Toll Free Support (USA) : 1-855-419-0077

K7 Business Lite

K7 Business Lite brings affordable world-class security solutions to small and home office environments. Emails, social networking and transactions are safe with layered protection. Now with Flexi-License scheme to customize 60 months license period.



Key Features

Key Features

K7 Business Lite is aimed at increasing small organizations with limited resources. Such organizations face challenges from malicious online threats, especially with the use of social network to promote their products and to expand their business. Business Lite offers endpoint protection including secure email and social media, with additional tools to assist small businesses. Enterprises can avail flexi license system to customize and distribute 60 months of license among their end points.

Workstation Support

  • Can easily install and configure up to 50 end-points.
  • Dashboard assists in monitoring the status of each end-point.

Real Time Anti-Virus Protection

  • Protects business related data and confidential client data present in end-points from malware attacks.

Secure Email Server

  • Blocks malicious attachments and spams from incoming and outgoing emails.
  • Mail alerts are sent to admin to indicate critical events.

Proactive Defence Method

  • Zero-Day protection : Endpoints are secured from zero day attack from PDF and browser based exploit.
  • Behavioral blocking : Blocks and removes malwares based on its behavioral analysis.
  • Drive-by-download blocking : Detects and removes zero day browser exploits.

Internet Gateway Security

  • Detects the location of work stations, both offline and online, and combats hostile intruders from an insecure networks.
  • Customized scan process reduces load on network bandwidth.

Single Web Based Console

  • A single integrated web based console to manage servers and endpoints.
  • Control gateways, servers and end-points and blocks illegal applications to access the internet.

File Server Protection

  • Automatically scans every single file accessed, downloaded, created or modified across each end-point.

Rootkit Scanner

  • Advanced rootkit detection technology detects and removes concealed rootkits in the client systems.

USB Vaccination

  • Immunizes USB drives in devices across the enterprise to ensure no malware infection disrupts enterprise business.

Vulnerability detection

  • Vulnerable application modules are detected and controlled to prevent exploitation by attackers.

Policy Override Feature

  • Administrator can easily override policies to implement security changes.
  • Set automatic policies for devices such as laptops.
  • Quicker deployment of updates to stay secure from new malware attacks.

External Device Control

  • Restrict user access to eternal devices at end-points to prevent data theft and malware infections.
  • Notifies and monitor all external devices that are plugged into the network.

Advantages

Advantages

  • Small business can securely install up to 50 end-points.
  • Low footprint and reduced network traffic saves money.
  • Security policies can be easily implemented by the administrator with the help of single web console.
  • Encrypting confidential business and client information secures organization against data theft and spyware.
  • Keeps end-points in pristine form by immunizing USB drives from any malware infection.
  • No infrastructure changes are required to quarantine and restore an infection workstation.
  • Emails are free from hostile attachments and spams threatening to corrupt client machines, subsequently disrupting the complete network.
  • User access to the internet can be restricted and inappropriate websites can be flagged and blocked.
  • Administrator can remotely configure and manage large groups of endpoints easily.
  • Multi-layer protection ensures that complete enterprise structure, ranging from each endpoint to server is sealed from malware attacks.
  • Saves time spent on repair which optimizes employee productivity.
  • Small server can be installed without any special hardware or software.
  • A built-in database stores sensitive information securely.

System Requirements

System Requirements

System Requirements for K7 Business Lite Administrator Console

Operating Systems:

  • Windows Server 2003 (SP2) – Any Edition
  • Windows Server 2008 – Any Edition
  • Windows Server 2008 R2 – Any Edition
  • Windows Small Business Server 2011 – Any Edition
  • Windows Server 2012 – Any Edition
  • Windows XP (SP2 or later)
  • Windows Vista (SP1 or later)
  • Windows 7, Windows 8 / 8.1

Database

  • K7 Business Edition includes MS-SQL Server 2008 Express Edition as built-in database (You can also use other Microsoft SQL Server Editions)

Browsers

  • Internet Explorer 8 or later (You can also use other web browsers such as Firefox, Google Chrome, etc)

Hardware

  • 512 MB RAM (minimum)
  • 700 MB Hard Disk Space
  • Internet Connection for Activation & Updates
  • High resolution Video Adapter and Monitor

 

System Requirements for K7 Endpoint Protection

Operating Systems:

  • Windows XP (SP2 or later) [32 Bit Only]
  • Windows Vista (SP1 or later)
  • Windows 7, Windows 8 / 8.1
  • Windows Server 2003 (SP2) – Any Edition
  • Windows Server 2008 – Any Edition
  • Windows Server 2008 R2 – Any Edition
  • Windows Small Business Server 2011 – Any Edition
  • Windows Server 2012 – Any Edition

Hardware

  • 512 MB RAM (minimum)
  • 300 MB Hard Disk Space
  • High resolution Video Adapter and Monitor