Kaspersky Private Security Network

The comprehensive threat intelligence database for isolated networks and stringent data-sharing restrictions

Request a Call Download Datasheet

Kaspersky Private Security Network allows enterprises to take advantage of most of the benefits of global cloud-based threat intelligence, without releasing any data whatsoever outside their controlled perimeter. It’s an organisation’s personal, local and completely private version of Kaspersky Security Network.


What We Offer

  • Real Time Threat Intelligence

    Real Time Threat Intelligence

    Global Threat Intelligence from Kaspersky Lab provides all the information needed - in real time - to mitigate daily security incidents and investigate potential attacks.

  • Rapid Threat Detection

    Rapid Threat Detection

    Standard security solutions take up to four hours to detect and block new malware. Kaspersky Private Security Network takes less than 60 seconds – without a single piece of data leaving your local network

  • Immediate Reaction

    Immediate Reaction

    Immediate response and reaction capabilities, driven by the latest, cloud-based threat intelligence - delivered within the controlled, local network

 

Suitable for

  • Enterprise organizations

  • Financial Services Industry

  • Government Bodies

  • Energy Suppliers and providers

  • Telecommunications

  • Healthcare

  • Critical infrastructure

  • Managed Security Service Providers

In Use

Threat Intelligence Delivered Within a Controlled Local Network

It takes up to four hours for a standard security solution to detect, record and block the 305,000+ new malicious programs Kaspersky Lab researchers detect every day. Kaspersky Private Security Network delivers information about new threats to security solutions within 60 seconds – without a single piece of data leaving your local network.

Compliance with Regulatory Security and Privacy Standards

Kaspersky Private Security Network is installed entirely within the organisational perimeter. There is zero outbound data flow: one-way inbound communication allows the integrity of your security database to be maintained through continuous updates. This enables organisations with stringent data privacy obligations – such as financial services or government agencies – to benefit from cloud-assisted security without compromising on privacy.

Adapted for Critical Network Isolation and ‘Air Gap’ Requirements

While many vendors of cloud-assisted security offer ‘caching proxies’ that reduce the number of times a system has to contact the cloud for reputational data, Kaspersky Lab is unique in its ability to deploy the cloud entirely locally, within the organisation’s own data centre and with zero outbound transactions with third-party servers. This capability can be crucial to industrial and governmental settings in particular.

Tailored URL and File Reputation Inputs.

As well as creating your own URL and file reputations, you can now benefit from reputations and other information provided by external 3rd party systems - all feeding directly into your KPSN installation, with no intermediate steps, via an API. A new file reputation format is also supported, ensuring forward compatibility with future versions of Kaspersky Endpoint Security.

System Requirements

Premium Support and Professional Services

Professional help is available whenever you need it. Operating in more than 200 countries, from 34 offices worldwide, we have you covered 24/7/365. Take advantage of our Maintenance Service Agreement (MSA) support packages, or call on our Professional Services to ensure that you derive maximum benefit from your Kaspersky Lab security installation.

  • 2 4

    Hours
    a day

  • 0 7

    Days
    a week

  • 3 6 5

    Days
    a year

FIND OUT MORE
 

The Threats

Regulations concerning data-sharing should not result in compromised security due to being unable to access powerful security databases and crucial intelligence in real time. Attempting to function without such intelligence can result in:

  • Strict regulatory, security and privacy standards for data access

  • Lower detection rates and threat sharing

  • Physically isolated networks being unable to receive cloud reputation

  • High damage caused by new cyberthreats and zero-days

  • Signatures updates requires a lot of time (up to 3-4 hours)

  • National and geographical restrictions for data sharing

Related Solutions