What is Auto-Renewal?
Auto-Renewal will extend your license automatically without you needing to lift a finger. Before your subscription expires, you will be charged a renewal fee to keep your protection going*. We’ll remind you about the upcoming payment beforehand via email. You can cancel Auto-Renewal at any time – in which case you’ll need to renew your license manually.
Why Auto-Renewal?
Continuous subscription & uninterrupted protection for your devices
Saves you time: no fuss over billing details & activation codes
You stay in change: we remind you about upcoming billing dates and you can unsubscribe at any time

Kaspersky Endpoint Security for Business ADVANCED
Adaptive security like no other
Your business holds sensitive data that must be kept safe, which is why we do more than just protect every endpoint. Automated EDR detects advanced threats, while server hardening enhances high-performance protection with additional application, web and device controls, to prevent the theft of corporate and financial information.
- Detects and patches vulnerabilities to reduce attack entry-points
- Saves time by automating OS and software deployment tasks
- Streamlines centralized security management with a web or cloud console
- Encrypts data to prevent damage from data leakage on a lost device
This tier includes all the functionality delivered by Kaspersky Endpoint Security for Business Select, plus additional advanced technologies that do even more to protect your business.
-

Adaptive security for everyone
Identifies vulnerabilities and applies the latest patches to close attack entry-points, as well as letting you control which applications are allowed to run on your servers. Complemented by enterprise-grade web and device controls and a centralized security management console.
-

Automated EDR against attacks
Endpoint detection and response capabilities that identify abnormal behavior, automatically detecting and remediating targeted ransomware and in particular fileless threats which try to mimic common behavior like PowerShell script execution.
-

Extra protection for servers and data
Our Linux and Windows Server security has been developed specifically for high-performance servers. Encryption functions – plus OS-embedded firewall and encryption management – guard corporate and customer information to help you achieve key compliance goals, including GDPR.
-

Simplified systems management
Automates software tasks including the creation, storage and cloning of system images – saving you time whenever you need to roll out new systems or update software on existing systems.
-

Openness… no other vendor can match
We’re pioneers in providing the highest levels of transparency and data sovereignty, as well as neutrality. We process core data in geopolitically neutral Switzerland, where our partners can review our source code.
The smart choice for security
-
Get endpoint security that adapts to new threatsWe are recognized for innovation – and have identified more advanced threats than any other vendor. Whether your IT is on-site or outsourced, our security adapts to protect you from new threats.
-
Tightly control your costsBecause we include multiple security technologies – including Automated EDR – in a single product, our offering is straightforward. You only need buy one product – with one license. And you don’t’ need a dedicated IT security team to use it.
-
Combine performance & multi-layer protectionSecurity shouldn’t slow you down. That’s why our adaptive security has minimal impact on system performance. A unique cloud mode for endpoint components uses global threat intelligence to deliver powerful defenses with minimal impact on PC resources.
-
Tests & reviews help us deliver better securityDon’t just take our word for it – over the years, our products have participated in more customer surveys and independent tests – and have achieved more first places - than any other vendor. See our awards.
-
Just turn it on - flexible centralized management for admin teams and MSPsOur role-based model helps you divide responsibilities across teams. The management console can be configured to ensure that each administrator can only access the tools and data they need.
-
Save time on administration… and boost protectionUsing real-time intelligence about exploits, automated Vulnerability Assessment & Patch Management can apply the latest security patches for a wide range of commonly used applications.
Find the security solution you need
Select the security option that fits your needs – and, when you want to add more functionality, just upgrade to the next tier of protection.
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Security policy adviser
Security policy adviser
Security policy adviser
EDR agent
EDR agent
EDR agent
Application Control for PCs
Application Control for PCs
Application Control for PCs
Device and Web Controls
Device and Web Controls
Device and Web Controls
Role-based access control1
Role-based access control1
Role-based access control1
Adaptive Anomaly Control
Adaptive Anomaly Control
Adaptive Anomaly Control
Encryption management
Encryption management
Encryption management
Vulnerability and Patch management
Vulnerability and Patch management
Vulnerability and Patch management
OS & 3rd party software installation
OS & 3rd party software installation
OS & 3rd party software installation
Application Control for servers
Application Control for servers
Application Control for servers
Security for web gateways
Security for web gateways
Security for web gateways
Security for email servers
Security for email servers
Security for email servers
Ransomware protection
Ransomware protection
Ransomware protection
Cloud-assisted intelligence
Cloud-assisted intelligence
Cloud-assisted intelligence
Single management console
Single management console
Single management console
Integration with SIEM systems1
Integration with SIEM systems1
Integration with SIEM systems1
ADDITIONAL DATASHEETS
Additional Information
ADDING MORE SECURITY AS YOU NEED IT

