Skip to main content

Kaspersky Supports Healthcare Institutions Amid COVID-19 Pandemic With Free Product Licenses for Six Months - Business Wire

Kaspersky Supports Healthcare Institutions Amid COVID-19 Pandemic With Free Product Licenses for Six Months - Business Wire

Kaspersky Supports Healthcare Institutions Amid COVID-19 Pandemic With Free Product Licenses for Six Months - Business Wire

Posted: 23 Mar 2020 06:39 AM PDT

WOBURN, Mass.--()--Kaspersky is happy to today announce free availability of its core endpoint security products for medical organizations in order to help them stay protected from cyberthreats during the COVID-19 pandemic. The full list of B2B products available for free for six months include: Kaspersky Endpoint Security Cloud Plus, Kaspersky Security for Microsoft Office 365, Kaspersky Endpoint Security for Business Advanced and Kaspersky Hybrid Cloud Security.

Continuity of operations and data protection is extremely critical for healthcare organizations. Especially in the uncertainty of today's healthcare crisis, medical organizations are under extreme pressure and have to mobilize all of their forces to help people during this challenging time. For hospitals and medical institutions, it is important to ensure the stability of medical equipment and that data is constantly available for medical personnel while also protecting the privacy of their patients' critical information.

To help medical organizations cope with this unprecedented pressure and relieve cybersecurity risks that may arise, Kaspersky is now offering its B2B product solutions available for free. This includes endpoint and cloud infrastructure protection products, such as Kaspersky Endpoint Security for Business Advanced and Kaspersky Hybrid Cloud Security, SaaS endpoint protection like Kaspersky Endpoint Security Cloud Plus, and protection for Microsoft Office 365 via Kaspersky Security for Microsoft Office 365.

"In this critical situation, healthcare institutions are under immense pressure and carry vast responsibility while saving lives and fighting against the COVID-19 virus," said Evgeniya Naumova, vice president of the global sales network at Kaspersky. "Doctors, nurses and all medical staff take on most of the load and therefore need any support possible, and we feel that it is our duty to support the medical community. In order to help these organizations focus on what matters most, we will now offer healthcare institutions free licenses for key Kaspersky corporate products for a six month period."

In addition to this initiative, Kaspersky also suggests that medical institutions follow cybersecurity practices and implement the following measures as soon as possible:

  1. Schedule basic security awareness education for both medical personnel and administration employees covering the most essential practices such as passwords and accounts, email security, use of USB devices, PC security and safe web browsing. Additionally, explain to hospital staff that there is an increasing risk of cyberthreats for healthcare IT systems.
  2. Now is the time to check the hospital's protection solution, make sure it is up to date, configured properly and covers all employees' devices. Switch on a firewall to enable protection from threats coming from the internet. The security solution should enable protection from ransomware as it one of the common threats for medical organizations.
  3. Ensure all specific medical devices are properly configured and updated, such as ventilators. If there is a chance that the number of such devices increases rapidly, develop a dedicated procedure to quickly install and configure all new devices.
  4. Some hospitals urgently hire new staff which means growing the number of endpoints, including new employees' personal devices. This can damage visibility and control over corporate IT. As such, IT services should pay special attention to adding protection to these new devices. It's better to have security profiles, policies and licenses in advance to just add them to new devices when needed.
  5. Make sure your current security solution enables purchasing of enough licenses for the increasing number of devices.

For more detailed information about the offering and its availability please visit Kaspersky business blog or contact Kaspersky or its resellers directly.

About Kaspersky

Kaspersky is a global cybersecurity company founded in 1997. Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company's comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at

Best Kaspersky Total Security 2020 deal isn't from Kaspersky - Tech Advisor

Posted: 26 Feb 2020 12:00 AM PST

Leading web security brand Kaspersky now has 30% off its Total Security plans with protection starting at £27.99 for a year's coverage on one device.

Total Security offers all-round protection, combining both antivirus and internet security services. You get firewall, exploit protection, parental controls, webcam and audio safeguarding, VPN connectivity and more.

We would recommend the plan that protects 3 devices over a year (currently reduced to £34.99 from £49.99), which would effectively allow you to keep your PC (or Mac), phone and a tablet safe.

You can however find the same plan for cheaper elsewhere. Amazon has the 3 devices 1 year plan for £21 if you choose to receive the activation code by email. Cheaper yet, MyMemory is offering the same plan for £19.99.

MyMemory has discounts on other 1-year plans as well, with protection for 5 devices for £22.99 (compared to £41.99 from Kaspersky directly) and 10 devices at £27.99 (unavailable from Kaspersky directly).

