Auto-Renewal Plan
Our hassle-free Auto-Renewal Plan is designed to save you time, effort and risk by extending your subscription automatically before it expires*.
Benefits of automatically renewing your license include:
Uninterrupted protection — Your subscription will continue with continuous protection
Worry free, peace of mind that your devices are always secure
Saves you time — We take care of everything for you and will send you notifications to inform you of your next billing date & confirmation that your license has been renewed
Flexibility — You may unsubscribe from this service at any time

Kaspersky Endpoint Security for Business SELECT
Next Generation protection and control for every endpoint
With more of your business operations going digital, you need to protect every server, laptop and mobile device. We deliver Next Gen security in a single solution that helps you protect every endpoint your business runs.
- Protects against the latest threats, including cryptominers
- Hardens endpoints – to reduce your exposure to cyberattacks
- Helps boost productivity – via cloud-enabled usage controls
- Protects servers & endpoints without damaging performance
- Secures diverse environments – PC, Mac, Linux, iOS & Android
- Simplifies security management – with unified console
-

Performance & multi-layered protection
Security shouldn’t slow you down. That’s why our security has minimal impact on system performance – and, if you’re attacked, Automatic Rollback undoes most malicious actions so users can keep on working.
-

Agile protection technologies
Delivers world-class security – including static and dynamic Machine Learning technologies – to help reduce your business’s attack surface and keep all your endpoints safe while reducing the need to download frequent updates.
-

The ‘best of both worlds’ console
Supports management via the Web Console together with - or instead of - a traditional console and deployment on-premises, in Amazon or Microsoft Azure cloud environments.
-

Simplifies security management tasks
Helps you deploy security rapidly and with the minimum of fuss, using any of our wide range of preconfigured scenarios. A unified management console makes it easy to apply your chosen security policies to every endpoint in your business.
The smart choice for security
-
Security tailored to your environmentScales easily, providing the freedom to change any pre-defined settings and to choose when to adopt additional functionality. So you get security that adapts to protect you from new threats whether your IT is on-site or outsourced.
-
Keep tight control of your costsWith multiple security technologies – including Next Gen – in a single product. One product – with one license – is all you need to protect your endpoints.
-
Benefit from integrationAll our core technologies are developed in-house – and every function is within one agent – so you benefit from efficient, integrated protection.
-
-
Customer satisfaction assured - we do more to protectDon’t just take our word for it - over the years, our products have participated in more independent tests and customer reviews – and have achieved more first places - than any other vendor.
Find the security solution you need
Select the security option that fits your needs – and, when you want to add more functionality, just upgrade to the next tier of protection.
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Security policy adviser
Security policy adviser
Security policy adviser
EDR agent
EDR agent
EDR agent
Application Control for PCs
Application Control for PCs
Application Control for PCs
Device and Web Controls
Device and Web Controls
Device and Web Controls
Role-based access control1
Role-based access control1
Role-based access control1
Adaptive Anomaly Control
Adaptive Anomaly Control
Adaptive Anomaly Control
Encryption management
Encryption management
Encryption management
Vulnerability and Patch management
Vulnerability and Patch management
Vulnerability and Patch management
OS & 3rd party software installation
OS & 3rd party software installation
OS & 3rd party software installation
Application Control for servers
Application Control for servers
Application Control for servers
Security for web gateways
Security for web gateways
Security for web gateways
Security for email servers
Security for email servers
Security for email servers
Ransomware protection
Ransomware protection
Ransomware protection
Cloud-assisted intelligence
Cloud-assisted intelligence
Cloud-assisted intelligence
Single management console
Single management console
Single management console
Integration with SIEM systems1
Integration with SIEM systems1
Integration with SIEM systems1
ADDITIONAL DATASHEETS
Additional Information
ADDING MORE SECURITY AS YOU NEED IT

Vulnerability & Patch Management Enhance security and reduce complexity
- Minimize IT security risks
- Automate vulnerability assessment
- Distribute patches, updates & applications

Security for Mail Server For Microsoft Exchange and Linux mail
- Scan incoming, outgoing & stored mail
- Intelligent spam filtering reduces traffic
- Prevent the loss of confidential data

Security for Storage Security for Network Attached Storage (NAS)
- Unified, fault-tolerant architecture
- Minimal impact on NAS performance
- Highly scalable storage security

Security for Internet Gateway Secure Internet access for your employees
- Scans HTTP(s), FTP, SMTP & POP3
- Governs the use of the Internet by employees
- Powerful manageability & reporting

Applications Inside
One license lets you use all these applications:
System Requirements
For the most complete, up-to-date requirements, please refer to Kaspersky Knowledge Base.
Version requirements for subscription
Kaspersky Endpoint Security for Business can also be purchased on subscription – with flexible, monthly licensing. Please check with your local partner about subscription availability in your country – and see the relevant system requirements here.
-
General requirements
- 2 GB of free disk space on the hard drive
- Intel Pentium 1 GHz processor (that supports the SSE2 instruction set or compatible equivalent)
- RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS)
Operating systems
- Microsoft Windows 10
- Microsoft Windows 8.1
- Microsoft Windows 8
- Microsoft Windows 7 SP1 or later
- Microsoft Windows XP SP3 or later
-
Minimum configuration
- Processor: 1Core, 1.4 GHz
- RAM: 1 GB
- Free space on the hard drive: 4 GB
Recommended configuration
- Processor: 4 Core, 2.4 GHz
- RAM: 2 GB
- Free space on the hard drive: 4 GB
Operating systems
- Windows Server 2019
- Windows Server 2016
- Windows Storage Server 2016
- Windows Hyper-V Server 2016
- Microsoft Windows Server 2012 or later
- Microsoft Windows Hyper-V Server 2012 or later
- Microsoft Windows Server 2008 or later
- Windows Server 2003 or later
-
General requirements
- 1 GB of hard drive space for installation, storing temporary files and log files
- An Internet connection for activating the application and updating databases and application modules
- Intel Core 2 Duo 1.86 GHz or higher processor
- RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS)
- Swap partition of at least 1 GB
Operating systems
- CentOS-6.9 x86 / x64
- Debian GNU/Linux 8.9 x86 / x64 or higher
- Red Hat® Enterprise Linux® 7.4 x64 or higher
-
General requirements
- Intel®-based Mac computer
- 1 GB of memory (RAM)
- 1.2 GB free disk space
Operating systems
- macOS 10.12–10.13
- macOS X, version 10.9 or later
-
Operating systems
- Android 4.2 – 9.0
- iOS 10.0 – 12.0


