Comparison of Kaspersky Next editions
| Feature | Kaspersky Next EDR Foundations | Kaspersky Next EDR Optimum | Kaspersky next XDR Expert | Workstation | Server |
|---|---|---|---|---|---|
| File Threat Protection | Y | Y | Y | Y | Y |
| Mail Threat Protection | Y | Y | Y | Y | Y |
| Web Threat Protection | Y | Y | Y | Y | Y |
| Network Threat Protection | Y | Y | Y | Y | Y |
| Firewall | Y | Y | Y | Y | Y |
| Behavior Detection, Exploit Prevention , and Remediation Engine | Y | Y | Y | Y | Y |
| Wiping data from a Windows device | Y | Y | Y | Y | |
| Scan removable drives on connection | Y | Y | Y | Y | Y |
| BadUSB Attack Prevention | Y | Y | Y | Y | |
| Advanced Disinfection | Y | Y | Y | Y | |
| Vulnerability Assessment | Y | Y | Y | Y | Y |
| Root-Cause Analysis | Y | (Within Endpoint Detection and Response) | (Within Endpoint Detection and Response) | Y | Y |
| Endpoint Detection and Response | Y | Y | Y | Y | |
| Data Discovery | Y | Y | Y | ||
| Cloud Discovery : Monitoring cloud services | Y | Y | Y | Y | |
| Cloud Discovery: Blocking access to cloud services | Y | Y | Y | ||
| Patch Management | Y | Y | Y | Y | |
| Encryption Management | Y | Y | Y | Y | |
| Host Intrusion Prevention | Y | Y | Y | Y | |
| Device Control | Y | Y | Y | Y | Y |
| Web Control | Y | Y | Y | Y | Y |
| Adaptive Anomaly Control | Y | Y | Y | ||
| Application Control | Y | Y | Y | Y | Y |
| Microsoft Office 365 protection | Y | Y | |||
| Cybersecurity training | Y | Y |