Kaspersky Embedded Systems Security
Unique multi-layered security to protect embedded systems from the latest threats
Kaspersky Embedded Systems Security
Unique multi-layered security to protect embedded systems from the latest threats
- ✔️ Designed with the specifics of embedded systems in mind
- ✔️ The best protection for every configuration and power level
- ✔️ Support for multiple platforms
Overview
Security for varied, dispersed systems regardless of power levels
Windows embedded systems are an increasingly popular
target for cybercriminals. These devices tend to operate
inside the corporate network, are geographically
dispersed, and usually handle critical data, such as
credit and debit cards. End-of-life Windows XP is still
a standard for many of these systems, as is low-end
hardware, while Linux-based systems are on the rise.
Kaspersky Embedded Systems Security is specifically
designed to protect these systems against attacks
targeting their contents and exploiting their
weaknesses.
Challenges of using embedded systems
Resource constraints
Limited system resources mean it's impossible to use regular endpoint security without severely impacting performance
Specific attack vectors
The purpose-based architectures and operation mode comprise an attack surface that is dissimilar to that of regular computers
Unattended / public use
Embedded devices operate in remote and public spaces, increasing the risk of direct interference and impacting maintenance
Weak connectivity
Low speed and/or erratic connectivity impacts protection and manageability
Data security & compliance requirements
The financial and personal data processed on embedded devices are sensitive and subject to regulations
Software that's too old - or too new
Many embedded devices use outdated OSs that contain vulnerabilities, and which most modern security solutions don’t support. And protection for new Linux systems is rare.
Benefits of specialized protection
Maximum protection for every configuration and power level
Maximized protection
- ✔️ Every device gets peak protection that its resources can support
- ✔️ The latest protection against evolving, even unknown cyberthreats
- ✔️ Powerful self-protection mechanisms reduce risks - including direct interference
- ✔️ Minimal implementation impact on business processes
Optimized resource use & compatibility
Reliable protection for modern as well as old, resource-weak systems
- ✔️ Supports Windows and Linux-based systems
- ✔️ Resource constraints don’t impact performance
- ✔️ Remote location and poor connectivity are not a problem
- ✔️ Protects even legacy equipment using obsolete OSs
Compliance & data safety
Upholds data security and industry regulations
- ✔️ Hardened security means fewer incidents
- ✔️ Integrity monitoring further strengthen protection
- ✔️ Support for native Kaspersky or third-party SIEM facilitates accountability and helps with incident investigations
Key Features
Covering the complete product cycle
System
Hardening
The backbone of most embedded systems, allowing only what's needed to be used
-
Application Control
Industry-standard technology to prevent anything not related to work from running - including malware -
Device control
Protects against use of illegitimate peripherals that can cause an infection or make unwanted changes -
Update control
Prevents abuse of legitimate updating procedures for malicious purposes -
Self-protection
Withstands attempts at interference with updating the software on board app that can result in system compromise
Protection
Detects and prevents malicious activities
-
Malware protection
Multi-layered stack of advanced technologies to detect and block known and unknown threats -
Exploit prevention
revents malicious exploitation of vulnerabilities in components of OSs and software -
Network threat protection
Blocks network-based attack attempts, one of the key attack vectors against embedded devices
Integrity
monitoring
Prevents unsolicited changes being made to an embedded system's software
-
File Integrity Monitor
Detects changes in important system components and arbitrary files, defined by policies -
Registry Access Monitor
Tracks mission-critical and admin-configured changes to Windows registry -
Log inspection
Monitors system log and alerts for indicators of unwanted activities
Management &
Reporting
Monitor and operate your embedded systems' security safely and easily
-
Kaspersky Security Center unified interface
Manage your embedded systems security as an organic part of your IT security infrastructure -
On-prem or cloud-hosted
Manage using a console hosted on-prem or in the cloud – you decide. -
SIEM Support
Supports the Kaspersky Unified Monitoring & Analysis platform as well as a range of widespread third-party solutions -
Local console and command line support
Flexible maintenance thanks to CLI support and a locally available GUI
