Security skills are scarce and very expensive globally. In South Africa this is even worse. Most security positions are vacant and those that are filled are filled by juniors or people without security skills.
Built on Kaspersky Lab’s Total Security for Business industry leading Hybrid Cloud Solution, powered by Splunk, Dataproof’s Malware Protection Service (part of our SaaS offering) is designed to provide organisation with comprehensive malware protection without the hassle of knowing how. Our DataProof Malware Protection Service provides a complete suite of security capabilities including anti-malware, intrusion prevention, application control, device control, encryption, Image deployment, software license management, vulnerability and patch management as well as mobile device management and protection.
Dataroof’s Malware Protection Service gives you the proven protection of Kaspersky Lab without all the work. As a service deployment we do all the heavy lifting for you. We manage regular, signature, engine, product and kernel updates, setup and maintain the security database and administer the Kaspersky Security Center Console.
DataProof’s highly trained security experts’ support the security operations and management of all your Malware Protection requirements. This means we are always on standby to protect your organization against threats to your physical and virtual endpoints, your mobile devices, your mail systems, servers, gateways, and SharePoint portals. Contact us today about our DataProof Malware Protection Service products, solutions and services in this document. Let us show you how we can work together to protect your business from cyber-threats.
HEURISTIC SECURITY — REDUCING THE LOAD ON YOUR SYSTEMS
Pattern-based malware identification provides improved detection — delivering smaller update files as well as increased security.
Kaspersky anti-malware includes two specific components for program activity analysis:
CLOUD-ASSISTED MALWARE DETECTION — KASPERSKY SECURITY NETWORK (KSN)
A real-time response to new and unknown malware threats. A constant flow of new data about attempted malware attacks and suspicious behaviour, provided by over 60 million volunteer Kaspersky Lab software users, is used to help create instant file verdicts, allowing all customers to benefit from real-time protection with lower ‘false positives’.
AUTOMATIC EXPLOIT PREVENTION
Automatic Exploit Prevention specifically targets malware that exploits software vulnerabilities in popular applications by recognizing typical or suspicious behaviour patterns. The technology then halts the exploit in its tracks, and prevents any downloaded malicious code from executing.
ENCRYPTION RANSOMWARE COUNTER-MEASURES
System Watcher saves copies of important files in temporary storage, in case a suspicious process attempts to access them. Should ransomware attempt to encrypt the originals, these files can be restored in their unencrypted state.
Uses different techniques for ‘curing’ any detected infection — preventing file and process execution including auto-start, destroying malware, and ‘rolling back’ stored files to their original condition.
HOST-BASED INTRUSION PREVENTION SYSTEM (HIPS) AND PERSONAL FIREWALL
Some program activities are sufficiently high risk to make restriction advisable, even though they may not be confirmed as malicious. Kaspersky Labs’ Host-based Intrusion Prevention System (HIPS) restricts activities within the system according to the application’s trust level — with the help of an application-level Personal Firewall, which restricts network activity.
NETWORK ATTACK BLOCKER
Monitors suspicious activity on your network — and lets you pre-define how your systems will respond if any suspicious behaviour is detected.
Updates protecting against new malware threats are delivered to your security database through the fastest update cycle in the industry, together with continuously updating data about newly discovered malware from the Kaspersky Security Network (KSN) cloud.
Virtualized Environment Support
recognises virtual machines in the corporate administration structure and facilitates load balancing during intensive operations, avoiding performance slowing antivirus ‘storms’.
AUTOMATED VIRTUAL LIFECYCLE PROCESSING
Automatically removes database records of non-persistent virtual machines.
Tuned to flag hardware and software vulnerabilities to potential zero-day attacks.
Remotely monitors protection status and reports on key events from a flexible and accessible interface.
MIXED ENVIRONMENT SUPPORT
Unmatched support for operating systems and virtualization platforms including Windows®, Netware, Linux, Mac, VMware, Android™, Blackberry®, Symbian and Windows® Mobile.
Follow best practice with our pre-configured policies, or create your own.
AUTOMATED MOBILE POLICIES
Set and enforce policies automatically when mobile devices leave the corporate network. Perfect for protecting a hyper-mobile workforce.
Whatever size your infrastructure, our DataProof Malware Protection Service offers deployment and management tools, flexible policy options and robust reporting to meet your growing needs.
AUTOMATED PRE-DEFINED REPORTS
Get pre-defined reports, daily, weekly and monthly, or request a custom report from our 24/7 support.
Allows granular control of external device operations, enforcing your usage policies and reducing the risk of data loss.
Application Startup Control
Empowers administrators to grant, block and audit application launches.
Application Privilege Control
Applies restrictions to the behaviour of applications in the operating system as well as access rights to computer resources.
Web Control and Content Filtering
Monitoring and filtering users’ browser activities by category, content and data type, regardless of workstation location
Home Malware Protection Security Service