Kaspersky Edr Expert Datasheet
Kaspersky Edr Expert Datasheet
Endpoint
Detection and
Response
Expert
Kaspersky Endpoint Detection
and Response Expert
A single solution
Cybercriminals are becoming ever more sophisticated and capable
Kaspersky EDR Expert is a single of successfully bypassing existing protection. Every area of your
solution that can be managed
from both a cloud-based central business can be exposed to risk, disrupting business-critical
management platform and from processes, damaging productivity and increasing operating costs.
an offline console in air-gapped
environments.
Boost your endpoint defenses first
Corporate endpoints are where data, users and corporate
systems come together to generate and implement business
processes. These endpoints continue to be the primary target
for cybercriminals.
Kaspersky EDR Kaspersky EDR Expert gives you the power to:
Expert is ideal if your
• Detect threats using the best, most advanced methods. Profiling
organization wants to: potential threat actors’ activity is an efficient way of detecting
• Upgrade your security with an malicious activity within an infrastructure.
easy-to-use, enterprise solution for
incident response.
• Automate threat identification &
response without business disruption
Kaspersky EDR Expert allows centralized Indicators of Compromise (IoC) to
during investigations.
be loaded from threat data sources and supports automatically scheduled IoC
• Understand the specific Tactics,
scanning, streamlining analysts’ work
Techniques, and Procedures (TTPs)
used by threat actors to achieve
their goals, enabling more powerful
defenses and the effective allocation
of security resources.
• Enhance your endpoint visibility With our Indicators of Attack (IoA) engine, Kaspersky EDR Expert can discover
& threat detection with advanced suspicious actions using the unique set of IoAs generated by Kaspersky’s threat
technologies. hunters, provisioning real-time automated threat hunting capabilities
• Establish unified and effective threat
hunting, incident management and
response processes.
• Increase the efficiency of your in-
house SOC so they don’t waste their To give you a more accurate picture of what’s happening, a file or process can be
time analyzing irrelevant endpoint sent to the Sandbox for behavioral analysis, either manually or automatically
logs and alerts.
• Support compliance by enforcing
endpoint logs, alert reviews and the
documenting of investigation results.
IoAs and Sandbox detections are mapped to MITRE ATT&CK for the further
analysis of the adversary’s Tactics, Techniques and Procedures. Individual
events in the incident's tree are enriched with MITRE knowledgebase context,
including the identification of MITRE-defined tactics used and visualization
of the event on the incident graph
• Investigate the causes of the incident and prevent any recurrence.
Kaspersky EDR Expert provides high-level endpoint protection
and increases the efficiency of your SOC, providing access
to retrospective data, even in situations where compromised
endpoints are inaccessible or when data has been encrypted during
an attack. Boosted investigation capabilities through our unique
IoAs, MITRE ATT&CK enrichment and a flexible query builder,
plus access to our Threat Intelligence Portal knowledge base - all
Counteraction facilitate threat hunting and fast incident response, leading to
recommendations effective damage limitation and prevention.
The automatic analysis of all • Choose a convenient telemetry storage option for forensics.
endpoint events, correlated
with the intelligence data A centralized database stores endpoint telemetry for 30 days by
acquired, arms you with default and objects and verdicts with no time limit, meaning that
clear event descriptions, forensic analysis can be performed without relying on endpoint
examples and counteraction availability. If you find you need more telemetry retention time, this
recommendations. can be increased to 60 or 90 days. In on-prem installations, it’s up
to you to determine the period of data storage, depending on the
capacity and characteristics of your hardware.
• Respond in the way that suits you best. Your IT security experts
are equipped with tools that enable a ‘one click’ response via the
central management console, reducing the number of manual tasks
and cutting response times from hours to minutes.
Verdicts
Data analysis and incident investigation
DATA STORAGE
Objects
Telemetry
Incident
Response
DATA COLLECTION
Server
Automated advanced Retrospective
detection analysis
Read more
www.kaspersky.com