{"id":39358,"date":"2021-04-14T15:43:00","date_gmt":"2021-04-14T19:43:00","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=39358"},"modified":"2021-04-15T05:59:31","modified_gmt":"2021-04-15T09:59:31","slug":"endpoint-cloud-edr","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/endpoint-cloud-edr\/39358\/","title":{"rendered":"Cyberattack analysis and quick response"},"content":{"rendered":"<p>Most security solutions for small and medium-size businesses exist simply to prevent malware from running on a workstation or server \u2014 and for years, that was enough. As long as an organization could detect cyberthreats on end devices, it could arrest the spread of infection over its network and thus protect the corporate infrastructure.<\/p>\n<p>Times change. A typical modern cyberattack is not an isolated incident on one employee\u2019s computer but a complex operation affecting a sizable portion of the infrastructure. Therefore, minimizing the damage of a modern cyberattack requires not just blocking malware, but also quickly understanding what happened, how it happened, and where it could happen again.<\/p>\n<h2>What\u2019s changed<\/h2>\n<p>Modern cybercrime has evolved such that even a small company might reasonably fall prey to a full-featured, targeted attack. To some extent, that\u2019s a result of the increasing availability of the tools needed for a complex, multistage attack. Also, however, criminals always try to maximize their profit-to-effort ratio, and ransomware operators really stand out in that regard. Lately, we\u2019ve seen true research and lengthy preparation for ransomware operations. Sometimes, operators lurk in a target network for weeks, exploring the infrastructure and stealing vital data before striking with encryption and ransom demands.<\/p>\n<p>A small business may instead serve as an intermediate target in a supply-chain attack \u2014 attackers sometimes use the infrastructure of a contractor, an online service provider, or a small partner to assault a larger organization. In such cases, they may even exploit zero-day vulnerabilities, which is normally a costly option.<\/p>\n<h2>Understanding what happened<\/h2>\n<p>Ending a complex, multilevel attack requires a clear picture of how an attacker penetrated the infrastructure, how much time they spent inside, which data they may have accessed, and so forth. Simply deleting malware would be akin to treating a disease\u2019s symptoms without addressing its causes.<\/p>\n<p>In enterprise-level companies, the SOC, IS department, or an outside party performs such investigations. Big companies use EDR-class solutions for that. Limited budgets and staff tend to place those options out of reach of a small business. Small businesses still need specialized tools, though, to help them respond promptly to complex threats.<\/p>\n<h2>Kaspersky Endpoint Security Cloud with EDR<\/h2>\n<p>Setting up our SMB solution with EDR functionality doesn\u2019t take a security expert \u2014 the updated Kaspersky Endpoint Security Cloud Plus offers improved visibility of the infrastructure. The administrator can quickly identify the paths a threat uses to spread, view detailed info on affected machines, quickly view the details of malicious files, and see where else the files are currently used. That helps admins promptly detect all threat hot spots, block the execution of dangerous files, and isolate affected machines, thus minimizing potential damage.<\/p>\n<p>While we monitor the tool\u2019s usage to determine its relevance in the field, we\u2019ve made EDR functionality available through 2021 to users of Kaspersky Endpoint Security Cloud Plus in test mode. You can learn more and order a trial version <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kescloud___\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kes-cloud\">\n","protected":false},"excerpt":{"rendered":"<p>Blocking a threat isn\u2019t enough; you have to understand and reconstruct the whole infection chain.<\/p>\n","protected":false},"author":2581,"featured_media":39359,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[4085,3737,2918,81],"class_list":{"0":"post-39358","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-solution","10":"tag-solutions","11":"tag-supply-chain","12":"tag-targeted-attacks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/endpoint-cloud-edr\/39358\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/endpoint-cloud-edr\/21650\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/endpoint-cloud-edr\/25065\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/endpoint-cloud-edr\/24390\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/endpoint-cloud-edr\/17316\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/endpoint-cloud-edr\/14709\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/endpoint-cloud-edr\/26514\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/endpoint-cloud-edr\/30487\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/solutions\/","name":"solutions"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/39358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=39358"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/39358\/revisions"}],"predecessor-version":[{"id":39361,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/39358\/revisions\/39361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/39359"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=39358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=39358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=39358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}