All language subtitles for Part 2_ Kaspersky Endpoint Security Cloud technologies 02

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish Download
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 00:00:00 - 00:04:21 In addition to anti-malware scanning, which requires updates online, Kaspersky Security Network checks are used on Mac OS, but there are no control components or behavior detection, or firewall or mail threat protection. Devices running Mac OS are encrypted using the Filevault encryption technology. When the administrator enables Filevault encryption, Kaspersky Endpoint Security prompts the user for his or her credentials. Encryption will begin only after the user enters the credentials and the device restarts. Recovery keys are stored in the Kaspersky Endpoint Security Cloud infrastructure. Encryption management is available starting with Kaspersky Endpoint Security Cloud Plus. If an application can be installed on a device, then malware can be installed too. Additionally, if a device can be connected to the internet, then the user may visit a phishing site. In this sense, mobile devices are similar to workstations and should be protected in a similar way. When manufacturers improve the performance of tablets and smartphones. On the one hand, they enhance capabilities, enabling users to work with mail, Ms. Office files and so on. But on the other hand, they attract the attention of malware creators since these resources can also be used to launch malicious programs. Mobile devices are handy for web surfing. Therefore, they need to be protected from phishing attacks. A mobile device can be lost or stolen, so it is important that the security app can enforce stricter user authentication to prevent unauthorized access, as well as provide tools that will help find the device if it is lost. Mobile devices are less powerful than workstations, so real time protection and on demand scanning just cannot be as thorough as on workstations. On the other hand, there are significantly less malware for mobile platforms than for computers. If a mobile device is lost, the most desperate measure is to remotely wipe data from it. In this case, even if someone gains access to the device, data will not be leaked. Yes, there may be significantly fewer threats for mobile devices than for windows, but still enough to worry about an infected phone can send spam messages not only to email contacts, but also to the phonebook contacts. When considering a smartphone, from the perspective of corporate security, the most valuable asset is sensitive data. Attackers are likely to be interested in compromised data. Kaspersky Endpoint Security for mobile is installed on mobile platforms. This is a counterpart of Kaspersky Endpoint Security for windows designed for mobile platforms. Different applications are installed on different operating systems. Mobile device management for iOS. Kaspersky Endpoint Security mobile for Android. Android does not prohibit access to the device's file system, and it can even be used as a removable drive, but with some restrictions. All Android applications run in an isolated environment, and system files have read only access. However, users can gain root privileges in the operating system, which will give them unlimited administrator permissions, including modification of system files and access to all data of all installed applications. Kaspersky Endpoint Security for mobile cannot prevent this, but can detect rooting, notify the administrator and perform a preconfigured action. For example, lock the device or automatically wipe corporate data. Microsoft Office 365 has some basic built in protection that provides a minimal level of security, but this is not enough to feel safe. Kaspersky security for Microsoft Office 365 offers advanced protection against phishing, ransomware, spam, and business email compromise. Kaspersky security for Microsoft Office 365 features components similar to those of Kaspersky Endpoint Security, but designed for the office 365 cloud infrastructure. Exchange Online Protection can detect malicious files in attachments and phishing attacks on the fly. The OneDrive and SharePoint online components scan files for malicious code and delete them by default. Microsoft Teams protection scans transferred files for malicious code, as well as having the same components as Kaspersky Endpoint Security. Kaspersky Security for Microsoft Office 365 also has data discovery. This component ensures that any confidential data sent through or stored in exchange online mailboxes, OneDrive repositories, and SharePoint sites do not leak. By default, all detected sensitive data is quarantined and the administrator can take measures to prevent any leakage.4562

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.