{"id":2224,"date":"2014-07-11T18:08:10","date_gmt":"2014-07-11T18:08:10","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2224"},"modified":"2020-02-26T10:53:06","modified_gmt":"2020-02-26T15:53:06","slug":"451-research-on-kaspersky-lab-quick-response-as-a-key-differentiator","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/451-research-on-kaspersky-lab-quick-response-as-a-key-differentiator\/2224\/","title":{"rendered":"451 Research on Kaspersky Lab: quick response as a key differentiator"},"content":{"rendered":"<p>451 Research has recently released a research paper dedicated to Kaspersky Lab. It\u2019s very complimentary, so we are proud to be affiliated.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>\u00a0<\/p>\n<p>451 points out several distinctive factors which make Kaspersky Lab\u2019s case peculiar: For instance, despite its large size (2,900 employees globally), the company manages to maneuver the market with admirable agility; this is mostly due to its private-owned nature:<\/p>\n<p><em>\u201cWith an R&amp;D arm a thousand strong and no external investors or shareholders to answer to, the company is free to explore whatever avenues it prefers and executes relatively quickly on its decisions. With much of its competition traditionally slow to maneuver and respond to market changes and the security landscape quick to change, it is no surprise Kaspersky changed direction away from the IPO route and chose to remain private.\u201d<\/em><\/p>\n<p>Another distinctive feature is that Kaspersky Lab does everything in-house: no acquisitions. Kaspersky Lab\u2019s technologies are all home-brewed, and that\u2019s the basis of the strategy our company took long ago. Advantages are clear: All products share the same codebase, which removes any compatibility issues between different products.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Researchers noted that Kaspersky Lab is agile in maneuvering the market, no matter its size.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7c3H&amp;text=Researchers+noted+that+Kaspersky+Lab+is+agile+in+maneuvering+the+market%2C+no+matter+its+size.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><em>\u201cAlthough Kaspersky has integration and technical partnerships with more than 80 hardware and software vendors, it has taken steps to remove reliance on partnerships for core technologies. For example, while Kaspersky once partnered with Bit9 for access to its global software registry, it now offers a native in-house offering via the Kaspersky Security Network (KSN),\u201d<\/em> the paper reads.<\/p>\n<p>This, however, doesn\u2019t mean that Kaspersky Lab doesn\u2019t do partnerships at all. Our sales partner network is vast and, fortunately, far-reaching.<\/p>\n<p>451 Research specifically points out the diversification of Kaspersky Lab\u2019s products as yet another of the company\u2019s advantages:<\/p>\n<p><em>\u201cThis diversification includes reaching into niche and mainstream markets alike with products designed to protect mobile devices, virtualized environments, SCADA\/ICS environments, ATMs and POS terminals.\u201d<\/em><\/p>\n<p>That\u2019s been done for a good (or a bad?) reason: threats emerged that cannot and should not be overlooked. For instance that hapless piece of malicious highly targeted software that\u2019s now called Stuxnet showed, among other things, that ICS users just weren\u2019t ready for getting hit; they were, well, innocently 404 about the very possibility of malware slithering in.<\/p>\n<p>That\u2019s no longer the case, although the situation is\u00a0<a href=\"https:\/\/business.kaspersky.com\/we-need-to-talk-industrial-security-impressions-from-the-1st-ibero-american-industrial-security-congress\/\" target=\"_blank\" rel=\"noopener nofollow\">improving at much slower pace than desired<\/a>.\u00a0In 2003, Kaspersky Lab\u2019s experts predicted that mobile malware would be breaking surface soon. In 2004 <a href=\"https:\/\/business.kaspersky.com\/cabir-five-stories\/\" target=\"_blank\" rel=\"noopener nofollow\">Cabir, the first smartphone virus, hit the scene<\/a>. Even though it was very benign (except for the battery), the fact it was there proved that another Pandora box was due to be opened. And today mobile Trojans, etc. are arguably an even bigger problem than old-timer PC malware.<\/p>\n<p>While 451 points out Kaspersky Lab\u2019s ability \u201cto shift strategy, innovate and bring new products to market in a relatively short time in response to market trends\u201d, it\u2019s not just about trends, but rather threats that are in focus.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/07\/06020040\/800-3-1.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-2226\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/07\/06020040\/800-3-1.jpg\" alt=\"800-3\" width=\"800\" height=\"332\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>Given the avalanche of malware appearing daily, the reaction timing is essential: \u201cenemies\u201d (i.e. malware writers and cyber-attackers) are smart, tech-savvy, well prepared and highly motivated, whether it\u2019s about money or political statements or whatever. So \u2013 strike ahead wherever possible, cover all areas where the problems may emerge, from home to huge corporate networks; employ newer technologies such as cloud (Kaspersky Security Network), sandboxing, automatic exploit prevention; get antifraud prevention up and running (and do it yourself instead of paying millions for acquisition as IBM did), branch out to MDM, patch management to protect businesses, and threat intelligence \u2013 or get beaten. We prefer the latter never happens.<\/p>\n<p>In the end 415 Research says (in the \u201cWeaknesses\u201d section):<\/p>\n<p><em>\u201cWe feel the company could do more to enter the next-gen endpoint market and distance itself from its antivirus roots. We\u2019re also seeing the threat detection and remediation (TDR, derivative of the ETDR acronym) market steadily moving toward the anti-malware space and even combining with it in the case of Bit9\u2019s Carbon Black acquisition.\u201d<\/em><\/p>\n<p>Well, to be honest, while Kaspersky Lab is far ahead from its \u201cantivirus roots\u201d, it is \u201cinertia of perception\u201d that makes end users call us \u201can antivirus vendor\u201d. But on the other hand, it\u2019s still the same story: is antivirus on its own is \u201cdead\u201d or \u201calive\u201d, or, by Heaven\u2019s grace, \u201cundead\u201d even?<\/p>\n<p>\u201cDead\u201d means \u201cgone\u201d; has the antivirus gone bye-bye? Nope. Is it sufficient for a modern security solution to have only virus-busting capabilities? Negative. A modern security solution needs to be both an antivirus and a lot of lots else.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>People will call \u201can antivirus\u201d any security solution for several years ahead. It\u2019s a habit.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7c3H&amp;text=People+will+call+%26%238220%3Ban+antivirus%26%238221%3B+any+security+solution+for+several+years+ahead.+It%26%238217%3Bs+a+habit.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>But people will still call it \u201cantivirus\u201d, because it\u2019s a habit. One day it\u2019ll go away. We, on our side, keep doing everything to crack that perception, marketing-wise, and technology-wise Kaspersky Lab is far ahead and beyond already.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>451 Research has released a very complimentary overview of Kaspersky Lab&#8217;s current position and strengths. Here&#8217;s some commentary from their report.<\/p>\n","protected":false},"author":234,"featured_media":15922,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2129,352,732],"class_list":{"0":"post-2224","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-451-research","10":"tag-kaspersky-lab","11":"tag-research"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/451-research-on-kaspersky-lab-quick-response-as-a-key-differentiator\/2224\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/451-research-on-kaspersky-lab-quick-response-as-a-key-differentiator\/2224\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/451-research-on-kaspersky-lab-quick-response-as-a-key-differentiator\/2224\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/451-research\/","name":"451 Research"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/234"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2224"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2224\/revisions"}],"predecessor-version":[{"id":33228,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2224\/revisions\/33228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15922"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}