See our round up of the best antivirus software and the best antivirus deals of the month.

Kaspersky Total Security benefits

2020 cybersecurity risks: Insecure security tools, supply chains, abandonware - Help Net Security

Posted: 22 Mar 2020 10:00 PM PDT

Considerable time and money are invested into looking for dangerous vulnerabilities in the most commonly used elements of IT infrastructure. Popular operating systems, networks, utilities and security tools constitute attractive targets for malicious hackers.

Here are some lessons we should learn from cybersecurity research in 2019.

Just because it's security software it doesn't mean it's safe

One would expect security software to contain some of the most secure code on the planet. During 2019, however, a SafeBreach research team discovered major vulnerabilities in widely used security products that were written and tested by reputable cybersecurity companies.

Product What can happen Underlying flaws
Trend Micro Maximum Security 2019 and 2020 DLL Search-Order Hijacking Signed Execution Whitelisting Bypass Uncontrolled search path, no digital certificate validation against the binary.
Trend Micro Password Manager Signed Execution Whitelisting Bypass Persistence Privilege Escalation Uncontrolled search path, no digital certificate validation against the binary.
Kaspersky Internet Security (KIS) Whitelisting Bypass Defense Evasion Uncontrolled search path, no digital certificate validation
Comodo Internet Security DLL Preloading No digital certificate validation, AV has no self-protection on its folders
McAfee – All Editions Defense Evasion Signed Execution Whitelisting Bypass No digital signature validation
Avira Antivirus 2019 Defense Evasion Signed Execution Whitelisting Bypass No digital certificate validation, no self-protection for the Launcher folder.
Avast Antivirus and AVG Antivirus Defense Evasion Self-Defense Bypass Root cause was found within one of Microsoft's DLLs, code integrity is not enforced in the AM-PPL process
Check Point Endpoint Security Initial Client Signed Execution Whitelisting Bypass Persistence Privilege Escalation Lack of safe DLL loading due to an uncontrolled search path, no digital certificate validation against the binary
BitDefender Antivirus Free 2020 Signed Execution Whitelisting Bypass Persistence Privilege Escalation Lack of safe DLL loading due to an uncontrolled search path, no digital certificate validation against the binary
Symantec Endpoint Protection Defense Evasion, Signed Execution Whitelisting Bypass No digital signature validation, Defense Evasion, Signed Execution, Whitelisting Bypass

In every case, the vulnerability – a repeating combination of two flaws – enabled DLL Search-Order Hijacking and some kind of defense evasion. All the security products – which number between 12 and 30, depending how one counts separate editions – contained a vulnerability that allowed an attacker to load malicious code in a DLL file into critical Windows services, without being required to sign the code using a digital signature. Making matters worse, the code would be running with the highest privileges on the user's computer.

Supply chain risks are a massive problem

The research team also found a surprising number of common exploit paths across a wide variety of systems and widely used software. As an example, the Dynamic-Link Library (DLL) search paths in the Windows Operating System (PC and server) turned up as a security flaw in multiple leading products. The table above shows security products, but other types of products from at least six global vendors contained the same vulnerability.

DLL search paths are an architectural artifact that allow an unwise level of access and flexibility to attackers. Because DLL paths linking to applications do not require signed certificates by default in order to load the software (unless specified explicitly by the developer), there are massive risks. Attackers can load and execute malicious payloads using what appears to be a signed service. Through this mechanism they can escalate privileges, even to the point where their code can read and exfiltrate contents of physical memory, or bypass antivirus software (defense evasion).

Identifying risks of potential UEPs should be a collective goal of the security community in 2020. Another UEP found in a widely used open source program, called Open Hardware Monitor, leads to the next point.

Open source abandonware is a growing risk

Open Hardware Monitor is a free open source software program that monitors temperature sensors, fan speeds, voltages, load and clock speeds of a computer. Tens of millions of computers use Open Hardware Monitor in their monitoring systems, including HP Touchpoint Analytics. When examining the GitHub repo, many unacknowledged issues were detected. It also appeared that the software itself had not been updated in a year or more. This is a concern because the code runs on so many endpoints and enjoys very high access privileges.

Another example: Heartbleed – a security bug in the OpenSSL cryptography library – exposed nearly all encrypted Internet traffic to a real security risk.

