{"id":20071,"date":"2022-09-20T07:00:23","date_gmt":"2022-09-20T11:00:23","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/introducing-kedr-optimum\/20071\/"},"modified":"2022-09-21T19:19:24","modified_gmt":"2022-09-21T15:19:24","slug":"introducing-kedr-optimum","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/introducing-kedr-optimum\/20071\/","title":{"rendered":"Introducing: Kaspersky EDR Optimum"},"content":{"rendered":"<p>Naming products and services \u2013 and also their many different functions and features \u2013 in the infosec domain is, in a word, tricky. Why? Complexity\u2026<\/p>\n<p>Cybersecurity: it\u2019s not a one-dimensional object like, say, a boat. There are different sized boats, but besides things like that, a boat is mostly always a boat. But in infosec, a modern system of enterprise cybersecurity does a great many technically complex things, and the question arises: how can it all be labeled simply and catchily (if that\u2019s at all possible) so as to be reasonably easy to understand? And how can you differentiate one security system from another? Often it\u2019s difficult explaining such differences in a long paragraph \u2013 while in the name of a product or service? Like I say: <em>tricky<\/em>.<\/p>\n<p>Maybe that\u2019s why Kaspersky is still associated by some with \u201cantivirus software\u201d. But actually, detecting and neutralizing malware based on an antivirus database is today just one of our security technologies: over a quarter century we\u2019ve added to it a great many others. The word antivirus today is more of a metaphor: it\u2019s known, understood, and thus is a handy (if not too accurate or up-to-date) label.<\/p>\n<p>But what are we supposed to do if we need to tell folks about complex, multifunctional protection for enterprise IT infrastructure? This is when strange sets of words appear. Then there are all the abbreviations that come with them, whose original idea was simplification (of those strange sets of words) but which often just add to the confusion! And with every year the number of terms and abbreviations grows, and memorizing them all becomes increasingly\u2026 also <em>tricky<\/em>. So let me attempt here to take you on a brief excursion of all <span style=\"text-decoration: line-through;\">this gobbledygook<\/span> these complex but necessary names, terms, descriptions and abbreviations \u2013 hopefully to do what the abbreviations struggle with: bring clarity.\n<\/p>\n<h2>From EPP to XDR<\/h2>\n<p>\nOk. Back to the boat; rather \u2013 antivirus.<\/p>\n<p>The more accurate name of this class of products today is Endpoint Protection or Endpoint Security. After all, as stated above, it\u2019s not only antivirus that\u2019s protecting endpoints these days, but a collection of security measures. And sometimes the varied endpoint technologies are given an updated name \u2013 including the word \u201cplatform\u201d. Somehow that sounds more appropriate, and more accurately descriptive \u2013 it also seems fashionable, as is its abbreviation: <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/endpoint-protection\" target=\"_blank\" rel=\"noopener nofollow\">EPP<\/a> (Endpoint Protection Platform).<\/p>\n<p>Endpoint Protection Platform is, in essence, a concept that dates back to the 1990s. It\u2019s still needed, but for quality protection of distributed infrastructure other methods are required. Data needs to be collected and analyzed from the whole network to detect not only singular incidents, but also whole chains of attacks, which aren\u2019t limited to a single endpoint. Threats need to be reacted to across the whole network \u2013 not just one computer.<\/p>\n<p>Fast-forward a decade or so, and in the early 2000s there appears a class of products called <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/siem\/\" target=\"_blank\" rel=\"noopener\">SIEM<\/a> \u2013 security information and event management. That is, a tool for the collection and analysis of all infosec telemetry from various devices and applications. And not only for today: a good SIEM can pull off retrospective analysis \u2013 comparing events from the past and uncovering attacks lasting many months or even years.<\/p>\n<p>So, by this stage (the early 2000s for those at the back not paying attention!) we\u2019re already working with the whole network. But there\u2019s no \u201cP\u201d for \u201cProtection\u201d in SIEM. So the protection was provided by the EPP (Endpoint Protection Platform; you at the back \u2013 detention after school!). However, EPP doesn\u2019t see network events; for example, it could easily miss an <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/apt-advanced-persistent-threats\/\" target=\"_blank\" rel=\"noopener\">APT<\/a> (advanced persistent threat).