Kaspersky Endpoint Security Cloud
The easiest way to protect your business, without sacrificing your IT resources, time or budget.
We no longer sell Kaspersky products — please explore our available alternatives for your cybersecurity needs
Want to Learn More? Contact Us!
Compare Cloud and Cloud Plus Features
Everything you need to keep your business running smoothly - and securely
All you need to protect Windows desktops and file servers, Mac OS devices, iOS and Android mobiles and even Microsoft Office 365 - just sign up for an account. Let Kaspersky block ransomware, fileless malware, zero-day attacks and other emerging threats while you focus on other aspects of your business.
| Standard Plan | Plus Plan | Pro Plan | ||
| Protect from known and advanced malware threats | File-, Web-, Mail Threat protection |
File-, Web-, Mail Threat protection |
File-, Web-, Mail Threat protection |
|
| Prevent computers from encryption | Ransomware prevention and malicious activity roll-back |
Ransomware prevention and malicious activity roll-back |
Ransomware prevention and malicious activity roll-back |
|
| Detect, understand and respond to threats | Root Cause Analysis |
Endpoint Detection and Response |
||
| Build skills with cybersecurity training | Cybersecurity training for administrators |
|||
| Take control of device usage | Web Control and Device Control |
Application Control, Web Control and Device Control |
||
| Ensure safe cloud adoption | Cloud Discovery |
Cloud blocking and security for Microsoft Office 365 |
Cloud blocking and security for Microsoft Office 365 |
|
| Protect sensitive data | Data Discovery |
Data Discovery |
||
| Save time on routine tasks | Vulnerability Scan |
Patch Management and Encryption Management |
Patch Management and Encryption Management |
|
| Support mobility and BYOD | Two Android/iOS devices per user |
Two Android/iOS devices per user |
Two Android/iOS devices per user |
|
Product Overview
Prevent threats and keep your business running
- Endpoint protection from the most tested, most awarded security vendor
- Protect Windows desktops and file servers, Mac OS workstations, iOS and Android smartphones and tablets
- Secure Microsoft Office 365 communication and collaboration
Compensate for lack of IT resources and budget
- Hosted in the cloud. No need for hardware and software procurement, provisioning and maintenance
- Instant protection with pre-defined security policies developed by our professionals
- Available on a monthly subscription to free up financial resources

Gain cloud visibility
- Shadow IT discovery to reveal uncontrolled sharing of corporate data in the cloud as well as users wasting time on social media and messengers.
- Block user access to unnecessary or unauthorized cloud resources, keeping your data secure and your colleagues focused and productive.
