K7 Enterprise End Point Security
K7 Enterprise Security is best suited for large organizations with a scalable vision. Protect your business and customer data by insulating with a multi-tier protection. Easy end point manageability offers low downtime and increased productivity, making your business better.
Key Features:
K7 Enterprise Security insulates organizations from malware threats and improves your business. Large enterprises have to accommodate hundreds of end-points and manage security issues that arise from it. Sophisticated end-point protection is needed for desktops and PC’s since a single infected system can crash an entire network. Also all kinds of gateways can be sealed from intrusion attacks to prevent the leakage of confidential data.
Real Time Anti-Virus Protection
Protects business related data and confidential client information at all end-points from hostile attacks.
Email Server Protection
Scans incoming and outgoing emails automatically, blocking out malicious attachments.
Maintains clean mail storage with anti-spam feature.
Periodic status reports and email alerts to indicate emergency events are sent to the IT team.
End-Point Support
Simple and quick deployment of multiple endpoints as needed.
Monitor the status of each endpoint through a dashboard.
Remote updates, scans or even uninstallation of any end-point is simpler.
Secure File Servers
Automatically scans every single file accessed, downloaded, created or modified across each end-point.
Cost effective and easy to manage.
Internet Gateway Security
Locates the current location of end-points, both in-office and out-of office devices, and performs necessary security process to prevent malware intrusion from the network.
Low bandwidth consumption with customized scanning method.
USB Vaccination
Immunizes USB drives in devices across the enterprise to ensure no malware infection disrupts enterprise business.
External Device Control
Restrict the usage of eternal devices at end-points to prevent data theft and malware infections.
Notifies and monitor all external devices that are plugged into the network.
Single Console
A single centralized web based console to control both serves and clients.
Set policies easily to govern the gateways, server and end-points.
Illegal applications are blocked from accessing the internet.
Proactive Defence Method
Zero-Day protection : Protects client systems from zero day attacks from a PDF based exploits and browser based exploits.
Behavioral blocking : Blocks and removes any behavior based malware.
Drive-by-download blocking : Detects and removes zero day browser exploits.
Policy Override Feature
Administrator can easily override policies to implement security changes.
Set automatic policies for devices such as laptops and mobiles.
Quicker deployment of updates to stay secure from new malware attacks.
Rootkit Scanner
Advanced rootkit detection technology detects and removes concealed rootkits in the client systems.
Vulnerability detection
Vulnerable application modules are detected and controlled to prevent exploitation by attackers.
Advantage:
Unlimited end-points can be configured and grouping them into specific categories is simpler with a centralized console.
Sensitive business and client data are encrypted and safeguarded from data theft and misuse by offenders.
Low footprint and reduced network traffic increases cost effectiveness.
Administrators can customize security changes across the organization with a single click.
Email service is free from hostile attachments and spams threatening to corrupt client machines, subsequently disrupting the complete network.
All USB drives are disinfected and the client systems remain in a pristine state.
User access to the internet can be restricted and inappropriate websites can be flagged and blocked.
Easy to quarantine and restore an infected end-point without altering existing infrastructure.
Administrator can remotely configure large groups of endpoints and manage them easily.
Low downtime leads to increased work hours, resulting in improved business.
Multi-layer protection ensures the enterprise structure is ranging from each endpoint to server and are sealed from malware attacks.
Small server can be installed without any special hardware or software.
A built-in database stores sensitive information securely.
System Requirements for K7 Enterprise Security Administrator Console
Operating Systems:
Windows Server 2003 (SP2) – Any Edition
Windows Server 2008 – Any Edition
Windows Server 2008 R2 – Any Edition
Windows Small Business Server 2011 – Any Edition
Windows Server 2012 – Any Edition
Windows XP (SP2 or later)
Windows Vista (SP1 or later)
Windows 7, Windows 8 / 8.1
Database
K7 Business Edition includes MS-SQL Server 2008 Express Edition as built-in database (You can also use other Microsoft SQL Server Editions)
Browsers
Internet Explorer 8 or later (You can also use other web browsers such as Firefox, Google Chrome, etc)
Hardware
512 MB RAM (minimum)
700 MB Hard Disk Space
Internet Connection for Activation & Updates
High resolution Video Adapter and Monitor
System Requirements for K7 Endpoint Protection
Operating Systems:
Windows XP (SP2 or later) [32 Bit Only]
Windows Vista (SP1 or later)
Windows 7, Windows 8 / 8.1
Windows Server 2003 (SP2) – Any Edition
Windows Server 2008 – Any Edition
Windows Server 2008 R2 – Any Edition
Windows Small Business Server 2011 – Any Edition
Windows Server 2012 – Any Edition
Hardware
512 MB RAM (minimum)
300 MB Hard Disk Space
High resolution Video Adapter and Monitor