Site icon techcoffeehouse.com

Kaspersky’s new integrated offering helps empower SOC’s capabilities in combating cyberthreats

Advertisements

Kaspersky’s new offering for Security Operations Centers (SOCs) combines the company’s competencies, solutions and services with the just-added Red Teaming service, which helps evaluate how well internal security teams are prepared for tailored breach scenarios. This combination will enable enterprises with SOCs to overcome the issues that concern them the most.

For large organizations, establishing a SOC is a consistent response to the growing number and sophistication of cyberthreats. According to a Kaspersky survey, one third of enterprises build an SOC to manage their cybersecurity risks[1]. However, in the process, organizations often face numerous barriers that jeopardize the productivity of their security operations, including a shortage of skilled professionals, scarce automation and integration between various tools, a high number of alerts, and a lack of visibility and context[2].

A SANS survey of specialists working in SOCs found they are not satisfied with its performance, but don’t have a clear view of how to improve it. That is why Kaspersky’s new integrated offering for SOCs starts with an analysis of customers’ specific needs and pain points, to offer the required set of products and services. This includes Kaspersky EDR, Kaspersky Anti Targeted Attack, Kaspersky Threat Intelligence and Kaspersky Cybersecurity Training portfolio, together with continuous support from world-leading threat hunting and incident response teams.

Finding and eliminating weaknesses

The weakest points in a company’s protection are not always in its infrastructure but can often be in its processes. These range from mis-prioritized alerts, or problems with communicating, when analysts transmit information about an alert after a delay – or not in full. Because of these issues, cybercriminals can stay unnoticed longer; increasing the chance of a successful attack.

That’s why Kaspersky, along with the Penetration Testing service, presents a tailored assessment of customers’ existing security operations – Red Teaming – a simulation of threat intelligence-driven attacks. Experts from Kaspersky determine how adversaries are likely to behave according to customer specifics like industry, region and market, and mimic their actions to evaluate SOC and incident response team’s readiness to detect and prevent attacks. Assessment of defensive team’s capabilities is followed up with workshops detailing gaps in defensive processes and recommendations on how to enhance them.

Closing existing gaps in SOC readiness

Building and maintaining a SOC is a long-term process, with various gaps and difficulties that can emerge along the way. Kaspersky provides help in identifying key issues and offering comprehensive solutions and services to address them:

“Running a SOC does not simply come down to implementing a SIEM. To be effective, it should be surrounded by relevant processes, roles and playbooks. It should also be equipped with connectors to logs and events sources, effective correlation rules, and fed with actionable threat intelligence. Without understanding the main barriers, CISOs cannot outline a SOC’s development roadmap. That’s why we carefully analyze the customer’s needs and pain points, assess existing cybersecurity systems maturity and identify gaps so that we can recommend the optimal solutions and service packages,” comments Veniamin Levtsov, VP, Corporate Business, at Kaspersky.

[1] ITSRS7N10. Do you intend to use or increase your organization’s use of any of the following groups to deliver IT security management / services in the next 12 months? Companies with 1000+ employees

[2] SANS 2018 ‘The Definition of SOC-cess?’ survey

Author

  • Hello! I’m Mark, the founder of techcoffeehouse.com. I love a good plate of Chicken Rice. So, if you have a story as good as the dish, HMU!

    View all posts Managing Editor
Exit mobile version