Cyber SecurityNews

Kaspersky boosts Enterprise Incident Response with Threat Lookup

Based on validated security intelligence data, Kaspersky Threat Lookup provides an effective tool for enterprises to improve their incident response and forensics; offering reliable, aggregated, retrospective and global insight on the latest threats, as well as legitimate objects.

Kaspersky Lab has announced the global availability of Kaspersky Threat Lookup – a security intelligence service aimed at enhancing enterprise incident response and cybersecurity forensics capabilities. Kaspersky Threat Lookup provides access to several petabytes of global security intelligence data that is being updated almost in real-time. This always-on web service helps businesses to properly analyze digital evidence in light of a security incident and obtain the insights needed to speed up detection and remediation.

According to a survey of more than 4,000 business representatives worldwide, conducted by Kaspersky Lab and B2B International in 2016, time is the crucial factor in incident detection and response. The survey findings show that enterprises pay over 100% more in recovery fees if they are unable to detect a security breach in a short time. The average recovery cost of a breach that stays undetected for a week or more is over $US1 million, while instantly discovered incidents cost US$400k to mitigate, almost half the overall industry average. Detection and response are some of the most time-critical activities on the agenda of security operations centers (SOCs) in organizations around the world, and both require reliable security intelligence.

Kaspersky Threat Lookup is the solution of choice for corporate IT security teams to accelerate their incident response and forensic capabilities. Once suspicious indicators such as IP, URL or file hash have been identified by a corporate IT security officer, they can be entered into the service web interface. In return, users are provided with meaningful and structured information about a potential threat and offers global insights that help identify a targeted attack in progress.

Kaspersky Lab’s security intelligence is collected from various sources including Kaspersky Lab’s cloud security network, spam traps, botnet monitoring initiatives and web crawlers. More importantly, that data is constantly being cross-checked by Kaspersky Lab’s own research team and automatically correlated. The solution offers corporate security officers contextual intelligence capabilities. It enables them to quickly investigate the source of the problem, distinguish between potentially malicious and benign actions, and obtain data for fast and efficient incident investigation. Overall, Kaspersky Threat Lookup allows SOC operators to prioritize and act efficiently in the typical scenario of hundreds and thousands alerts received every day.

Kaspersky Threat Lookup offers enterprises the same level of intelligence that Kaspersky Lab specialists use to analyze the most sophisticated threats, and includes indicators of compromise for these new attacks. The solution makes it possible to match data obtained during an investigation due to vast knowledge of malicious objects, as well as access to one of the largest databases of clean objects, part of the Kaspersky Whitelist service.

Veniamin Levtsov, Vice President, Enterprise Business at Kaspersky Lab, comments: “In 2016 we have rapidly expanded our range of Security Intelligence Services, including Threat Data Feeds, to provide businesses with the actionable intelligence required for faster detection. But in order to significantly reduce recovery costs, businesses need to improve detection together with response and forensic capabilities. That is, they need to understand the scope of the problem, identify the source of the security event and collect necessary intelligence to mitigate the threat.

The Kaspersky Threat Lookup portal is an important addition to the family of Security Intelligence Services that directly addresses these challenges. It provides instant access to Kaspersky Lab’s threat intelligence directly from cloud sources and contains comprehensive information on requested file hash, URL or IP.”

Related posts

Strontium Unveils New Generation NITRO Plus On-The-Go (OTG) Type-C USB 3.1

adminsmec

Seagate ropes in Robert yang as VP of sales for APac region

adminsmec

NASSCOM 10,000 Start-ups to Organize ‘Urban Hack’

adminsmec