Kaspersky EDR Optimum: Issues That Organizations Are Now Facing
Kaspersky EDR Optimum: Issues That Organizations Are Now Facing
EDR Optimum
Reducing the risk of your organization falling victim to targeted and advanced threats has become a
necessity rather than a luxury. We’re out to make this process simple and cost-effective, while keeping
everybody safe.
Kaspersky Endpoint Detection and Response (EDR) Optimum is a centralized automated tool that addresses
advanced and targeted attacks in ways that make it easy on both your staff and your IT resources.
Employing appropriate tools and expertise in order to prevent these threats costs a
fraction of this.
Then there are the IT resources required to run security solutions. Corporate IT
budgets are often spread thin enough as it is. The answer has to lie in lightweight
solutions, or those with minimal IT overheads.
How we help
Kaspersky EDR Optimum was developed to address the need for high-quality
security against complex modern-day threats, in the face of limited resources. It’s
designed to be robust in detecting threats, proactive in responding to them, and
practical in terms of day-to-day operations.
Use cases
Here are just a few simple cases where Kaspersky EDR Optimum can be used to detect,
investigate and respond to various threats.
Detect Investigate Respond
Malicious file detected and Kill chain visualization shows this file was dropped by an Prevent process from executing with a single
shown in the events list unsigned process click, quarantine the dropped file
Process injection detected Full information on the incident shows host info, file creation Isolate this host and search for similar incidents
and modification date, author and signature, etc. Based on this on other hosts in the network
information and the kill chain, the file is considered suspicious
Suspicious connection Incident data reveals the address the connection was established Isolate this host. Create IoC for periodic search
detected with. Kill chain visualization associates this connection to a registry on other hosts and set up automated response:
key change, both of which were initiated by the same process quarantine file and launch scan on host
How it works
Log in Kaspersky EDR Optimum adds enhanced visibility, root cause analysis capacity
and automated response to existing strong EPP (Kaspersky Endpoint Security for
See all Business), while utilizing the same agent.
incidents
IT Security
Data is gathered and analyzed from these hosts, and reporting, detailed incident information
Investigate and response options on the incidents are provided via the Kaspersky Security Center console.
incident
Incident list KESB*
Response to incidents can be either automated or ‘single click’. Automated response
is set up in order to respond to similar incidents on many hosts without human
involvement, and is triggered after a self-created or imported IoC has been detected
No Incident
response info on those hosts.
Respond
to the
incident We’ve made Kaspersky EDR Optimum as simple to operate as possible. After
deployment, your IT security staff only need to check the console once in a while, to
One-click Create
response IoC process the incidents arising, perform root cause analysis and respond to incidents.
This high level of automation and visibility eliminates the need for the security officer
Set up
automated
to go through massive amounts of data each day. Instead, it helps them focus their
Automated Find
response
response similar
attention on suspicious activities, giving them all the information they need.
To find out more about how Kaspersky EDR Optimum addresses cyberthreats while
Next going easy on your security team and resources, visit:
incident
Incident resolved http://www.kaspersky.com/enterprise-security/edr-security-software-solution
*Kaspersky Endpoint Security for Business