Whitepaper Product Building Robust Defenses
Whitepaper Product Building Robust Defenses
But having the time, the resources, or (to be frank) the motivation to navigate the
current threat and security landscape effectively – well that’s another question.
Most information security analysts - and there aren’t nearly enough of them to go round -
are overworked as it is. Looking after new employees and their devices, figuring out new
laws and compliance issues, reading up on the latest threats – all this needs to be dealt
with before actually getting down to the main business of corporate protection.
Basically, very few security professionals, if any, can enjoy the luxury of spending all
their time hunting down new and exotic threats and responding to them.
Which is where cybersecurity vendors and their products and solutions come in. Our
job is help you fully secure your infrastructure and keep your users safe, with the
lowest possible expenditure in terms of resources, including time and money as well as
expensive and hard-to-get expertise.
The challenges
91% of organizations have experienced at
1
First, let’s take a look at some of the issues today’s IT and IT Security Managers
least one attack in the course of a year. face.
1 in 101 organizations have faced a targeted
attack (as far as they are aware) over the Increased threat of an advanced or targeted attack
same period.
Targeted attacks and complex threats are a huge problem and are on the rise.
Cybercriminal tools are becoming so cheap and accessible that basically anyone with
• 53%2 of organizations know their a computer can now launch an advanced attack. Which means that organizations who
endpoints have been compromised once assumed they were ‘under the radar’ in terms of advanced threats are finding out
the hard way that things have changed.
• 30%1 of organizations have still not fully
implemented anti-malware software
That said, commodity threats also remain an issue: the sheer volume of these is a huge
• 56% of breaches take months or longer
3 problem in today’s world.
to uncover
The vast majority of cyber-threats either enter through the endpoint, or are designed
to trigger there (or both).
So one of the best ways to protect your assets is to protect your endpoints.
1
Human error
Unfortunately, attached to most of your endpoints is the single most vulnerable
component in any organization’s infrastructure – the user. Your users may well regularly
access your corporate data remotely and on their own devices, and many will have
grown up online, picking up bad habits and over-confidence along the way. And they, as
well as everything else, must also be kept safe.
And IT professionals can make mistakes too – we’re all only human, after all - mistakes
that can result in attacks via vulnerabilities on irregularly patched corporate or personal
devices, for example.
And, even for those lucky enough to have deep pockets, there’s a global shortage of
trained cybersecurity professionals. This problem isn’t new, but based on how many
specialists are being trained each year, it’s not going away anytime soon.
Keeping your security specialists happy and focused under these circumstances, or
just keeping them at all, is a challenge. Burnout is a big issue, particularly if your highly
skilled and expensively trained team are spending all day wading through mundane
tasks.
Plus, or course, there’s the issue of financial resources. And processor power. And
everything else it takes to optimize your security without impacting on processing
speeds, employee productivity, user satisfaction or budgets.
The solution
So what are the answers?
Effective protection
First and foremost, everything hangs on effective endpoint protection – it’s that
simple. Preventing threats at endpoint level, before they can trigger alerts, reduces
the stress on resources, mitigates the risk of an attack succeeding, and helps keep the
business running smoothly and safely.
This applies to both commodity attacks, which take up most of the time, and
targeted attacks, which are most likely to succeed and to do the most damage. Our
recommended approach is a combination of multi-layered endpoint defenses – a
strong baseline protection against commodity threats, and layered, multi-faceted
defenses against the latest, more complex threats.
EDR (Endpoint Detection and Response) provides the next critical security layer.
EPP (Endpoint Protection Platform) provides initial identification and protection, while
EDR provides visibility and deeper analysis options, allowing you to see how the attack
has started and what stage it’s at right now. Beside detection, EDR also provides
proactive response options, so the threat revealed can be quickly and efficiently
contained.
EDR can only be effective in combination with a strong bedrock of protection. The more
incidents your EPP solution can prevent up front, the fewer your EDR solution has to
deal with, and the more resources you can focus on these few.
2
Tackling human behavior
From a user perspective, one of the best ways to avoid human error is of course to
remove opportunity, and temptation, through application, web and device controls.
Effective controls, far from acting as a constraint on the business, can actually
boost productivity – through blocking time-wasting as well as potentially dangerous
entertainment websites and social media, for example.
But here, user education really is key. The right cybersecurity awareness training can
have a profound effect on employee behavior, changing the corporate culture, significantly
lowering corporate risk, and dramatically reducing the IT Department workload.
Automating tasks also removes risk of human error – automatically prioritizing and
implementing the patching of systems vulnerabilities, for example, is much more
effective than relying on human operators finding the time to undertake this critical but
unexciting activity.
Costs
Containment costs for organizations depending on security automation level
without security automation rose 16%6 and
for those with employing automation – 6M
decreased by 8%6. 5,16
5M
4,43
4M
2,88
3M 2,65
+16% YoY
2M
-8% YoY
1M
0M
2018 2019
Full automation No automation
3
A note on multi-layered protection
We’ve said that any solution aimed at protecting against all forms of cyberthreat,
including advanced and targeted attacks has to be multi-layered.
First of all, the solution has to provide robust baseline endpoint protection,
including endpoint controls (with web, application and device blocking and restriction
capabilities) and a hardened anti-malware engine. It’s also preferable to have
automated patch management and vulnerability assessment capabilities in place, to
save IT personnel time and effort on performing routing tasks.
But advanced malware sets additional challenges which require further security layers.
The malware may well be specifically designed to bypass even the most sophisticated
endpoint detection mechanisms, lying hidden and dormant until the right opportunity
to launch arises. The answer here is to persuade the malware to reveal itself and
activate in a safe, controlled environment. This is where a sandbox comes it. Some of
today’s sandboxes also provide a fast, automated response to the threat detected.
