Verified Document

Technological Advancements And Security Research Paper

Related Topics:

Kaspersky Lab Technology and Product Review for Endpoint Protection Solutions: Kasperksy Lab

Whereas technological advancements have presented important advantages for business organisations, they have increased security concerns. Viruses, worms, hacking, identity theft, and other cyber threats have been on the rise, with cyber criminals advancing in skill, expertise, and shrewdness. These threats, which are increasingly targeted at the point of the end user, can result in the loss of critical and confidential information such as customer data and business secrets, consequently leading to dire consequences on an organisation, such as reduced customer confidence, loss of revenue, and expensive lawsuits. To avoid this risk, it is important for Red Clay Renovations to have a strong endpoint protection platform. This is particularly crucial given the widespread usage of intermittent cellular devices by employees to access the internet and the organisation's network while in the field. Endpoint protection platforms provide endpoints with defence against security exploits by identifying threat signatures, detecting intrusions, avoiding unexpected traffic, whitelisting, and rootkit protection (Wilkins, 2014). One endpoint protection solution the organisation can use is Kaspersky Lab. This paper provides a review of the software, clearly highlighting its features, capabilities, deficiencies, as well as its usage in...

Parts of this document are hidden

View Full Document
svg-one

Indeed, Gartner's Gartner Magic Quadrant has named it as the world leader in endpoint protection platforms. Its products have been touted for discovering several formerly unidentified viruses and security vulnerabilities such as Stuxnet, Flame, Red October, Mask, Regin, and the Android cyber espionage (Kaspersky Lab, n.d.). Among a host of other cyber security solutions, the firm provides anti-virus software, internet security solutions, password management services, and endpoint security products to individuals and organisations all over the world (Kaspersky Lab, n.d.). Its products provide protection against malware, monitor end-user devices for suspicious programs, and detect potentially unsafe websites.
One of the firm's endpoint security platforms is the Kaspersky Endpoint Security for Business Suite, which is specifically designed for corporate users. The platform provides protection against cyber security vulnerabilities targeted at laptops, smartphones, tablets, and personal computers; and is available for iOS, Android, Symbian, Windows, and BlackBerry operating systems (OSs) (Kaspersky Lab, n.d.). This platform is particularly suitable for the organisation, which currently relies on Microsoft Windows Defender and Microsoft Windows Firewall. These platforms do not offer strong security measures, and can readily be compromised. The organisation's construction managers and architects rely on laptops and cellular devices to access its web-based project management system, email servers, as well as web-based business applications, necessitating the need for the stronger Kaspersky platform.

Though costlier in most cases, Kaspersky has unique features and capabilities that make it a more…

Sources used in this document:
References

Consumer Affairs (2016). Consumer complaints and reviews. Retrieved from: https://www.consumeraffairs.com/computers/kaspersky-anti-virus.html

Kaspersky Lab (n.d.). Company overview. Retrieved from: https://www.kaspersky.com/about/company

Rouse, M. (2015). Endpoint security management. Retrieved from: http://searchsecurity.techtarget.com/definition/endpoint-security-management

Rubenking, N. (2016). Kaspersky antivirus. Retrieved from: http://www.pcmag.com/article2/0,2817,2460689,00.asp
Wilkins, S. (2014). A guide to choosing an endpoint protection solution. Retrieved from: http://www.tomsitpro.com/articles/endpoint-protection-solutions,2-820.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Film Fred Ott Was the
Words: 1898 Length: 6 Document Type: Essay

Technology in Film Fred Ott was the very first movie star that every existed. His brief starring role in the five-second film that showed him sneezing started the use of technology to make films. Since then, technology both in and out of film has changed immeasurably and what technology is used and is said about technology in these same films has evolved quite a lot and the statements sometimes made are

Technology Proposal Social Networking and
Words: 1070 Length: 4 Document Type: Term Paper

Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to

Technology for Students With Disabilities
Words: 3214 Length: 11 Document Type: Research Paper

These benefits arise because of implementing both assistive technologies and Information Communication technology (ICT). The implementation of technology in classrooms usually has benefits to both the disabled students as well as the teachers (Kirk, Gallagher, Coleman, & Anastasiow, 2012, p.240). The general benefits of use of assistive technologies and ICT in teaching students with learning disabilities include greater learner autonomy and unlocking hidden potential with those with communication difficulties.

Technology in the Workplace the
Words: 2715 Length: 9 Document Type: Research Paper

Instead, organizations must strike a balance between the autonomy and independence offered by technology in the workplace and the need for employees to have some level of formal and informal commitment to the organization as a whole. Just as seemingly counterproductive activities such as doodling, daydreaming, or, in the information age, surfing the internet, can actually contribute to efficiency by offering employees productive mental stimulation, so too can the

Technology in the Classroom in Today's Society,
Words: 3260 Length: 10 Document Type: Research Paper

Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now