What is Auto-Renewal?
Auto-Renewal will extend your license automatically without you needing to lift a finger. Before your subscription expires, you will be charged a renewal fee to keep your protection going*. We’ll remind you about the upcoming payment beforehand via email. You can cancel Auto-Renewal at any time – in which case you’ll need to renew your license manually.
Why Auto-Renewal?
Continuous subscription & uninterrupted protection for your devices
Saves you time: no fuss over billing details & activation codes
You stay in change: we remind you about upcoming billing dates and you can unsubscribe at any time

Kaspersky TOTAL Security for Business
Endpoint protection and beyond – now and in future
Kaspersky Total Security for Business does more than just protect endpoints and defend complex IT estates. It includes all the features and benefits of Kaspersky Endpoint Security for Business Advanced, plus security for mail servers and internet gateways.
- Simplifies security management with one unified console
- Provides Automated EDR capabilities against the latest cyberthreats
- Helps businesses tailor their security for both new & legacy systems
- Reduces your exposure to attack by hardening corporate endpoints
- Encryption prevents the loss of sensitive data confidential information
- Eliminates vulnerabilities and blocks attack entry-points
- Does more to support regulatory compliance initiatives
- Protects email and web gateway traffic
-

Added flexibility… maintaining performance
Lets you choose where to apply mail and web filtering – so you can fine-tune your security for different topologies and help maintain the performance of both current and legacy systems.
-

Protection for key data
Massive amounts of business and personal information are stored inside email systems and on servers. We help you to protect all this sensitive data against damage – as well as blocking malware at perimeter level, before it can spread.
-

Seamless upgrade
Less effort to stay current and upgrade major product versions. Even during migration between versions of Windows, protection remains on at all times. Your security scales easily, without extensive planning required, even in mixed IT environments.
-

Global support
For many years now, our support services have continuously achieved the highest levels of certification by both the Technology Services Industry Association and Miller Heiman Group. We offer implementation services, plus a wide range of Maintenance & Support Agreements, including 24x7, with priority response.
-

Advanced Engines
Automated EDR identifies more threats by proactively looking for suspicious behavior on endpoints and correlating events across multiple security layers. We also protect all HTTP(S) and FTP internet traffic passing through endpoints and proxy servers, as well as securing email communications
The smart choice for security
-
Achieve more… with less effortOur award-winning security is quick to identify and block threats - and it starts fast, using a range of preconfigured security scenarios so you can rapidly deploy world-class protection.
-
Cut complexity and your total cost of ownership (TCO)Because all our core security technologies are fully integrated – as part of a single agent – you won’t have to work around time-consuming management tasks and support escalations with multiple vendors.
-
Combine performance & multi-layered protectionWe believe security shouldn’t slow you down. To maintain user productivity, our adaptive security has minimal impact on system performance. If you’re attacked, Automatic Rollback is there to help reverse any damage caused.
-
Mitigate risk by blocking threats earlierMost cyberattacks focus on endpoints and their users. By applying protection at mail and web gateway levels, you can stop threats reaching their endpoint targets, greatly reducing your risk as well as securing legacy nodes that may lack protection.
-
Tests & reviews show how we measure upIn recent years, our products have participated in more independent tests & reviews – and have achieved more first places than any other security vendor.
-
Boost protection - and save time on administrationOur automated Vulnerability Assessment & Patch Management uses real-time intelligence about exploits to help it apply the latest security patches for a wide range of common applications.
Find the security solution you need
Select the security option that fits your needs – and, when you want to add more functionality, just upgrade to the next tier of protection.
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Security for PC, Linux & Mac
Mobile Threat Defense
Mobile Threat Defense
Mobile Threat Defense
Security policy adviser
Security policy adviser
Security policy adviser
EDR agent
EDR agent
EDR agent
Application Control for PCs
Application Control for PCs
Application Control for PCs
Device and Web Controls
Device and Web Controls
Device and Web Controls
Role-based access control1
Role-based access control1
Role-based access control1
Adaptive Anomaly Control
Adaptive Anomaly Control
Adaptive Anomaly Control
Encryption management
Encryption management
Encryption management
Vulnerability and Patch management
Vulnerability and Patch management
Vulnerability and Patch management
OS & 3rd party software installation
OS & 3rd party software installation
OS & 3rd party software installation
Application Control for servers
Application Control for servers
Application Control for servers
Security for web gateways
Security for web gateways
Security for web gateways
Security for email servers
Security for email servers
Security for email servers
Ransomware protection
Ransomware protection
Ransomware protection
Cloud-assisted intelligence
Cloud-assisted intelligence
Cloud-assisted intelligence
Single management console
Single management console
Single management console
Integration with SIEM systems1
Integration with SIEM systems1
Integration with SIEM systems1
ADDITIONAL DATASHEETS
Additional Information
ADDING MORE SECURITY AS YOU NEED IT

Kaspersky Security for Microsoft Office 365 Advanced protection for Microsoft Office 365
- Protect the mail and storage components of the Microsoft Office 365 suite: Exchange Online and OneDrive.
- Make use of the most sophisticated technologies for your security and at the same time enjoy a quick start thanks to predefined policies and auto configuration.

