{"id":36541,"date":"2020-07-29T11:34:15","date_gmt":"2020-07-29T15:34:15","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=36541"},"modified":"2020-07-30T08:57:11","modified_gmt":"2020-07-30T12:57:11","slug":"endpoint-detection-response-automation","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/endpoint-detection-response-automation\/36541\/","title":{"rendered":"Level up your endpoint protection with detection and response"},"content":{"rendered":"<p>Effective \u2013 and cost-effective \u2013 cybersecurity is an art of balance. Complex cyberthreats are becoming more common, but every organization faces different risks.<\/p>\n<p>How likely are you to be attacked and by which threats? How should you use your time, money and resources to address these? How much expertise do you have, and how much could you expand it? Getting these answers right is where minimizing cybersecurity risk and improving efficiency begins.<\/p>\n<p>Recently, having more <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/telecommuting-cybersecurity\/34206\/\" target=\"_blank\" rel=\"noopener nofollow\">employees working from home<\/a> has highlighted the importance of endpoint protection. The growing incidence of more disruptive advanced and complex threats adds further concern. Organizations of every size need safe and reliable ways to communicate and share information.<\/p>\n<p>But that\u2019s not all. Many businesses now find they\u2019re at greater risk now attacks are more complex and frequent so they\u2019re looking for a more advanced security tool: Endpoint Detection and Response (EDR.)<br>\nAll EDR products aim to better identify, investigate and respond to advanced and complex threats like <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/how-to-ransomware\/34227\/\" target=\"_blank\" rel=\"noopener nofollow\">ransomware<\/a> and <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/fileless-threats-protection\" target=\"_blank\" rel=\"noopener nofollow\">fileless threats<\/a>. It\u2019s an extra layer on top of endpoint protection that\u2019s continuously looking for and responding to advanced threats.<\/p>\n<h2>What does EDR do?<\/h2>\n<p>EDR can have a range of capabilities, depending on the product and vendor. There may be a detection engine, for example, analyzing threats using machine learning and executing possible threats in a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/sandbox\/\" target=\"_blank\" rel=\"noopener\">sandbox<\/a>. It may include a real-time analytics engine, monitoring memory and searching for behavior patterns.<br>\n<img decoding=\"async\" class=\"aligncenter size-large wp-image-36543\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/07\/28021206\/189_EDR_automation-inline-1024x768.jpg\" alt=\"endpoint detection response automation\" width=\"1024\" height=\"768\"><br>\nThe most important EDR feature may be visibility into your endpoints. With visibility, you can investigate past attacks or current threats on endpoints. You can involve cybersecurity experts in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cyber_threat_hunting\" target=\"_blank\" rel=\"noopener nofollow\">threat hunting<\/a> using advanced tools. And once you\u2019ve identified and analyzed threats, you can respond fast, preferably in an automated way, saving time and resources.<\/p>\n<p>EDR doesn\u2019t replace your Endpoint Protection Platform (EPP.) If you feel your EPP isn\u2019t up to the job, upgrade it before you add EDR into the mix.<\/p>\n<h2>Multi-layered threat response saves time<\/h2>\n<p>Cyberthreats are best addressed with multiple layers. As the threat enters the host, an endpoint protection engine uses approaches like structural machine-learning models and behavior analysis to identify and neutralize traditional threats.<\/p>\n<p>EDR comes into play after EPP has filtered out most malware through these automated processes. It lets you concentrate resources on the more dangerous complex and advanced threats.<br>\nUsing EDR\u2019s investigation, threat hunting and response capabilities, your cybersecurity team can efficiently address these more serious threats. For example, when a threat is detected, a cybersecurity officer can perform a root cause analysis to see if it\u2019s a complex threat and find out where it came from. If it is a complex threat, they can respond right away and set up a task to search for similar threats, automatically applying the same response. According to Kaspersky\u2019s IT Security risks survey, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-economics-report-2019\/28913\/\" target=\"_blank\" rel=\"noopener nofollow\">28 percent of companies using EDR could detect cyberattacks immediately after or within a few hours<\/a> of an incident.<\/p>\n<h2>How EDR saves time and resources<\/h2>\n<p>Automating and simplifying processes saves time and resources, and improves security. Even partial automation leads to faster responses, which could be crucial to mitigate a more serious impact for cases like <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/how-to-ransomware\/34227\/\" target=\"_blank\" rel=\"noopener nofollow\">ransomware<\/a>. Together with a more simplified workflow, less will get missed because of \u2018alert fatigue\u2019 from dealing with many similar incidents. You can then give more attention to incidents that need human intervention, using EDR\u2019s enhanced visibility, investigation and response capabilities.<\/p>\n<p>You should see a happier IT team, freed from routine tasks and able to work better. They can deal with complex incidents quickly and efficiently, significantly improving your security and preventing business disruption.<\/p>\n<h2>Choosing the right EDR for your business<\/h2>\n<p>All EDR tools on the market are different. Some provide better threat hunting, while others focus on streamlining workflow and better integration.<\/p>\n<blockquote><p>Your organization may not need every EDR capability. To choose the right product, think about what capabilities you need.<\/p>\n<\/blockquote>\n<p>Here are some examples of Kaspersky products that could help.<\/p>\n<p>For better threat visibility, investigation and response capabilities when your IT department doesn\u2019t have access to highly skilled security officers, use <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/endpoint-security-solution\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Detection and Response Optimum<\/a>.<\/p>\n<p>For better threat discovery, threat hunting and centralized incident response when you have a specialized security team, try <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Detection and Response<\/a>, perhaps as part of <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/kaspersky-anti-targeted-attack-platform\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Anti-Targeted Attack Platform<\/a>.<\/p>\n<p>The broadening landscape of advanced and complex attacks has made many companies reexamine their endpoint protection. These businesses realize they need to do more to reduce the risk from cyberattacks. In a market where there\u2019s strong competition for cybersecurity skills, EDR capabilities help make the best use of your team\u2019s abilities. Investigation tools and visibility into all endpoints are intelligent additions to your endpoint security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With visibility, investigation and response, Endpoint Detection and Response (EDR) frees up your team\u2019s time while improving your cybersecurity.<\/p>\n","protected":false},"author":2608,"featured_media":36542,"template":"","coauthors":[3906],"class_list":{"0":"post-36541","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-endpoint-security","7":"emagazine-tag-cyberattacks","8":"emagazine-tag-malware","9":"emagazine-tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/endpoint-detection-response-automation\/36541\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/endpoint-detection-response-automation\/22956\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/endpoint-detection-response-automation\/21140\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/36541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/36542"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=36541"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=36541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}