Kaspersky upgrads its endpoint security cloud with EDR for small & medium businesses
Digital Edge Bureau 14 Apr, 2021 0 comment(s)In a significant development, Kaspersky Endpoint Security Cloud now includes endpoint detection and response (EDR) capabilities dedicated for small and medium businesses (SMBs). It gives IT administrators visibility over affected endpoints and the attack kill chain, so they can analyze incident parameters and root causes, and then take proactive measures to enhance overall business protection.
Reliable protection from cyber-risks is essential for small and mid-sized businesses to keep their work, data, and finances safe. However, according to Kaspersky’s research, these companies may lack visibility over the IT environment when dealing with threats. This was ranked as one of the biggest challenges by 40 percent of SMBs. Details about an attack, affected users and the entry point can help businesses improve their security practices, in addition to the automated protection on all corporate endpoints.
Thanks to endpoint detection and response capabilities now available in Kaspersky Endpoint Security Cloud, IT managers can see visualized attack spread paths, details about affected machines (OS versions and users); infected file names and hashes; creation, modification, and startup parameters. All information is shown in the Kaspersky Endpoint Security Cloud online management console.
Andrey Dankevich, Senior Product Marketing Manager, B2B Product Marketing, Kaspersky, said, “This update brings specific educational value for small and medium businesses. It helps IT managers improve their cybersecurity expertiseand gain basic incident investigationskills. They can learn more about different types of threats in the wild, through a simple and demonstrative tool, and prepare themselves to work with more complex security challenges and solutions”.
so, by knowing how a threat gets into an endpoint, administrators canfine-tune security policies and take additional protection and awareness measures where necessary. For example, analysis could reveal that malware got onto an employee’s laptop disguised as a graphic file through a phishing email. The administrator could then update anti-phishing settings, make changes in security profiles for users who work with sensitive information and identify that employees may require additional training on cybersecurity.