Private Security Network

Global Threat Intelligence

Complex and focused threats tend to inflict incomparably greater damage than mass malware can generate. In the face of such threat environment, the value of the security intelligence delivered by Kaspersky Security Network cannot be overestimated. Using real-time data from 80 million sensors globally, every object passing through protected by Kaspersky Lab solutions is subject to analysis based on the most relevant threat intelligence.

Adapted for Critical Network Isolation

Kaspersky Private Security Network can be installed within your own data center; your in-house IT specialists retain complete control. So your IT infrastructure and SOC can enjoy all the benefits of cloud-assisted security without compromising on privacy, and in compliance with regulatory requirements requiring that no item of data leaves your perimeter.

  • Real Time Threat Intelligence

    Global threat intelligence from Kaspersky Lab provides all the information needed - in real time - to mitigate daily security incidents and investigate potential attacks.

  • Rapid Threat Detection

    Standard security solutions take up to four hours to detect and block new malware. Kaspersky Private Security Network takes less than 60 seconds – without a single piece of data leaving your local network.

  • Immediate Reaction

    Immediate response and reaction capabilities, driven by the latest, cloud-based threat intelligence - delivered within the controlled, local network.

Suitable For

Kaspersky Private Security Network is ideal for:

The Use

  • Threat Intelligence Delivered Within a Controlled Local Network

    It takes up to four hours for a standard security solution to detect, record and block the 305,000+ new malicious programs Kaspersky Lab researchers detect every day. Kaspersky Private Security Network delivers information about new threats to security solutions within 60 seconds – without a single piece of data leaving your local network.

  • Compliance with Regulatory Security and Privacy Standards

    Kaspersky Private Security Network is installed entirely within the organizational perimeter. There is zero outbound data flow: one-way inbound communication allows the integrity of your security database to be maintained through continuous updates. This enables organizations with stringent data privacy obligations – such as financial services or government agencies – to benefit from cloud-assisted security without compromising on privacy.

  • Tailored URL and File Reputation Inputs

    As well as creating your own URL and file reputations, you can now benefit from reputations and other information provided by external 3rd party systems - all feeding directly into your KPSN installation, with no intermediate steps, via an API. A new file reputation format is also supported, ensuring forward compatibility with future versions of Kaspersky Endpoint Security.

24/7

Premium Support

Professional help is available whenever you need it. Operating in more than 200 countries, from 34 offices worldwide, we have you covered 24/7/365. Take advantage of our Premium support packages, or call on our Professional Services to ensure that you derive maximum benefit from your Kaspersky lab security installation.

System Requirements

The Threats

Regulations concerning data-sharing should not result in compromised security due to being unable to access powerful security databases and crucial intelligence in real time. Attempting to function without such intelligence can result in:

  • Scan

    Strict regulatory, security and privacy standards for data access

  • Scan

    Physically isolated networks being unable to receive cloud reputation

  • Scan

    Signatures updates requires a lot of time (up to 3-4 hours)

  • Scan

    Lower detection rates and threat sharing

  • Scan

    High damage caused by new cyberthreats and zero-days

  • Scan

    National and geographical restrictions on data sharing

Let’s Start the Conversation and talk to one of our experts about how True Cybersecurity could inform your corporate security strategy, please get in touch.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

Accept and Close