{"id":14918,"date":"2013-12-27T14:44:47","date_gmt":"2013-12-27T14:44:47","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1316"},"modified":"2019-11-15T07:23:55","modified_gmt":"2019-11-15T12:23:55","slug":"the-problems-of-heterogeneous-means-of-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/the-problems-of-heterogeneous-means-of-protection\/14918\/","title":{"rendered":"The problems of heterogeneous means of protection"},"content":{"rendered":"<p><b>The problem<\/b><\/p>\n<p>Any company regardless of the level of maturity possesses some valuable information which having got into the hands unscrupulous individuals can put an end not just to the financial future, but also to the whole business. Representatives of very small businesses may have quite considerable sums on their bank accounts, but they can seldom boast of their secure network of workstations. At best PC owners in the companies just install a demo version of an antivirus and a custom firewall. At worst they do not establish protection at all.<\/p>\n<p>The Figure 1 below illustrates the situation when a user installs many different products by various vendors. Due to their functional protective features for any strictly defined set of threats the installed products in a LAN may not completely cover the entire set of threats, which in turn reflects the situation where an attacker despite the abundance of protective measures has an opportunity to make mischief.<\/p>\n<p style=\"text-align: center\">Figure 1. Correlation of various threats (in red circles) with the functionality of various protective means (in green circles)<\/p>\n<p>There are other downsides in installing all sorts of tools carelessly. On the one hand, the PC owner installs any product that possesses clearly defined functions (for example, antivirus protection) and forgets about it. On the other hand, the fact that the owner of the workstation forgets about the software after it has been installed can cause havoc at the most inappropriate moment. At some point the software may fail to update its database automatically, and it would require manual update, thereby, it will lead to the situation when the program becomes potentially open for hackers&#8217; threat probing which it should protect against (See Figure 2).<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1318\" alt=\"2eng\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/12\/06015903\/2eng3.png\" width=\"820\" height=\"747\" \/><\/p>\n<p style=\"text-align: center\">Figure 2. The software not updated in time is vulnerable<\/p>\n<p>The scenario above is just a special case to illustrate the necessity to update and maintain antivirus products. But security is provided by not an antivirus only. What if, for example, there is a need to organize data encryption procedures, and at the same time to install additional protection against spam? What now, you should spend valuable time on the administration of these products?<\/p>\n<p><b>The solution<\/b><\/p>\n<p>Kaspersky Small Office Security allows you to organize the protection of basic information resources and eliminate malicious activity. For these purposes the Kaspersky Lab&#8217;s product includes an Internet Security feature in addition to virus protection, as well as protection from phishing and spam. It performs the following actions:<\/p>\n<p>\u2022 monitors incoming and outgoing traffic for malicious activity;<\/p>\n<p>\u2022 scans web resources for malicious codes;<\/p>\n<p>\u2022 makes reputation checks of links from a cloud;<\/p>\n<p>\u2022 protects against spam.<\/p>\n<p>From the above functionality we can conclude that there is no need to install additional means of protection (a firewall). Moreover, KSOS Internet Security can also maintain all settings of a user&#8217;s firewall on the grounds of where a workstation currently is (within an organization&#8217;s network, a home network or at a public access point).<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1319\" alt=\"3eng\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/12\/06015902\/3eng1.png\" width=\"820\" height=\"836\" \/><\/p>\n<p style=\"text-align: center\">Figure 3. Correlation of various threats and KSOS functions<\/p>\n<p>In addition to providing additional protection of a workstation from the activities of intruders and malware KSOS also includes:<\/p>\n<div class=\"pullquote\">In order to be efficient the protection of basic information resources requires a single, unified solution to cover all the issues. Multiple incompatible solutions used within the same infrastructure make a security problem on their own.<\/div>\n<p>\u2022 encryption of valuable information;<\/p>\n<p>\u2022 backup and restore of important data;<\/p>\n<p>\u2022 web resources access control;<\/p>\n<p>\u2022 reliable means of removing files from a workstation.<\/p>\n<p>Each KSOS tool is configured from the single management console that also provides detailed information of running processes on your workstation. The user gets rid of lengthy configuration procedures and the need to maintain each product separately, thereby obtaining more time for performing business tasks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The problem Any company regardless of the level of maturity possesses some valuable information which having got into the hands unscrupulous individuals can put an end not just to the<\/p>\n","protected":false},"author":345,"featured_media":16307,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[503,2061],"class_list":{"0":"post-14918","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-kaspersky-small-office-security","10":"tag-ksos"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/the-problems-of-heterogeneous-means-of-protection\/14918\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/the-problems-of-heterogeneous-means-of-protection\/4655\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/the-problems-of-heterogeneous-means-of-protection\/14918\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/the-problems-of-heterogeneous-means-of-protection\/14918\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/kaspersky-small-office-security\/","name":"Kaspersky Small Office Security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/345"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14918"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14918\/revisions"}],"predecessor-version":[{"id":31066,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14918\/revisions\/31066"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16307"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}