and in the independent tests:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.av-comparatives.org\/summary-reports\/\" target=\"_blank\" rel=\"noopener nofollow\">AV-Comparatives<\/a><\/li>\n<li><a href=\"https:\/\/www.av-test.org\/en\/antivirus\/business-windows-client\/windows-8\/june-2016\/\" target=\"_blank\" rel=\"noopener nofollow\">AV Test<\/a><\/li>\n<li><a href=\"https:\/\/selabs.uk\/en\/reports\/small_business\" target=\"_blank\" rel=\"noopener nofollow\">SE Labs<\/a><\/li>\n<li><a href=\"https:\/\/www.mrg-effitas.com\/wp-content\/uploads\/2015\/04\/MRG_Real_world_enterprise_security_exploit_prevention_2015.pdf\" target=\"_blank\" rel=\"noopener nofollow\">MRG Effitas<\/a><\/li>\n<li><a href=\"https:\/\/www.virusbulletin.com\/testing\/results\/test_from\/2015-10\/vb100-antimalware\" target=\"_blank\" rel=\"noopener nofollow\">Virus Bulletin<\/a><\/li>\n<\/ul>\n<p>With cloud management in place, all we had left to do was to add equally efficient remote control tools, and so we did. Now, managing our entire multilevel solution requires neither special abilities, nor the presence of system administrators in the office, nor even extra server hardware or software. Supporting the cloud solution is up to us \u2014 clients need only visit the site and deploy our proven solutions from the cloud down to the endpoints.<\/p>\n<p>Now: How comfortable is this console to use? We asked independent test lab AV-Comparatives to perform a functional comparison of usability of the most popular similar solutions.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>AV-Comparatives awarded\u00a0Kaspersky Endpoint Security Cloud top mark: 18 of 18 points #protectmybiz #smb<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fbe2N&amp;text=AV-Comparatives+awarded%C2%A0Kaspersky+Endpoint+Security+Cloud+top+mark%3A+18+of+18+points+%23protectmybiz+%23smb\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Tested products were awarded 0 to 3 points on each of six criteria. Kaspersky Endpoint Security Cloud appeared to be the only solution to score 18 out of 18 points. The detailed results of the study are available <a href=\"http:\/\/www.av-comparatives.org\/wp-content\/uploads\/2016\/09\/avc_ccc_201608_en.pdf\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>As a result, we can say we\u2019ve got a solution that is objectively comfortable as well as capable of managing a lot of workstations, mobile devices, and file servers from any Internet-enabled device. It doesn\u2019t require any extra spending on hardware. You are welcome to check out our new product: The trial version is available at <a href=\"https:\/\/kas.pr\/Fat4\" target=\"_blank\" rel=\"noopener\">cloud.kaspersky.com<\/a>. Feel free to test its usability and efficiency for yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have developed a distinct solution to provide information security tailored specifically for SMBs \u2014 Kaspersky Endpoint Security Cloud.<\/p>\n","protected":false},"author":2408,"featured_media":15323,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[816,2462,97,2304],"class_list":{"0":"post-6057","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cloud","10":"tag-kaspersky-endpoint-security-cloud","11":"tag-security-2","12":"tag-smb"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cloud-security\/6057\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cloud-security\/6057\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cloud-security\/6057\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cloud\/","name":"cloud"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/6057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2408"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=6057"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/6057\/revisions"}],"predecessor-version":[{"id":30149,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/6057\/revisions\/30149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15323"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=6057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=6057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=6057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}