With more of your business operations going digital, you need to protect every server, laptop and mobile device on your network. Select tier combines multi-layered technologies with flexible cloud management and centralized application, web and device controls to protect your sensitive data on every endpoint.

Security shouldn’t slow you down. That’s why our security has minimal impact on system performance. And if you’re attacked, Automatic Rollback undoes most malicious actions, so users can keep on working.

Delivering world-class security – including post execution Behavior Detection and Machine Learning technologies – to help reduce your attack risk and keep all your endpoints safe and secure, with less need to download frequent updates.

In the cloud, on-premises or both? You decide - and we’ll provide unified management via the cloud console or traditional console deployment on-premises, in AWS or Azure cloud environments. Deploy security and policies rapidly and with minimum hassle, using any of our wide range of preconfigured scenarios.

Provides straightforward migration from third-party endpoint protection, helping ensure a smooth error-free transition. Our post-deployment quality assurance audit service is on hand to ensure optimum configuration.
Scales easily, providing the freedom to change any pre-defined settings and to choose when to adopt additional functionality. So you get security that adapts to protect you from new threats whether your IT is on-site or outsourced.
Multiple security technologies, including mobile threat defense, in a single product. One product - and one unified license - is all you need.
With around 900 patents under our belt, we’re one of only six worldwide IT corporations recognized as Derwent Top 100 Global Innovators. All our core technologies are developed in-house – and all delivered through a single agent – for efficient, integrated protection.
Don’t just take our word for it. Over the years, our products have participated in more customer surveys and independent tests – and achieved more first place positions - than any other vendor.
Choose the best option for your business. Want to add more functionality? Just upgrade to the next tier.
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for PC, Linux, Mac, Android, iOS
Defense for application and terminal servers
Defense for application and terminal servers
Defense for application and terminal servers
Defense for application and terminal servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Defense for web gateways and email servers
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Application, Web & Device Controls for PCs
Vulnerability Assessment, Behavior Detection, Exploit Prevention, Remediation Engine
Vulnerability Assessment, Behavior Detection, Exploit Prevention, Remediation Engine
Vulnerability Assessment, Behavior Detection, Exploit Prevention, Remediation Engine
Vulnerability Assessment, Behavior Detection, Exploit Prevention, Remediation Engine
Environment variable permissions and HIPS
Environment variable permissions and HIPS
Environment variable permissions and HIPS
Environment variable permissions and HIPS
Data export via Syslog
Data export via Syslog
Data export via Syslog
Data export via Syslog
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Kaspersky Sandbox and Kaspersky EDR Optimum integration
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Web, Email threat protections and controls for servers
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Adaptive Anomaly Control and Patch Management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
Encryption and OS-built-in encryption management
SIEM integration, OS & third-party software installation
SIEM integration, OS & third-party software installation
SIEM integration, OS & third-party software installation
SIEM integration, OS & third-party software installation
Inbound and outbound content filtering
Inbound and outbound content filtering
Inbound and outbound content filtering
Inbound and outbound content filtering
Anti-spam protection at gateway level
Anti-spam protection at gateway level
Anti-spam protection at gateway level
Anti-spam protection at gateway level
Web traffic security and web controls at gateway level
Web traffic security and web controls at gateway level
Web traffic security and web controls at gateway level
Web traffic security and web controls at gateway level






For the most complete, up-to-date requirements, please refer to Kaspersky Knowledge Base.
Kaspersky Endpoint Security for Business can also be purchased on subscription – with flexible, monthly licensing. Please check with your local partner about subscription availability in your country – and see the relevant system requirements here.
Not sure which security solution is right for your business?