Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Kaspersky EDR and Kaspersky Anti Targeted Attack enhanced with unique Indicators of Attack and mapping to MITRE ATT&CK to empower and simplify investigation process

June 2019 by Marc Jacob

The latest versions of Kaspersky EDR and Kaspersky Anti Targeted Attack offer new features that simplify the investigation process and enhance threat hunting. A recently added database of Indicators of Attack (IoAs), maintained and fed by Kaspersky Lab’s own expert threat hunters, helps to deliver additional context during investigation of cybercriminal activities. In addition, IoAs are now mapped to the MITRE ATT&CK knowledge base for further analysis of adversaries’ tactics, techniques and procedures. These key improvements help enterprises investigate complex incidents faster.

Cyber-incidents relating to complex threats can have a significant impact on business. The cost of response and process recovery, the need to invest in new systems or processes, the effect on availability and the damage to reputation all adds up. Today, organizations need to consider not only the growing number of widespread malicious programs, but also the increase in complex advanced threats that are targeting them. In 2018, 41% of enterprises[1] admitted that they suffered a targeted attack. Clearly, companies need protection from the more sophisticated threats that would otherwise evade detection. Kaspersky helps to solve this issue with the next generation of Kaspersky EDR and Kaspersky Anti Targeted Attack platform.

Using Indicators of Attack to boost the investigation process

Kaspersky EDR and Kaspersky Anti Targeted Attack include functionality to check for Indicators of Compromise (IoCs), such as hash, file name, path, IP address, URL, etc., which show that an attacker has struck. In addition to search for IoC, new capabilities with IoAs provide an opportunity to identify the intruders’ tactics and techniques, regardless of the malware or legitimate software used in the attack. To simplify the investigation process when examining telemetry from multiple endpoints, events are correlated with a unique set of IoAs from Kaspersky Lab. Matched IoAs show up in the user interface with detailed descriptions and recommendations on the best way to respond to the attack.

Customers can produce their own set of IoAs based on their internal experience, knowledge of the most significant threats and their specific IT environment. All new events are automatically mapped in real time with the internal database of custom IoAs, enabling the immediate creation of informed response actions and long-term detection scenarios, according the specifics of the protected infrastructure.

Mapping to the MITRE ATT&CK knowledge base

Together, Kaspersky EDR, Kaspersky Anti Targeted Attack and MITRE ATT&CK – a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations – enable companies to validate and investigate incoming incidents more efficiently. Discovered threats are automatically mapped to the knowledge base, immediately contextualizing the new events with external intelligence and attack technique data. Having a deeper understanding into an attack reduces future risks and helps security teams cut the time taken to analyze and respond to threats.

null

The enhanced functionality is also available for organizations that offer cybersecurity monitoring and management. The new multi-tenancy architecture allows Managed Security Services Providers (MSSPs) to protect the infrastructure of multiple clients at the same time.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts