{"id":37716,"date":"2020-11-19T11:46:58","date_gmt":"2020-11-19T16:46:58","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=37716"},"modified":"2020-11-24T04:24:31","modified_gmt":"2020-11-24T09:24:31","slug":"structured-approach-ransomware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/structured-approach-ransomware\/37716\/","title":{"rendered":"A structured approach to ransomware protection"},"content":{"rendered":"<p>For most of the past year, ransomware stories have featured regularly on news websites \u2014 and not just high-profile incidents (although there\u2019s no shortage of those). Ransomware creators are actively refining their methods and technologies. In 2020, we saw the merger of several groups into a cartel, the creation of sites for the publication of stolen materials, auctions for the sale of stolen information, and the first ransomware for Linux. More recently, news also emerged that a ransomware group had started using hacked Facebook accounts to intimidate victims.<\/p>\n<p>According to <a href=\"https:\/\/krebsonsecurity.com\/2020\/11\/ransomware-group-turns-to-facebook-ads\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Krebs on Security<\/a>, a group calling itself Ragnar_Locker Team took over the Facebook page of a Chicago-based DJ, launching an ad campaign in his name. Meanwhile, announcements with the subheading \u201cRagnar_Locker Team press release\u201d pointed directly to a successful attack on beverage maker Campari Group. In them, the attackers also boasted about the amount of stolen information in their possession, threatening to publish it if Campari refused to pay the ransom demand.<\/p>\n<p>All this seems to confirm that ransomware authors feel untouchable and are willing to spend part of their ill-gotten gains on mastering new technical tools and pressure levers. That means antiransomware efforts require more than just a security product on a workstation. And we\u2019re not the only ones who have come to that conclusion: Gartner recently proposed the Ransomware Defense Architecture method of protection.<\/p>\n<h2>Gartner\u2019s structured approach<\/h2>\n<p>Ransomware Defense Architecture combines IT systems and operations with security risk management. According to Gartner, technical professionals cannot approach ransomware defense from just one domain. Domains such as storage, networking and data protection, on-premises, in the cloud, and at the edge all have to take security into consideration when confronting a ransomware attack. Gartner sees ransomware attacks on a continuum timeline with five phases:<\/p>\n<ul>\n<li>Phase 1 \u2014 Prepare<\/li>\n<li>Phase 2 \u2014 Prevent<\/li>\n<li>Phase 3 \u2014 Detect<\/li>\n<li>Phase 4 \u2014 Mitigate<\/li>\n<li>Phase 5 \u2014 Recover<\/li>\n<\/ul>\n<p>Whereas phases 1 and 2 take place before an incident, phases 3 and 4 are during or at about the same time as the incident, and phase 5 occurs postincident.<\/p>\n<h2>Our solutions<\/h2>\n<p>As we see it, we offer the most comprehensive portfolio of solutions to cover the Gartner Ransomware Defense Architecture structure, with customer reviews for these solutions on Gartner Peer Insights placing us among the highest rated. In response to the high level of ratings we achieved, Kaspersky was named a Gartner Peer Insights Customers\u2019 Choice in the most recent iteration for <a href=\"https:\/\/www.kaspersky.com\/blog\/epp-peerinsights-2019\/31614\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Endpoint Protection Platforms<\/a> in 2019, and <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2020_kaspersky-recognized-as-a-highly-ranked-vendor\" target=\"_blank\" rel=\"noopener nofollow\">Endpoint Detection and Response<\/a> and <a href=\"https:\/\/www.gartner.com\/reviews\/market\/secure-web-gateways\/vendor\/kaspersky\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Secure Web Gateway<\/a> in 2020.<\/p>\n<h3>Phase 1: Prepare<\/h3>\n<p>Technology: Phishing Training Security Hygiene<br>\nGartner Peer Insights Market: Security Awareness Computer-Based Training<br>\nOur solutions: <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>, <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/adaptive-online-awareness-training?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Adaptive Online Training<\/a><br>\nCustomer Reviews (as of Nov. 1, 2020): <a href=\"https:\/\/www.gartner.com\/reviews\/market\/security-awareness-computer-based-training\/vendor\/kaspersky\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">4.8 \/ 5.0<\/a>; 98% Would Recommend; 45 reviews in the last 12 months<\/p>\n<h3>Phase 2: Prevent<\/h3>\n<p>Technologies: EPP, MTD, SEG<br>\nGartner Peer Insights Market: Endpoint Protection Platforms<br>\nOur solution: <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a><br>\nCustomer Reviews (as of Nov. 1, 2020): <a href=\"https:\/\/www.gartner.com\/reviews\/market\/endpoint-protection-platforms\/vendor\/kaspersky\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">4.8 \/ 5.0<\/a>; 94% Would Recommend; 512 reviews in the last 12 months<\/p>\n<p>Technology: EDR<br>\nGartner Peer Insights Market: Endpoint Detection and Response Solutions<br>\nOur solutions: <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Detection and Response<\/a><br>\nCustomer Reviews (as of Nov. 1, 2020): 84 reviews; <a href=\"https:\/\/www.gartner.com\/reviews\/market\/endpoint-detection-and-response-solutions\/vendor\/kaspersky\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">4.9 \/ 5.0<\/a>; 100% Would Recommend;<\/p>\n<p>Technology: VM and Patch<br>\nGartner Peer Insights Market: Cloud Workload Protection Platforms<br>\nOur solutions: <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/cloud-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____khcs___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Hybrid Cloud Security<\/a><br>\nCustomer Reviews (as of Nov. 1, 2020): 69 reviews in the last 12 months; <a href=\"https:\/\/www.gartner.com\/reviews\/market\/cloud-workload-protection-platforms\/vendor\/kaspersky\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">4.9 \/ 5.0<\/a>; 99% Would Recommend<\/p>\n<h3>Phase 3: Detect<\/h3>\n<p>Technologies: EDR, MTD<br>\nGartner Peer Insights Market: Endpoint Detection and Response Solutions<br>\nOur solutions: <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/edr-security-software-solution?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Detection and Response Optimum<\/a><br>\nCustomer Reviews (as of Nov. 1, 2020): 84 reviews; <a href=\"https:\/\/www.gartner.com\/reviews\/market\/endpoint-detection-and-response-solutions\/vendor\/kaspersky\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">4.9 \/ 5.0<\/a>; 100% Would Recommend<\/p>\n<p>Technology: SWG<br>\nGartner Peer Insights Market: Secure Web Gateways<br>\nOur solutions: <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/internet-gateway?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Internet Gateway<\/a><br>\nCustomer Reviews (as of Nov. 1, 2020): 57 reviews; <a href=\"https:\/\/www.gartner.com\/reviews\/market\/secure-web-gateways\/vendor\/kaspersky\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">4.6 \/ 5.0<\/a>; 95% Would Recommend<\/p>\n<p>Technology: NDR<br>\nGartner Peer Insights Market: Endpoint Detection and Response Solutions<br>\nOur solutions:<a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/anti-targeted-attack-platform?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kata___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Anti-Targeted Attack Platform<\/a><br>\nCustomer Reviews (as of Nov. 1, 2020): 84 reviews; <a href=\"https:\/\/www.gartner.com\/reviews\/market\/endpoint-detection-and-response-solutions\/vendor\/kaspersky\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">4.9 \/ 5.0<\/a>\u00a0 ;100% Would Recommend<\/p>\n<p>Technology: NDR<br>\nGartner Peer Insights Market: Operational Technology Solution<br>\nOur solutions: <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/industrial?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kics___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Industrial Cybersecurity<\/a><br>\nCustomer Reviews (as of Nov. 1, 2020): 74 reviews; <a href=\"https:\/\/www.gartner.com\/reviews\/market\/operational-technology-security\/vendor\/kaspersky\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">4.7 \/ 5.0<\/a> ; 95% Would Recommend<\/p>\n<h3>Phase 4: Remediate<\/h3>\n<p>Technology: EDR, MTD<br>\nGartner Peer Insights Market: Endpoint Detection and Response Solutions<br>\nOur solutions: <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Detection and Response<\/a><br>\nCustomer Reviews (as of Nov. 1, 2020): 84 reviews; <a href=\"https:\/\/www.gartner.com\/reviews\/market\/endpoint-detection-and-response-solutions\/vendor\/kaspersky\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">4.9 \/ 5.0<\/a>; 100% Would Recommend;<\/p>\n<p>This type of feedback from our customers is a genuine honor and spurs us to continue developing cutting-edge solutions. All of us at Kaspersky are enormously grateful to our customers for taking time from their busy schedules to voice their opinions of our solutions and help other peers in their decision-making process \u2014 theirs are the opinions we consider the most important. Finally, we want to recognize our various teams, without whose tireless efforts none of this would be possible.<\/p>\n<p><sup><em>The GARTNER PEER INSIGHTS CUSTOMERS\u2019 CHOICE badge is a trademark and service mark of Gartner, Inc., and\/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers\u2019 Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.<\/em><\/sup><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To counter modern ransomware threats, you need more than just endpoint protection.<\/p>\n","protected":false},"author":2501,"featured_media":37720,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[2062,420],"class_list":{"0":"post-37716","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-gartner","10":"tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/structured-approach-ransomware\/37716\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/structured-approach-ransomware\/14194\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/structured-approach-ransomware\/29633\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/37716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2501"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=37716"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/37716\/revisions"}],"predecessor-version":[{"id":37812,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/37716\/revisions\/37812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/37720"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=37716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=37716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=37716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}