Kaspersky applications installed on workstations or servers in the organization's IT infrastructure to protect these devices from viruses and other information security threats. Hereinafter also referred to as "EPP".
Contents of the working memory of a process or the entire RAM of the operating system at a specific point of time.
A binding agreement between you and AO Kaspersky Lab that stipulates the terms on which you may use the application.
Indicator of Compromise. A set of data about a malicious object or activity.
An IOC file contains a collection of Indicators of Compromise.
Kaspersky Endpoint Security Threat Response action for responding to threats detected by Kaspersky Sandbox. It is configured in Kaspersky Security Center policies.
If a threat is detected on any of the workstations in an administration group for which you are configuring the policy, Kaspersky Endpoint Security scans all workstations in the administration group, looking for objects that contain the detected threat.
The application as part of the Kaspersky Sandbox solution. It is installed on workstations and servers on your corporate LAN and provides comprehensive protection of workstations from various threats, network and fraud attacks, as well as performs Automatic Threat Response actions configured in Kaspersky Security Center policies.
A collection of Kaspersky Endpoint Security settings. Configured in Kaspersky Security Center for workstations that are part of an administration group.
Solution that detects and automatically blocks advanced threats on client devices (workstations, computers, servers).
Also the application that forms part of the Kaspersky Sandbox solution and is responsible for the server part of the solution. It is installed on one or more servers in your corporate LAN. Servers can be combined into a cluster. On Kaspersky Sandbox servers, virtual images of Microsoft Windows operating systems are deployed for running the objects that need to be scanned. Kaspersky Sandbox analyzes the behavior of the objects to detect malicious activity and advanced threats in the corporate IT infrastructure.
An infrastructure of cloud services that provides access to the online Knowledge Base of Kaspersky which contains information about the reputation of files, web resources, and software. The use of data from Kaspersky Security Network ensures faster responses by Kaspersky applications to threats, improves the performance of some protection components, and reduces the likelihood of false alarms.
Open XML-based standard for describing Indicators of Compromise (IOC) that contains over 500 various indicators of compromise.
Running an application for debug purposes involving stopping execution after each instruction and displaying the result of that step.
Page top