Kaspersky Security for Microsoft Office 365 Advanced protection for Microsoft Office 365
- Protect the mail and storage components of the Microsoft Office 365 suite: Exchange Online and OneDrive.
- Make use of the most sophisticated technologies for your security and at the same time enjoy a quick start thanks to predefined policies and auto configuration.

Kaspersky Security for Mail Server For Microsoft Exchange and Linux mail
- Scans incoming, outgoing & stored mail
- Intelligent spam filtering reduces traffic
- Prevents the loss of confidential data

Kaspersky Hybrid Cloud Security Protect your physical, virtual and cloud workloads
- Multi-layered threat protection for workloads and virtual desktops
- Unified management and orchestration across the entire hybrid infrastructure
- Scenario-specific protection for increased resource efficiency

Security for Internet Gateway Secure internet access for your employees
- Scans HTTP(s), FTP, SMTP & POP3
- Governs internet usage
- Protects multiple infrastructures through a multi-tenancy architecture

Kaspersky Sandbox Automatic protection against targeted threats
- Complements Endpoint Security for Business
- Patented proprietary technology
- Does not require expensive security experts

Applications Inside
One license lets you use all these applications:
System Requirements
For the most complete, up-to-date requirements, please refer to Kaspersky Knowledge Base.
Version requirements for subscription
Kaspersky Endpoint Security for Business can also be purchased on subscription – with flexible, monthly licensing. Please check with your local partner about subscription availability in your country – and see the relevant system requirements here.
-
General requirements
- 2 GB of free disk space on the hard drive
- Intel Pentium 1 GHz processor (that supports the SSE2 instruction set or compatible equivalent)
- RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS)
Operating systems
- Microsoft Windows 10
- Microsoft Windows 8.1
- Microsoft Windows 8
- Microsoft Windows 7 SP1 or later
- Microsoft Windows XP SP3 or later
-
Minimum configuration
- Processor: 1Core, 1.4 GHz
- RAM: 1 GB
- Free space on the hard drive: 4 GB
Recommended configuration
- Processor: 4 Core, 2.4 GHz
- RAM: 2 GB
- Free space on the hard drive: 4 GB
Operating systems
- Windows Server 2019
- Windows Server 2016
- Windows Storage Server 2016
- Windows Hyper-V Server 2016
- Microsoft Windows Server 2012 or later
- Microsoft Windows Hyper-V Server 2012 or later
- Microsoft Windows Server 2008 or later
- Windows Server 2003 or later
-
General requirements
- 1 GB of hard drive space for installation, storing temporary files and log files
- An Internet connection for activating the application and updating databases and application modules
- Intel Core 2 Duo 1.86 GHz or higher processor
- RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS)
- Swap partition of at least 1 GB
Operating systems
- CentOS-6.9 x86 / x64
- Debian GNU/Linux 8.9 x86 / x64 or higher
- Red Hat® Enterprise Linux® 7.4 x64 or higher
- Pardus OS 17.4 x64 or higher
-
General requirements
- Intel®-based Mac computer
- 1 GB of memory (RAM)
- 1.2 GB free disk space
Operating systems
- macOS 10.12–10.13
- macOS X, version 10.9 or later
-
Operating systems
- Android 4.2 – 9.0
- iOS 10.0 – 12.0


