Detecting and responding to sophisticated attacks requires specific expertise, while internal training or hiring additional experts may not always fit into the cybersecurity budget.
A lack of resources can lead to untimely responses to incidents and, as a result, increase the losses of the organization. According to a Kaspersky report, for enterprises, the average cost of a data breach rises by more than $400k depending on whether a breach is discovered almost instantly or beyond seven days.
Targeted towards such organizations, Kaspersky Managed Detection and Response provides major benefits of an outsourced security operations center (SOC) and does not require specialized threat hunting and incident analysis skills from internal teams, which can be especially relevant for mid-size businesses. The service is complemented by detection technologies as well as extensive expertise in threat hunting and incident response from professional units including the Global Research & Analysis Team (GReAT).
It is also empowered with AI Analyst that enables automatic alert resolution and allows Kaspersky SOC analysts to concentrate on the most important alerts. The combination of technologies and expertise gives customers protection form threats that evade detection, for example, by mimicking legitimate programs. IT security experts can see the protection status of all assets and threat detections in real time, receive ready-made response recommendations or authorize managed response scenarios.
The service integrates several components. Kaspersky products such as, for example, endpoint protection or EDR, send their telemetry to the Kaspersky Security Network. This telemetry is then analyzed in the internal Kaspersky Security Operations Center using more than 700 constantly updated proprietary TTP-based ‘hunts’ tailored to the customer’s environment along with various detection engines. Since alerts are collected from all endpoints, this allows the system to detect links of one attack chain on various machines. All detections are further validated and prioritized by Kaspersky’s threat hunting team to ensure a timely response.
After investigation, customers receive incident alerts and a comprehensive guide to incident response in the dedicated MDR portal. Response options can then be initiated through an endpoint detection and response (EDR) agent. Customers can also combine MDR with Kaspersky’s Incident Response retainer to completely outsource incident investigation, forensics and elimination.
The Kaspersky MDR Optimum tier enables turnkey protection while Kaspersky MDR Expert allows access to the vendor’s SOC analysts certified and trained with OSCP, GCTI, SANS SEC560, SANS SEC660 for consultation, access to the Kaspersky Threat Intelligence Portal and an API for integration with existing security workflows.
With this launch, Kaspersky also introduces new frameworks to address companies’ needs in terms of threat defense and IT security maturity level. Kaspersky MDR powers each framework enabling an instantly matured IT security function while allowing mature IT security teams to focus on responding to the critical outcomes delivered.
Kaspersky Security Foundations provides adaptive protection against broader threat landscapes targeting customers’ endpoints, mobile devices, cloud infrastructure and servers. This strong foundation will help organizations get value from security investments by preventing threats automatically. Professional help is available whenever customers need it and is delivered as Premium Support and the redesigned portfolio of Professional Services.
Kaspersky Optimum Security framework enhances security against new, unknown and evasive threats by helping medium-sized businesses and smaller enterprises with limited cybersecurity resources to build incident response. The framework provides advanced detection mechanisms with machine learning-based algorithms and a sandbox, as well as enhanced threat visibility, root cause analysis capabilities and a wide array of response actions. The framework also suggests security awareness training programs to help organizations build a cybersafe employee culture.
Kaspersky Expert Security framework represents a holistic strategy to help equip, inform and guide in-house experts to face the full spectrum of today’s complex threats, APT-like and targeted attacks. Kaspersky Anti Targeted Attack Platform with Kaspersky EDR at its core acts as an Extended Detection and Response (XDR) solution, delivering all-in-one APT protection with network threat discovery and EDR capabilities. IT security specialists are armed with all the technologies they need to handle superior multi-dimensional threat discovery at both endpoint and network levels, undertaking effective investigations, proactive threat hunting, and delivering a rapid, centralized response — all through a single solution. In addition, the framework offers Kaspersky Threat Intelligence and training to upskill IT security staff, as well as the ability to receive assistance, immediate support and third-party opinion from Kaspersky experts through the portfolio of cybersecurity services.
“Effective threat protection is always a set of measures that must be well coordinated with each other, easy to manage and meet the needs of customers. Frameworks work just like that. Another advantage is that, unlike one specific solution, they offer a cybersecurity roadmap for the company, assuring the transition from one IT security maturity level to another when the time comes. Thus, in the case of MDR, at a more basic level of information security development, a company can receive a fully automated service. And when the expertise of its specialists grows, switch to the expert level and get involved in the threat hunting and investigation,” explains Dmitry Aleshin, VP, Product Marketing at Kaspersky.
(Image Courtesy: www.gcn.com)