Toll Free Support (USA) : 1-855-419-0077

K7 Enterprise Security

K7 Enterprise Security is best suited for large organizations with a scalable vision. Protect your business and customer data by insulating with a multi-tier protection. Easy end point manageability offers low downtime and increased productivity, making your business better.

Key Features

Key Features

K7 Enterprise Security insulates organizations from malware threats and improves your business. Large enterprises have to accommodate hundreds of end-points and manage security issues that arise from it. Sophisticated end-point protection is needed for desktops and PC’s since a single infected system can crash an entire network. Also all kinds of gateways can be sealed from intrusion attacks to prevent the leakage of confidential data.

Real Time Anti-Virus Protection

  • Protects business related data and confidential client information at all end-points from hostile attacks.

Email Server Protection

  • Scans incoming and outgoing emails automatically, blocking out malicious attachments.
  • Maintains clean mail storage with anti-spam feature.
  • Periodic status reports and email alerts to indicate emergency events are sent to the IT team.

End-Point Support

  • Simple and quick deployment of multiple endpoints as needed.
  • Monitor the status of each endpoint through a dashboard.
  • Remote updates, scans or even uninstallation of any end-point is simpler.

Secure File Servers

  • Automatically scans every single file accessed, downloaded, created or modified across each end-point.
  • Cost effective and easy to manage.

Internet Gateway Security

  • Locates the current location of end-points, both in-office and out-of office devices, and performs necessary security process to prevent malware intrusion from the network.
  • Low bandwidth consumption with customized scanning method.

USB Vaccination

  • Immunizes USB drives in devices across the enterprise to ensure no malware infection disrupts enterprise business.

External Device Control

  • Restrict the usage of eternal devices at end-points to prevent data theft and malware infections.
  • Notifies and monitor all external devices that are plugged into the network.

Single Console

  • A single centralized web based console to control both serves and clients.
  • Set policies easily to govern the gateways, server and end-points.
  • Illegal applications are blocked from accessing the internet.

Proactive Defence Method

  • Zero-Day protection : Protects client systems from zero day attacks from a PDF based exploits and browser based exploits.
  • Behavioral blocking : Blocks and removes any behavior based malware.
  • Drive-by-download blocking : Detects and removes zero day browser exploits.

Policy Override Feature

  • Administrator can easily override policies to implement security changes.
  • Set automatic policies for devices such as laptops and mobiles.
  • Quicker deployment of updates to stay secure from new malware attacks.

Rootkit Scanner

  • Advanced rootkit detection technology detects and removes concealed rootkits in the client systems.

Vulnerability detection

  • Vulnerable application modules are detected and controlled to prevent exploitation by attackers.

Advantages

Advantages

  • Unlimited end-points can be configured and grouping them into specific categories is simpler with a centralized console.
  • Sensitive business and client data are encrypted and safeguarded from data theft and misuse by offenders.
  • Low footprint and reduced network traffic increases cost effectiveness.
  • Administrators can customize security changes across the organization with a single click.
  • Email service is free from hostile attachments and spams threatening to corrupt client machines, subsequently disrupting the complete network.
  • All USB drives are disinfected and the client systems remain in a pristine state.
  • User access to the internet can be restricted and inappropriate websites can be flagged and blocked.
  • Easy to quarantine and restore an infected end-point without altering existing infrastructure.
  • Administrator can remotely configure large groups of endpoints and manage them easily.
  • Low downtime leads to increased work hours, resulting in improved business.
  • Multi-layer protection ensures the enterprise structure is ranging from each endpoint to server and are sealed from malware attacks.
  • Small server can be installed without any special hardware or software.
  • A built-in database stores sensitive information securely.

System Requirements

System Requirements

System Requirements for K7 Enterprise Security Administrator Console

Operating Systems:

  • Windows Server 2003 (SP2) – Any Edition
  • Windows Server 2008 – Any Edition
  • Windows Server 2008 R2 – Any Edition
  • Windows Small Business Server 2011 – Any Edition
  • Windows Server 2012 – Any Edition
  • Windows XP (SP2 or later)
  • Windows Vista (SP1 or later)
  • Windows 7, Windows 8 / 8.1

Database

  • K7 Business Edition includes MS-SQL Server 2008 Express Edition as built-in database (You can also use other Microsoft SQL Server Editions)

Browsers

  • Internet Explorer 8 or later (You can also use other web browsers such as Firefox, Google Chrome, etc)

Hardware

  • 512 MB RAM (minimum)
  • 700 MB Hard Disk Space
  • Internet Connection for Activation & Updates
  • High resolution Video Adapter and Monitor

 

System Requirements for K7 Endpoint Protection

Operating Systems:

  • Windows XP (SP2 or later) [32 Bit Only]
  • Windows Vista (SP1 or later)
  • Windows 7, Windows 8 / 8.1
  • Windows Server 2003 (SP2) – Any Edition
  • Windows Server 2008 – Any Edition
  • Windows Server 2008 R2 – Any Edition
  • Windows Small Business Server 2011 – Any Edition
  • Windows Server 2012 – Any Edition

Hardware

  • 512 MB RAM (minimum)
  • 300 MB Hard Disk Space
  • High resolution Video Adapter and Monitor