Kaspersky Security for Storage Security for Network Attached Storage (NAS)
- Unified, fault-tolerant architecture
- Minimal impact on NAS performance
- Highly scalable storage security

Kaspersky Hybrid Cloud Security Protect your physical, virtual and cloud workloads
- Multi-layered threat protection for workloads and virtual desktops
- Unified management and orchestration across the entire hybrid infrastructure
- Scenario-specific protection for increased resource efficiency

DDoS Protection Complete cloud-based defense against DDoS attacks
- Global network of data traffic ‘cleaning centers’
- Seamless integration with no additional hardware
- Protection from the most complex and high-volume attacks

Kaspersky Sandbox Automatic protection against targeted threats
- Complements Endpoint Security for Business
- Patented proprietary technology
- Does not require expensive security experts

Applications Inside
One license lets you use all these applications:
- Kaspersky Endpoint Security for Windows
- Kaspersky Endpoint Security for Linux
- Kaspersky Endpoint Security for Mac
- Kaspersky Security for Windows Server
- Kaspersky Security for Mobile
- Kaspersky Security Center
- Kaspersky Security for Linux Mail Server
- Kaspersky Secure Mail Gateway
- Kaspersky Security for Microsoft Exchange Servers
- Kaspersky Web Traffic Security
System Requirements
For the most complete, up-to-date requirements, please refer to Kaspersky Knowledge Base.
Version requirements for subscription
Kaspersky Endpoint Security for Business can also be purchased on subscription – with flexible, monthly licensing. Please check with your local partner about subscription availability in your country – and see the relevant system requirements here.
-
General requirements
- 2 GB of free disk space on the hard drive
- Intel Pentium 1 GHz processor (that supports the SSE2 instruction set or compatible equivalent)
- RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS)
Operating systems
- Microsoft Windows 10
- Microsoft Windows 8.1
- Microsoft Windows 8
- Microsoft Windows 7 SP1 or later
- Microsoft Windows XP SP3 or later
-
Minimum configuration
- Processor: 1Core, 1.4 GHz
- RAM: 1 GB
- Free space on the hard drive: 4 GB
Recommended configuration
- Processor: 4 Core, 2.4 GHz
- RAM: 2 GB
- Free space on the hard drive: 4 GB
Operating systems
- Windows Server 2019
- Windows Server 2016
- Windows Storage Server 2016
- Windows Hyper-V Server 2016
- Microsoft Windows Server 2012 or later
- Microsoft Windows Hyper-V Server 2012 or later
- Microsoft Windows Server 2008 or later
- Windows Server 2003 or later
-
General requirements
- 1 GB of hard drive space for installation, storing temporary files and log files
- An Internet connection for activating the application and updating databases and application modules
- Intel Core 2 Duo 1.86 GHz or higher processor
- RAM: 1 GB for a 32-bit OS (2 GB for a 64-bit OS)
- Swap partition of at least 1 GB
Operating systems
- CentOS-6.9 x86 / x64
- Debian GNU/Linux 8.9 x86 / x64 or higher
- Red Hat® Enterprise Linux® 7.4 x64 or higher
- Pardus OS 17.4 x64 or higher
-
General requirements
- Intel®-based Mac computer
- 1 GB of memory (RAM)
- 1.2 GB free disk space
Operating systems
- macOS 10.12–10.13
- macOS X, version 10.9 or later
-
Operating systems
- Android 4.2 – 9.0
- iOS 10.0 – 12.0
-
Minimum hardware requirements
- CPU: Intel Broadwell or newer, 8 cores
- RAM: 16GB
- 200 GB available on the hard drive to install the application and store temporary fles and log fles
- At least 8 GB available for swap
Minimum Software requirements for standalone application
- CPU: Intel Xeon E5606 (4 cores) 1.86 GHz or more
- Squid version 3.5.x, 3.6 or higher.
- Ubuntu 18.04.2 LTS
- CentOS 7.6
- RHEL 7.6, 8
- Debian Linux 10
- SUSE Linux Enterprise Server 15
- Apache version 2.2, 2.4 or higher
For web interface
- Microsoft Internet Explorer 11 or later
- Microsoft Edge 44 or later
- Mozilla Firefox 67 or later
- Google Chrome version 75 or later
Additional requirements
- Ngnix v.1.10.3, 1.12.2 or 1.14.0
- Haproxy v.1.5 for load balancing (needs to be confgured separately)
Windows Server editions for LDAP integration:
- Windows 2012 R2 Standard
- Windows 2016 Standard
- Windows 2019 Standard
Minimum Software requirements for a Kaspersky Web Traffic Security software appliance (virtualization platform)
- VMware ESXi 6.5 Update 2 / 6.7 Update 1
- Microsoft Hyper-V Server 2016 / 2019
Additional software requirements for software appliance
- Haproxy v.1.5 for load balancing (needs to be confgured separately)
-
For mail gateways
General requirements
- E1000 network adapter
- Free disk space – 100 GB or more
- At least 4 GB of RAM
- One quad-core processor
Hypervisors
- VMware ESXi 5.5 Update 2
- VMware ESXi 6.0
For Linux mail servers
Email servers
- Exim-4.86 and later
- Postfix-2.6 and later
- Sendmail-8.14 and later
- Qmail-1.06 and later
General requirements
- Intel® Xeon 3040 or Core 2 Duo 1.86 GHz or higher
- 2 GB of of available RAM
- At least 4 GB swap partition
Operating systems
- Red Hat Enterprise Linux 7.3 Server
- SUSE Linux Enterprise Server 12 SP2
- CentOS-6.9
- CentOS-7.3
- Ubuntu Server 14.04.2 LTS
- Ubuntu Server 16.04 LTS
- Debian GNU / Linux 8.8, 9.0
- FreeBSD 11
For Microsoft Exchange Server
- Microsoft Exchange Server 2016
- Microsoft Exchange Server 2013 SP1
- Microsoft Exchange Server 2010 SP3
General requirements for Security Server
- 64-bit quad-core processor
- 8 GB RAM
- 229 MB of available disk space
Operating systems
If installing Management Console and Security Server:
- Windows Server 2008 R2 SP1 or later
If installing only Management Console:
- Windows 10
- Windows 7, 8.1
- Windows Server 2008 R2 SP1 or later
Databases
- Microsoft SQL Server 2012 Express / Standard / Enterprise or later