OpenSSL is a cryptography library widely used by internet servers to encrypt activities of users and to encrypt traffic to and from websites. When the existence of the Heartbleed vulnerability was revealed, we've all become uncomfortably aware that the security of such a critical element of the global online infrastructure depends on two guys named Steve who looked after it on a part-time basis.

Your security response mileage may vary

Researchers and white hat hackers report vulnerabilities to companies large and small. Unsurprisingly, there is great variability in how the vendors respond when they are alerted that there might be a bug in their product code.

Some vendors respond within minutes and have a patch ready for testing within 24 hours. Others do not respond for weeks. Also, some technology providers make it very easy to find the right people by publicly posting security policies and providing dedicated security emails. These companies tend to be the most responsive and build patches the most quickly.

Other companies lack public security policies and contacts, making it very difficult to reach and alert them. It's very counterproductive when a Good Samaritan must try DMing to a vendor's public Twitter handle to learn who to notify of a high-risk security gap. Technology providers that operate on a large scale, selling software or hardware that runs on software, should have a highly visible public security policy and clearly identified communications channels for reporting problems.

For 2020, tackle the big threats, but cover the basics

With 2019 now in the rearview mirror, more exploitation of the vulnerabilities described here is expected in 2020. Security changes come slowly, and even crises like NotPetya have not resulted in universally good patching hygiene, so more exploitation of the vulnerabilities described here can be expected in 2020.

Many in the security field have crossed paths with the kinds of problems mentioned above. Fixing or making major headway against these really big challenges will be critical to creating a more cyber secure 2020 and beyond.

Mobile Security Market anticipated to grow rapidly during 2025 with top key vendors like AO Kaspersky Lab, AVG Technologies, Bitdefender, BullGuard, F – Secure - Packaging News 24

Posted: 23 Mar 2020 11:17 AM PDT

Mobile Security Market report provides in-depth statistics and analysis available on the market status of the Mobile Security key players and is a valuable method of obtaining guidance and direction for companies and business enterprise insider considering the Mobile Security market. It contains the analysis of drivers, challenges, and restraints impacting the industry.

The research report on Mobile Security Market provides comprehensive analysis on market status and development trend, including types, applications, rising technology and region. Mobile Security Market report covers the present and past market scenarios, market development patterns, and is likely to proceed with a continuing development over the forecast period. A number of analysis tools such as SWOT analysis and Porter's five forces analysis have been employed to provide an accurate understanding of this market.

Some of the key players of Mobile Security Market:
AO Kaspersky Lab, AVG Technologies, Bitdefender, BullGuard, F – Secure, McAfee, Inc. (Intel Corporation), Microsoft Corporation, Symantec Corporation, Trend Micro Incorporated, Mware, Inc.

Get Sample Copy of this Report @

The Global Mobile Security Market research report offers an in-depth analysis of the global market, providing relevant information for the new market entrants or well-established players. Some of the key strategies employed by leading key players operating in the market and their impact analysis have been included in this research report.

Major Regions play vital role in Mobile Security market are:
North America, Europe, China, Japan, Middle East & Africa, India, South America, Others

The report provides a detailed overview of the industry including both qualitative and quantitative information. It provides overview and forecast of the global Mobile Security market based on product and application. It also provides market size and forecast till 2025 for overall Mobile Security market with respect to five major regions, namely; North America, Europe, Asia-Pacific (APAC), Middle East and Africa (MEA) and South America (SAM), which is later sub-segmented by respective countries and segments.

Get Discount for This Report @

The report evaluates market dynamics effecting the market during the forecast period i.e., drivers, restraints, opportunities, and future trend and provides exhaustive PEST analysis for all five regions.

Fundamentals of Table of Content:

1 Market Overview

2 Industry Chain

3 Environmental Analysis

4 Market Segmentation by Type

5 Market Segmentation by Application

6 Market Segmentation by Region

7 Market Competitive

8 Major Vendors

9 Conclusion

Purchase This Report @

About ReportsWeb: is a one stop shop of market research reports and solutions to various companies across the globe. We help our clients in their decision support system by helping them choose most relevant and cost effective research reports and solutions from various publishers. We provide best in class customer service and our customer support team is always available to help you on your research queries.

Contact Us:
Call: +1-646-491-9876
Email: [email protected]

What's driving the Endpoint Security Market growth? Key Players - openPR

Posted: 23 Mar 2020 11:59 AM PDT

Endpoint Security Market

Endpoint Security Market

Market Study Report Has Added A New Report On Endpoint Security Market That Provides A Comprehensive Review Of This Industry With Respect To The Driving Forces Influencing The Market Size. Comprising The Current And Future Trends Defining The Dynamics Of This Industry Vertical, This Report Also Incorporates The Regional Landscape Of Endpoint Security Market In Tandem With Its Competitive Terrain.