Detecting complex behaviors on endpoints is also the focus of EDR. Like EPP, EDR
should ideally combine automation with the tools and visibility to support human input
where required. The security analysts need to be able to perform root cause analysis
of incidents and to respond to threats in a timely manner, manually or by utilizing
automated response options.
And having an integrated solution for all this means no gaps between different tools,
which hackers and attackers can exploit.
Kaspersky’s solution
With Kaspersky Endpoint Security, we’ve created a highly automated integrated solution
consisting of endpoint protection and controls, an automated sandbox, and EDR,
complemented by an optional cybersecurity awareness training platform.
Endpoint protection layers provided by Kaspersky Endpoint Security for Business include:
4
Granular controls
Systems Hardening and human error mitigation is provided though controls including:
For more information about Kaspersky Endpoint Security for Business, please visit
https://www.kaspersky.com/small-to-medium-business-security/endpoint-advanced
Automated sandbox
The Kaspersky Sandbox automatically detects and responds to threats
designed to bypass endpoint protection – with no human intervention required.
Response
Internet
High-avaliability
cluster
Suspicious object analysis request
(asynchronous mode)
Network interface
Kaspersky to control malware
Analysis result Sandbox interactions with
the internet
KSC SIEM
Detection data exported
in CEF format
Centralized
managament
Objects being scanned are run by the clustered sandbox servers in an isolated virtual
machine that simulates a workstation.
The sandbox analyzes the data for malicious and suspicious activity, and returns the
verdict to the endpoint agent that requested the scan, as well as to the operational
cache, allowing other hosts to quickly retrieve information about the scanned object
without having to reanalyze it.
After the file is detected as malicious, its Indicator of Compromise (IoC) can be used to
launch an automatic remediation task to delete the file from all other machines in the
network.
5
Optimized EDR
Kaspersky EDR Optimum provides for both automated and manual analysis and
responses to advanced threats arising at endpoint level.
Abnormal user behavior can be identified, and evasive and in particular fileless threats
are automatically detected and remediated as they try to mimic common behavior.
Visual information and the ability to conduct root-cause analysis help ensure a rapid
reaction and swift neutralization.
Set up
See all Investigate Respond to Next
Log in automated
incidents incident the incident incident
response
No response
• Process injection
• File drops
• Registry key modifications
• Connections
• Anomalies in user behavior
• Isolate host
• Launch scan of the host
• Remove (quarantine) file
• Kill process
• Prevent process from executing
Kaspersky EDR Optimum combines high levels of automation, including processes like
importing and generating IoCs, initiating further scans and responding to incidents,
with single-click manual response options.
6
• 52% of companies regard employees Security awareness
as the biggest threat to corporate
cybersecurity7 We also offer computer-based training products that combine expertise in
• 60% of employees have confidential data
on their corporate device (financial data,
cybersecurity with the best-known educational technologies and practices. This
email database, etc.) approach changes users’ behavior and helps to create a cybersafe environment
• 30% of employees admit that they share throughout the organization.
their work PC’s login and password details
with colleagues8 The automated learning management platform takes just 10 minutes to launch, after
which it builds an education schedule for each group of employees, providing interval
learning with constant reinforcement, offered automatically through a blend of training
formats, including:
• learning modules
• email reinforcement
• tests
• simulated phishing attacks
You can follow your learners’ progress through the user-friendly dashboard, with live
data tracking, trends and forecasts, together with recommendations on how to boost
your results.
Your ROI
As with any solution, the costs are as important as the benefits we provide. Below is
an example of what a typical Return on Investment in Kaspersky solutions looks like,
based on a Forrester study7 of a Kaspersky Security Solution with Kaspersky Endpoint
Security for Business at its core:
Benefits (Three-Year)
Risk-adjusted present value (PV)
quantified benefits experienced
by companies interviewed for the $913.2K
$818.4K
Forrester study: $813.8K
• Nearly $1.0 million: the revenue impact
of improved uptime at the endpoint from
fewer instances of disruption.
• Over $40,000: fewer security related
incidents saved IT productivity by $208.3K
reducing the need to reimage endpoints. $43.3K
• Over $800,000: facilitated management
of multiple security solutions through the Redused downtime Avoided cost Improved IT Reduced chance Consolidation
centralized management console drove and business to reimage and security of a major and elimination
productivity savings. dispution from endpoints productivity from security breach of previous
improved endpoint centralized solution(s)
• Over $800,000: a major uplift to overall
protection management
security posture reduced the chance of a
“major” security breach.
• Over $200,000: the cost savings
associated with moving to Kaspersky. Forrester’s interviews with existing customers and subsequent financial analysis found
that an organization based on these interviewed organizations experienced benefits of
$2.8 million over three years versus costs of over $500,000, adding up to a net present
value (NPV) of $2.3 million and an ROI of 441%.
Financial Summary
<12 months
7
In summary
Endpoint protection is vital in keeping your organization safe in the modern
threat landscape. And the best way to protect your endpoints is a multi-layered
solution, using different techniques to detect and respond to threats in a highly
automated way, while enabling human input for more complicated tasks and
important decisions.
All this means that you can enjoy the highest levels of security against even the
most complex cyberthreats without tying up valuable resources.
For more information about how Kaspersky Endpoint Security can help secure your
organization against complex attacks without putting pressure on your resources,
please visit
https://www.kaspersky.com/small-to-medium-business-security/endpoint-
security-solution
www.kaspersky.com
2020 AO Kaspersky Lab. All rights reserved.
Registered trademark and service marks are the
property of their respective owners.