According to the latest Kaspersky IT Security Economics report, nearly 46 percent of companies outsource work to external specialists due to the complexity of business processes and infrastructure. In-house staff may not always have the necessary knowledge as the threat landscape is rapidly changing or because they can’t deal with complex IT Security solutions efficiently. Keeping this in mind, Kaspersky updates its solutions regularly to adapt them to evolving business and security needs and make the working processes easier for customers.
Kaspersky Anti Targeted Attack Platform (KATA) and Kaspersky Endpoint Detection and Response Expert (KEDR Expert) have been improved by configuring Windows operating system settings in the sandbox[1] to be more flexible and adaptable to customer’s infrastructure. This helps IT Security experts to better detonate malicious links and files, and makes virtual machines with a fully featured OS more customized to companies’ real business environment. With these new updates clients are able to set up computer and user account name, system language (English/Russian) and install applications.
To facilitate the management of Kaspersky Endpoint Detection and Response Expert, the EDR agent was integrated into Kaspersky Endpoint Security for Linux and Kaspersky Endpoint Security for Windows. Telemetry collected from this agent can be sent to third-party systems via API providing more efficiency for already existing SIEM, SOAR or XDR companies’ systems.
“Our customers have complex infrastructures and need cybersecurity solutions with flexible settings. To meet their needs, we are constantly developing our products, customizing them, and making them easier to manage. By doing this, we are able to contribute to better business cyber resilience,” comments Veniamin Levtsov, VP, Center of Corporate Business Expertise, Kaspersky.
To learn more about Kaspersky Anti Targeted Attack Platform and Kaspersky EDR Expert, please visit the website.
[1] A sandbox is a system for malware detection that runs a suspicious object in a virtual machine (VM) with a fully-featured OS and detects the object’s malicious activity by analyzing its behavior. VMs are isolated from the real business infrastructure.
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.