K7 Enterprise End Point Security

K7 Enterprise Security is best suited for large organizations with a scalable vision. Protect your business and customer data by insulating with a multi-tier protection. Easy end point manageability offers low downtime and increased productivity, making your business better.

Key Features:

K7 Enterprise Security insulates organizations from malware threats and improves your business. Large enterprises have to accommodate hundreds of end-points and manage security issues that arise from it. Sophisticated end-point protection is needed for desktops and PC’s since a single infected system can crash an entire network. Also all kinds of gateways can be sealed from intrusion attacks to prevent the leakage of confidential data.

Real Time Anti-Virus Protection

    • Protects business related data and confidential client information at all end-points from hostile attacks.

Email Server Protection

    • Scans incoming and outgoing emails automatically, blocking out malicious attachments.

    • Maintains clean mail storage with anti-spam feature.

    • Periodic status reports and email alerts to indicate emergency events are sent to the IT team.

End-Point Support

    • Simple and quick deployment of multiple endpoints as needed.

    • Monitor the status of each endpoint through a dashboard.

    • Remote updates, scans or even uninstallation of any end-point is simpler.

Secure File Servers

    • Automatically scans every single file accessed, downloaded, created or modified across each end-point.

    • Cost effective and easy to manage.

Internet Gateway Security

    • Locates the current location of end-points, both in-office and out-of office devices, and performs necessary security process to prevent malware intrusion from the network.

    • Low bandwidth consumption with customized scanning method.

USB Vaccination

    • Immunizes USB drives in devices across the enterprise to ensure no malware infection disrupts enterprise business.

External Device Control

    • Restrict the usage of eternal devices at end-points to prevent data theft and malware infections.

    • Notifies and monitor all external devices that are plugged into the network.

Single Console

    • A single centralized web based console to control both serves and clients.

    • Set policies easily to govern the gateways, server and end-points.

    • Illegal applications are blocked from accessing the internet.

Proactive Defence Method

    • Zero-Day protection : Protects client systems from zero day attacks from a PDF based exploits and browser based exploits.

    • Behavioral blocking : Blocks and removes any behavior based malware.

    • Drive-by-download blocking : Detects and removes zero day browser exploits.

Policy Override Feature

    • Administrator can easily override policies to implement security changes.

    • Set automatic policies for devices such as laptops and mobiles.

    • Quicker deployment of updates to stay secure from new malware attacks.

Rootkit Scanner

    • Advanced rootkit detection technology detects and removes concealed rootkits in the client systems.

Vulnerability detection

    • Vulnerable application modules are detected and controlled to prevent exploitation by attackers.


    • Unlimited end-points can be configured and grouping them into specific categories is simpler with a centralized console.

    • Sensitive business and client data are encrypted and safeguarded from data theft and misuse by offenders.

    • Low footprint and reduced network traffic increases cost effectiveness.

    • Administrators can customize security changes across the organization with a single click.

    • Email service is free from hostile attachments and spams threatening to corrupt client machines, subsequently disrupting the complete network.

    • All USB drives are disinfected and the client systems remain in a pristine state.

    • User access to the internet can be restricted and inappropriate websites can be flagged and blocked.

    • Easy to quarantine and restore an infected end-point without altering existing infrastructure.

    • Administrator can remotely configure large groups of endpoints and manage them easily.

    • Low downtime leads to increased work hours, resulting in improved business.

    • Multi-layer protection ensures the enterprise structure is ranging from each endpoint to server and are sealed from malware attacks.

    • Small server can be installed without any special hardware or software.

    • A built-in database stores sensitive information securely.

System Requirements for K7 Enterprise Security Administrator Console

Operating Systems:

    • Windows Server 2003 (SP2) – Any Edition

    • Windows Server 2008 – Any Edition

    • Windows Server 2008 R2 – Any Edition

    • Windows Small Business Server 2011 – Any Edition

    • Windows Server 2012 – Any Edition

    • Windows XP (SP2 or later)

    • Windows Vista (SP1 or later)

    • Windows 7, Windows 8 / 8.1


    • K7 Business Edition includes MS-SQL Server 2008 Express Edition as built-in database (You can also use other Microsoft SQL Server Editions)


    • Internet Explorer 8 or later (You can also use other web browsers such as Firefox, Google Chrome, etc)


    • 512 MB RAM (minimum)

    • 700 MB Hard Disk Space

    • Internet Connection for Activation & Updates

    • High resolution Video Adapter and Monitor

System Requirements for K7 Endpoint Protection

Operating Systems:

    • Windows XP (SP2 or later) [32 Bit Only]

    • Windows Vista (SP1 or later)

    • Windows 7, Windows 8 / 8.1

    • Windows Server 2003 (SP2) – Any Edition

    • Windows Server 2008 – Any Edition

    • Windows Server 2008 R2 – Any Edition

    • Windows Small Business Server 2011 – Any Edition

    • Windows Server 2012 – Any Edition


    • 512 MB RAM (minimum)

    • 300 MB Hard Disk Space

    • High resolution Video Adapter and Monitor