Kaspersky Endpoint Security Cloud
The easiest way to protect your business, without sacrificing your IT resources, time or budget.

Want to Learn More? Contact Us!
Compare Cloud and Cloud Plus Features
Everything you need to keep your business running smoothly - and securely
All you need to protect Windows desktops and file servers, Mac OS devices, iOS and Android mobiles and even Microsoft Office 365 - just sign up for an account. Let Kaspersky block ransomware, fileless malware, zero-day attacks and other emerging threats while you focus on other aspects of your business.
Standard Plan | Plus Plan | Pro Plan | ||
![]() |
Protect from known and advanced malware threats | File-, Web-, Mail Threat protection |
File-, Web-, Mail Threat protection |
File-, Web-, Mail Threat protection |
![]() |
Prevent computers from encryption | Ransomware prevention and malicious activity roll-back |
Ransomware prevention and malicious activity roll-back |
Ransomware prevention and malicious activity roll-back |
![]() |
Detect, understand and respond to threats | Root Cause Analysis |
Endpoint Detection and Response |
|
![]() |
Build skills with cybersecurity training | Cybersecurity training for administrators |
||
![]() |
Take control of device usage | Web Control and Device Control |
Application Control, Web Control and Device Control |
|
![]() |
Ensure safe cloud adoption | Cloud Discovery |
Cloud blocking and security for Microsoft Office 365 |
Cloud blocking and security for Microsoft Office 365 |
![]() |
Protect sensitive data | Data Discovery |
Data Discovery |
|
![]() |
Save time on routine tasks | Vulnerability Scan |
Patch Management and Encryption Management |
Patch Management and Encryption Management |
![]() |
Support mobility and BYOD | Two Android/iOS devices per user |
Two Android/iOS devices per user |
Two Android/iOS devices per user |
Product Overview

Prevent threats and keep your business running
- Endpoint protection from the most tested, most awarded security vendor
- Protect Windows desktops and file servers, Mac OS workstations, iOS and Android smartphones and tablets
- Secure Microsoft Office 365 communication and collaboration
Compensate for lack of IT resources and budget
- Hosted in the cloud. No need for hardware and software procurement, provisioning and maintenance
- Instant protection with pre-defined security policies developed by our professionals
- Available on a monthly subscription to free up financial resources


Gain cloud visibility
- Shadow IT discovery to reveal uncontrolled sharing of corporate data in the cloud as well as users wasting time on social media and messengers.
- Block user access to unnecessary or unauthorized cloud resources, keeping your data secure and your colleagues focused and productive.