K7 Enterprise End Point Security


K7 Enterprise Security is best suited for large organizations with a scalable vision. Protect your business and customer data by insulating with a multi-tier protection. Easy end point manageability offers low downtime and increased productivity, making your business better.








Key Features:

K7 Enterprise Security insulates organizations from malware threats and improves your business. Large enterprises have to accommodate hundreds of end-points and manage security issues that arise from it. Sophisticated end-point protection is needed for desktops and PC’s since a single infected system can crash an entire network. Also all kinds of gateways can be sealed from intrusion attacks to prevent the leakage of confidential data.

Real Time Anti-Virus Protection

  • Protects business related data and confidential client information at all end-points from hostile attacks.

Email Server Protection

  • Scans incoming and outgoing emails automatically, blocking out malicious attachments.
  • Maintains clean mail storage with anti-spam feature.
  • Periodic status reports and email alerts to indicate emergency events are sent to the IT team.

End-Point Support

  • Simple and quick deployment of multiple endpoints as needed.
  • Monitor the status of each endpoint through a dashboard.
  • Remote updates, scans or even uninstallation of any end-point is simpler.

Secure File Servers

  • Automatically scans every single file accessed, downloaded, created or modified across each end-point.
  • Cost effective and easy to manage.

Internet Gateway Security

  • Locates the current location of end-points, both in-office and out-of office devices, and performs necessary security process to prevent malware intrusion from the network.
  • Low bandwidth consumption with customized scanning method.

USB Vaccination

  • Immunizes USB drives in devices across the enterprise to ensure no malware infection disrupts enterprise business.

External Device Control

  • Restrict the usage of eternal devices at end-points to prevent data theft and malware infections.
  • Notifies and monitor all external devices that are plugged into the network.

Single Console

  • A single centralized web based console to control both serves and clients.
  • Set policies easily to govern the gateways, server and end-points.
  • Illegal applications are blocked from accessing the internet.

Proactive Defence Method

  • Zero-Day protection : Protects client systems from zero day attacks from a PDF based exploits and browser based exploits.
  • Behavioral blocking : Blocks and removes any behavior based malware.
  • Drive-by-download blocking : Detects and removes zero day browser exploits.

Policy Override Feature

  • Administrator can easily override policies to implement security changes.
  • Set automatic policies for devices such as laptops and mobiles.
  • Quicker deployment of updates to stay secure from new malware attacks.

Rootkit Scanner

  • Advanced rootkit detection technology detects and removes concealed rootkits in the client systems.

Vulnerability detection

  • Vulnerable application modules are detected and controlled to prevent exploitation by attackers.
Advantage:
  • Unlimited end-points can be configured and grouping them into specific categories is simpler with a centralized console.
  • Sensitive business and client data are encrypted and safeguarded from data theft and misuse by offenders.
  • Low footprint and reduced network traffic increases cost effectiveness.
  • Administrators can customize security changes across the organization with a single click.
  • Email service is free from hostile attachments and spams threatening to corrupt client machines, subsequently disrupting the complete network.
  • All USB drives are disinfected and the client systems remain in a pristine state.
  • User access to the internet can be restricted and inappropriate websites can be flagged and blocked.
  • Easy to quarantine and restore an infected end-point without altering existing infrastructure.
  • Administrator can remotely configure large groups of endpoints and manage them easily.
  • Low downtime leads to increased work hours, resulting in improved business.
  • Multi-layer protection ensures the enterprise structure is ranging from each endpoint to server and are sealed from malware attacks.
  • Small server can be installed without any special hardware or software.
  • A built-in database stores sensitive information securely.

System Requirements for K7 Enterprise Security Administrator Console

Operating Systems:

  • Windows Server 2003 (SP2) – Any Edition
  • Windows Server 2008 – Any Edition
  • Windows Server 2008 R2 – Any Edition
  • Windows Small Business Server 2011 – Any Edition
  • Windows Server 2012 – Any Edition
  • Windows XP (SP2 or later)
  • Windows Vista (SP1 or later)
  • Windows 7, Windows 8 / 8.1

Database

  • K7 Business Edition includes MS-SQL Server 2008 Express Edition as built-in database (You can also use other Microsoft SQL Server Editions)

Browsers

  • Internet Explorer 8 or later (You can also use other web browsers such as Firefox, Google Chrome, etc)

Hardware

  • 512 MB RAM (minimum)
  • 700 MB Hard Disk Space
  • Internet Connection for Activation & Updates
  • High resolution Video Adapter and Monitor

 

System Requirements for K7 Endpoint Protection

Operating Systems:

  • Windows XP (SP2 or later) [32 Bit Only]
  • Windows Vista (SP1 or later)
  • Windows 7, Windows 8 / 8.1
  • Windows Server 2003 (SP2) – Any Edition
  • Windows Server 2008 – Any Edition
  • Windows Server 2008 R2 – Any Edition
  • Windows Small Business Server 2011 – Any Edition
  • Windows Server 2012 – Any Edition

Hardware

  • 512 MB RAM (minimum)
  • 300 MB Hard Disk Space
  • High resolution Video Adapter and Monitor
Comments