Kaspersky Private Security Network

The comprehensive threat intelligence database for isolated networks and stringent data-sharing restrictions

Request a Call Download Datasheet

Kaspersky Private Security Network can be installed within your own data centre - your in-house IT specialists retain complete control. So your IT infrastructure and SOC can enjoy all the benefits of cloud-assisted security without compromising on privacy, and stay in compliance with regulatory requirements requiring that no item of data leaves your perimeter.


What We Offer

  • Real Time Threat Intelligence

    Real Time Threat Intelligence

    Global Threat Intelligence from Kaspersky Lab provides all the information needed - in real time - to mitigate daily security incidents and investigate potential attacks.

  • Rapid Threat Detection

    Rapid Threat Detection

    Standard security solutions take up to four hours to detect and block new malware. Kaspersky Private Security Network takes about 40 seconds – without a single piece of data leaving your local network.

  • Immediate Response

    Immediate Response

    Immediate response and reaction capabilities, driven by the latest, cloud-based threat intelligence - delivered within the controlled, local network.

 

Suitable for

  • Enterprise Organisations

  • Financial Services

  • Government

  • Energy

  •  
  • Telecommunications

  • Critical infrastructure

  • Managed Security Service Providers

In Use

Threat Intelligence Delivered Within a Controlled Local Network

It takes up to four hours for a standard security solution to detect, record and block the 305,000+ new malicious programmes Kaspersky Lab researchers detect every day. Kaspersky Private Security Network delivers information about new threats to security solutions within 40 seconds – without a single piece of data leaving your local network.

Comply with Strict Regulatory Security and Privacy Standards

Kaspersky Private Security Network is installed entirely within the organisational perimeter, and operates within those limits only. This enables organisations with strict data privacy obligations – such as financial services or government agencies – to benefit from cloud-assisted security without compromising on privacy.

Adapted for Critical Network Isolation and ‘Air Gap’ Requirements

While many vendors of cloud-assisted security offer ‘caching proxies’ that reduce the number of times a system has to contact the cloud for reputational data, Kaspersky Lab is unique in its ability to deploy the cloud entirely locally, within the organisation’s own data centre and with zero outbound transactions with third-party servers. This capability can be crucial to industrial and governmental settings in particular.

Flexible Deployment and Piloting Options

Kaspersky Private Security Network can be installed in virtual environments or on physical server clusters if required. For inter-operability with the Kaspersky Anti Targeted Attack Platform, the KPSN server farm requires an additional server.

System Requirements

Premium Support and Professional Services

Professional help is available whenever you need it. Operating in more than 200 countries, from 34 offices worldwide, we have you covered 24/7/365. Take advantage of our Maintenance Service Agreement (MSA) support packages, or call on our Professional Services to ensure that you derive maximum benefit from your Kaspersky Lab security installation.

  • 2 4

    Hours
    a day

  • 0 7

    Days
    a week

  • 3 6 5

    Days
    a year

FIND OUT MORE
 

The Threats

Regulations concerning data-sharing should not result in compromised security due to organisations being unable to access powerful security databases and crucial intelligence in real time. Attempting to function without such intelligence can result in:

  • Strict regulatory, security and privacy standards for data access

  • Lower detection rate and threats sharing without real time cloud connection

  • Physically isolated networks unable to get cloud reputation

  • High damage caused by new cyberthreats and zero-day attacks

  • Signatures updates requiring a lot of time (up to 3-4 hours)

  • National and geographical restrictions for data sharing

Related Solutions