Endpoint security market is projected to surpass USD 7.5 billion by 2024.

Request a sample of this premium report at:

A Network endpoint is a device where communications originate and where they are received. Endpoint security refers to the framework for securing various endpoints on a network that are typically addressed as end-user devices and include mobile devices, laptops, desktop PCs along with hardware such as servers in data centers. Endpoints are considered to be the weakest links in network security; hence, securing them plays a critical role in effectively strengthening the overall network.

Some of the key features of typical endpoint protection solutions include vulnerability assessment, memory protection, application control and application sandboxing, file and full-disk encryption, endpoint Data Loss Prevention (DLP), and behavioral monitoring of application codes. These features are typically managed centrally and ideally integrated by shared policies. Endpoint security systems detect known vulnerabilities in the endpoints typically in common applications such as email clients, web browsers, and operating systems. Through the assessment, they notify system administrators about security issues to be addressed to secure the endpoints. Consolidating multiple endpoint technologies in one integrated solution is a growing trend in the endpoint protection industry. It helps in eliminating network security gaps, reducing the costs and complexities associated with deploying and managing multiple endpoint protection solutions, and increasing the endpoint system performance.

With consistently increasing stealthy, targeted, financially-motivated attacks aimed at exploiting vulnerabilities in endpoint devices, enterprises have become highly aware about employing a multilayered, seamless approach for endpoint protection. Signature-based antivirus and anti-spyware protection measures, which are traditionally used by enterprises are not sufficient to deal with constantly evolving cyber-threats today. Hence, the demand for advanced endpoint security solutions is consistently increasing among enterprise and government organizations.

The growing popularity of the BYOD trend in organizations around the world is also majorly contributing to the increased threat to enterprise networks for endpoint attacks. Tablets and smartphones have different capabilities, management interfaces, and operating systems. Hence, enabling centralized and consolidated network visibility is of utmost importance in BYOD environments.

The competition in the endpoint security market is primarily characterized by constant product innovation initiatives by companies to strengthen the endpoint protection against rapidly evolving types of malware. As thousands of new pieces of malware are created by attackers each day, the companies providing antivirus/antimalware solutions constantly update their detection tools with the latest security patches.

Some of the key players operating in the endpoint protection market are, F-Secure, Webroot, Sophos, Ahnlab, IBM, Symantec, Bitdefender, Cisco, McAfee, ESET Microsoft, Kaspersky Lab, VIPRE, Trend Micro, Panda Security, and Comodo.

North America dominated the endpoint protection market in 2016 and is projected to maintain the dominance throughout the forecast period, primarily due to large-scale deployment of malware protection solutions for strengthening network security of government and corporate IT networks. In February 2018, the U.S. Director of National Intelligence revealed that the United States? cybersecurity in both the public and private sectors is at a continual risk and the country should expect cyber attacks from various state and non-state actors. Such consistent cyber threats are leading to increased deployment of endpoint protection solutions across the country.

Asia Pacific endpoint protection market is projected to exhibit the fastest growth between 2017 and 2024. With the major focus on the digitization of economy in emerging countries including India and exploding penetration of smartphones and tablets and improving internet connectivity, the risk of malware attacks is being increasingly recognized in the region. Consequently, the adoption of endpoint security solutions in the region is expected to accelerate swiftly during the forecast timeline.

Request a discount on standard prices of this premium report at:

Report Content

Chapter 1. Methodology & Scope

1.1. Methodology

1.1.1. Initial data exploration

1.1.2. Statistical model and forecast

1.1.3. Industry insights and validation

1.1.4. Scope, definition and research parameters

1.2. Data Sources

1.2.1. Primary

1.2.2. Secondary

Chapter 2. Executive Summary

More Details on this report:

Contact Us:
Market Study Report LLC
4 North Main Street,
Selbyville, Delaware 19975
Phone: 1-302-273-0910
US Toll Free: 1-866-764-2150

About Us: allows you to manage and control all corporate research purchases to consolidate billing and vendor management. You can eliminate duplicate purchases and customize your content and license management.

This release was published on openPR.


Popular Posts

FBI and NSA issue cybersecurity advisory over new form of Russian malware - SiliconANGLE

System detected an overrun of a stack-based buffer in this application [FIX] - Windows Report

Unseen Suburban Danger: Children Dying of Mosquito-Borne Diseases - Wired