Increasing complexity of security solutions a major problem

Security solutions are becoming increasingly complex, and 41% of companies fear this could become a major issue in 2013, according to an authoritative survey from IDC. The cyberthreat environment is evolving rapidly, and criminals are increasingly deploying targeted weapons to spearhead their attacks. This, coupled with the fact that all devices – including mobiles – can now be used as a “point of entry” into a sensitive system, means that corporate security demands more attention than ever before. Corporate security and IT efficiency products are growing in number and complexity, and this generates new challenges for companies that are trying to use them effectively.

Kaspersky Endpoint Security for Business includes tools to protect servers, desktops and mobile devices against current cyber threats (image: Kaspersky)

Which solution? All companies, large or small, have multi-faceted infrastructures that include servers, desktops, laptops, smartphones and tablets. A cyber attack could target any of these, so companies need complex multi-functional security solutions that can secure every point on that infrastructure. However, these solutions often also create compatibility issues and, in the absence of any centralised security management, the labour costs of maintaining them can spiral. All this leads to unplanned IT budget expenditure.

It might seem simpler to purchase a more straightforward security solution – but cutting complexity also reduces the level of protection to potentially dangerous levels. It is a false economy which could ultimately lead to serious financial and reputational costs. A more sensible solution is to purchase a single platform which has a full range of up-to-the-minute technologies capable of securing all infrastructure components from a centralised management point.

Kaspersky Lab security platform with centralised management:

Kaspersky Lab has already created precisely this kind of corporate platform. Kaspersky Endpoint Security for Business includes tools to protect servers, desktops and mobile devices against current cyber threats, as well as technologies which prevent unauthorised users, including cybercriminals, from accessing corporate data. One key advantage of Kaspersky Lab’s platform is Kaspersky Security Center, a single management console which gives corporate specialists using the platform remote access to the protection of endpoints and notifies the IT administrator of all significant incidents.

The integration into the platform of Kaspersky Systems Management allows the remote installation of Windows OS and software on corporate workstations, control of update installation, monitoring of new vulnerabilities in the system and more. As a result, IT staff are equipped with the broadest possible scope for centralised security management.

The platform has several advantages over the “suites” offered by other companies. The most notable is that all of the technology on the platform was developed by Kaspersky engineers and is written from a common programme codebase. This creates bundles of technologies that were built together and are designed to work and interact with each other. Integrated security policies can also be created with this platform. This means that, for example, a single policy can be created incorporating encryption, application control and device control. Other security vendors typically purchase technologies that were developed separately and push them together in a “suite”.

This type of offering can contain conflicts and a lack of true integration, which in turn can decrease productivity.

Kaspersky Endpoint Security for Business is available to corporate clients as one of four packages (Core, Advanced, Select and Total Security), including various modules and technologies. In addition, it can be supplemented with a number of Kaspersky Lab’s targeted solutions which protect servers, virtual devices and other important corporate IT infrastructure endpoints. Depending on the company’s and the IT department’s requirements, the customer can choose a suitable package and add in the required target solutions – a wise investment of the IT security budget.

Staff writer