This is a demo store. No orders will be fulfilled.
This is a demo store. No orders will be fulfilled.
What are the main features and key benefits of Kaspersky Security for Internet Gateway Add-On?
Threat Filtering – Blocks malware and risky content in transit.
Phishing Protection – Stops fake sites stealing passwords and data.
URL Control – Enforces browsing rules by category and user.
HTTPS Inspection – Detects threats hidden inside encrypted traffic.
Gateway Visibility – Provides logs and reports for audits.
Policy Automation – Applies consistent rules across multiple gateways.
Web antivirus – Scans web traffic for malware and exploits.
URL filtering – Blocks harmful sites and risky web categories.
HTTPS inspection – Inspects encrypted traffic for hidden threats.
Application control – Restricts unwanted web apps and services.
Central management – Manages policies and updates from one console.
Reporting logs – Delivers web activity reports and threat logs.
Kaspersky Security for Internet Gateway Add-On strengthens internet gateway protection for organizations using Kaspersky business security tools. It helps reduce web-borne risk while improving control and visibility.
Lower infection – Stops web malware before endpoints are exposed.
Safer access – Blocks phishing pages and deceptive websites.
Encrypted coverage – Finds threats inside HTTPS traffic streams.
Cleaner traffic – Reduces unwanted content and risky downloads.
Better control – Applies access rules by group and time.
Faster response – Provides logs that speed incident review.
It protects internet access by inspecting traffic at the gateway.
Blocks malicious web content before reaching users.
Stops downloads carrying malware and unwanted software.
Prevents visits to known phishing and scam sites.
Applies consistent rules for browsing and applications.
Yes, it can inspect HTTPS traffic when configured appropriately.
Decrypts and checks sessions for malicious content.
Selective rules can reduce unnecessary inspection overhead.
Exceptions can be set for sensitive destinations.
Improves visibility into threats hidden by encryption.
URL filtering reduces risk and keeps web use aligned with policy.
Blocks categories like phishing, malware, and high-risk sites.
Allows different rules for teams and job roles.
Supports time-based policies for work-hour control.
Helps reduce distractions and risky browsing behavior.
Policies can be assigned by user, group, or network segment.
Different departments can have different access rules.
Schedules can enforce policies during specific hours.
Exceptions keep critical business resources accessible.
Changes apply centrally to keep enforcement consistent.
It provides logs and reports for monitoring and auditing needs.
Shows blocked threats and policy hits with timestamps.
Highlights repeated violations and risky browsing patterns.
Supports investigations with searchable event history.
Helps demonstrate policy compliance over time.
The add-on extends protection for customers using Kaspersky business security platforms, while standalone gateway protection is purchased and managed as its own separate product.
Add-on is designed to complement an existing Kaspersky security environment.
Standalone fits organizations buying gateway security independently.
Add-on focuses on adding gateway layers without changing core workflows.
Standalone may be chosen when only gateway protection is needed.
"URL filtering finally gave us clean, enforceable browsing policies."
"HTTPS inspection helped us spot threats we were missing before."
"The reporting made audits easier and incidents quicker to trace."
"Phishing blocks improved user safety without constant training reminders."
"Gateway protection noticeably reduced malware tickets for endpoints."
Instant delivery - Product keys and downloads available within minutes.
Activation guarantee - If activation fails, you receive a new key.
Download included - Secure official download link always provided after purchase.
Easy installation - Clear step-by-step instructions guide you through setup.
Genuine licenses - Product keys from audited, legally compliant distribution channels.
Multilingual support - Help in seven languages via chat, email, phone.
Easy exchanges - Problematic keys replaced quickly, without unnecessary bureaucracy.
Transparent pricing - No hidden fees. Fair prices and price plans to get even better prices.
Trusted seller - Over 2800 Trustpilot ratings averaging 4.8 out of 5.
| Operating Systems | 64-bit operating system required CentOS: 7.7 64-bit Rocky Linux: 8.10 / 9.4 64-bit Red Hat Enterprise Linux: 7.7 / 8.10 / 9.4 64-bit Ubuntu: 18.04 LTS / 20.04 LTS / 22.04 LTS / 24.04 LTS 64-bit Debian: 9.13 / 10.13 / 11.10 / 12.10 64-bit SUSE Linux Enterprise Server: 15 SP1 64-bit RED OS: 7.3 / 8.0 64-bit ALT Server: 10 64-bit |
| Processor | 8 CPU cores / x86-x64-v2 required for Rocky Linux 9.4 or Red Hat Enterprise Linux 9.4 |
| Memory RAM | 16 GB |
| Swap | 8 GB or more |
| Storage | 200 GB hard drive space / 25 GB for temporary file storage / 25 GB for log file storage |
| Locale | en_US.UTF-8 locale installed |
| Required Packages | sudo / less |
| Additional Packages | Red Hat Enterprise Linux or Rocky Linux or RED OS: libxcrypt-compat / initscripts / SUSE Linux Enterprise Server: insserv-compat |
| Time Synchronization | Time synchronization configured / same time zone on all servers |
| Web Server | Nginx 1.14.0 or higher |
| Load Balancer | HAProxy 1.5 or later |
| Proxy Server | HTTP or HTTPS proxy server with ICAP / Request Modification REQMOD / Response Modification RESPMOD / Squid recommended |