Comparison of Kaspersky Security Center and Kaspersky Security Center Cloud Console

You can use Kaspersky Security Center in the following ways:

The table below lets you compare the main features of Kaspersky Security Center and Kaspersky Security Center Cloud Console.

Feature comparison of Kaspersky Security Center running on-premises and as a cloud solution

 

Feature or property

Kaspersky Security Center

 

MMC-based Administration Console

Kaspersky Security Center 13 Web Console

Kaspersky Security Center Cloud Console

Administration Server location

On-premises

On-premises

Cloud

Database management system (DBMS) location

On-premises

On-premises

Cloud

Web-based administration console

No

Maintenance of Administration Server and DBMS

Managed by customer

Managed by customer

Managed by Kaspersky

Hierarchy of Administration Servers

(Administration Server of Kaspersky Security Center Cloud Console can only act as a primary Administration Server in the hierarchy policies and tasks monitoring)

Administration group hierarchy

Migration of the managed devices and related objects from Kaspersky Security Center on-premises to Kaspersky Security Center Cloud Console

No

Network polling

(by distribution points only)

Maximum number of managed devices

100 000

100 000

25 000

Protection of Windows, macOS, and Linux managed devices

Protection of mobile devices

(only KES for Android is supported)

Protection of virtual machines

Protection of public cloud infrastructure

Device-centric security management

Application policies

Tasks for Kaspersky applications

Kaspersky Security Network

KSN Proxy

(on distribution points only)

Kaspersky Private Security Network

No

Centralized deployment of license keys for Kaspersky applications

Switching managed devices to another Administration Server

No

(you must reinstall Network Agents on managed devices to switch them to another Administration Server)

Support for virtual Administration Servers

Installing third-party software updates and fixing third-party software vulnerabilities

(to fix third-party software vulnerabilities, you can install only recommended fixes)

Notifications about events occurred on managed devices

Encryption management

Working under an on-premises user account in the application

Creating and managing user accounts

(internal users can be added only through a request to Technical Support)

Integration with SIEM systems

(by using Syslog only)

(by using Syslog only.

You can use TLS over TCP protocol only)

Using Administration Server as WSUS server

No

Monitoring the policies and tasks status

Support of the cluster technology

No

See also:

Licenses and the minimum number of devices for each license

Page top