<\/p>\n<p>Therefore, in the early 2010s, along comes another abbreviation to fill the gap and cover both security functions: <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/edr-endpoint-detection-response\/\" target=\"_blank\" rel=\"noopener\">EDR<\/a> (Endpoint Detection and Response). On the one hand, it provides centralized monitoring of the whole IT infrastructure \u2013 allowing, for example, to compile traces of attacks from all the hosts. On the other, an EDR-type product uses for detection not only EPP methods, but also more advanced technologies: <a href=\"https:\/\/www.securitymagazine.com\/articles\/90996-the-importance-of-effective-correlation-for-threat-intelligence-users\" target=\"_blank\" rel=\"nofollow noopener\">correlational analysis<\/a> of events and the picking out <a href=\"https:\/\/eugene.kaspersky.com\/2021\/01\/19\/mlad-keeping-factories-running-using-machine-learning-for-anomaly-detection\/\" target=\"_blank\" rel=\"noopener\">anomalies on the basis of machine learning<\/a> and dynamic analysis of suspicious objects in a <a href=\"https:\/\/eugene.kaspersky.com\/2019\/12\/18\/dear-father-christmas-id-like-a-sandbox-please\/\" target=\"_blank\" rel=\"noopener\">sandbox<\/a>, plus assorted other <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/threat-hunting\/\" target=\"_blank\" rel=\"noopener\">threat hunting<\/a> tools to assist <a href=\"https:\/\/www.youtube.com\/watch?v=n1dzQAX9e2E&amp;ab_channel=Kaspersky\" target=\"_blank\" rel=\"nofollow noopener\">investigation and response<\/a>.<\/p>\n<p>And when we do EDR ourselves here at <em>K<\/em>, of course we need to put our stamp on it, to give us <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">KEDR<\/a>.<\/p>\n<p>So far, so <span style=\"text-decoration: line-through;\">good<\/span> great. But\u2026 there\u2019s no limit to perfection!<\/p>\n<p>Fast-forwarding again, this time to the early 2020s, and a new abbreviation is introduced and quickly becomes all the rage in the cybersecurity industry: <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/xdr-extended-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">XDR<\/a> (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Extended_detection_and_response\" target=\"_blank\" rel=\"nofollow noopener\">eXtended detection and response<\/a>). This, to put it crudely, is EDR on steroids. Such a system analyses data not only from endpoints (workstations), but also from other sources \u2013 for example the mail gateways and cloud resources. Which totally makes sense, since attacks on infrastructure can come from any and all kinds of entry points.<\/p>\n<p>XDR can be even further enriched in terms of its expertise by further data from:\n<\/p>\n<ul>\n<li>threat-analysis services (ours is called <a href=\"https:\/\/www.kaspersky.com\/blog\/open-tip\/29036\/\" target=\"_blank\" rel=\"noopener nofollow\">TIP<\/a> (<a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/threat-intelligence?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Threat Intelligence Portal<\/a>),<\/li>\n<li>network-traffic analysis systems (ours \u2013 <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/anti-targeted-attack-platform?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">KATA <\/a>),<\/li>\n<li>security-events monitoring systems.<\/li>\n<\/ul>\n<p>\nSuch data can also come in via similar services provided by third-parties.<\/p>\n<p>XDR\u2019s response capabilities are also advanced. More and more protective actions are becoming automated, whereas before they were all done manually. Now the security system can itself respond to events based on cunning rules and scenarios input by experts.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/09\/20153748\/introducing-kedr-optimum-xdr.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/09\/20153748\/introducing-kedr-optimum-xdr.png\" alt=\"Kaspersky Anti-Targeted Attack Platform with XDR capabilities.\" width=\"1108\" height=\"608\" class=\"aligncenter size-full wp-image-45552\"><\/a><\/p>\n<h2>Complicate or simplify?<\/h2>\n<p>\nI hope it\u2019s clear by now that any EDR or XDR system represents a large, complex collection of technologies. However, the functionality of different providers\u2019 EDRs or XDR can differ greatly. For example, each provider determines what and how much their experts input into an EDR\/XDR to better reflect and thus repel modern-day attacks. So, though they\u2019re all called EDR\/XDR, they\u2019re by far not all the same.<\/p>\n<p>For example, on <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/anti-targeted-attack-platform?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky XDR platform<\/a>, besides the listed-above XDR capabilities, there\u2019s also a module providing interactive training for raising client-companies\u2019 employee cyber-literacy. And no other XDR does such a thing! Surely that\u2019s a good reason to cheer if not boast?\u2026<\/p>\n<p>Actually, sceptics may not be happy. They might say that if we add simply everything we\u2019ve got to enterprise protection \u2013 kitchen sink and all \u2013 won\u2019t this simply be too much? A morass that becomes too complex, cumbersome, and hard-to-understand and master. \u201cWhatever next?\u201d they think: marketing types coming up with <em>YDR<\/em> next year, then <em>ZDR<\/em> the year after?!<\/p>\n<p>Ok, we get it. And we listened to our customers too. And over the years we\u2019ve come to realize that in enterprise cybersecurity, by far not all companies need everything plus the kitchen sink. Often, more up their street we\u2019ve found is a basic set of EDR tools plus clear and convenient instructions on how to use them. This is especially the case for small and medium-sized businesses with small teams of infosec specialists.<\/p>\n<p>So what have we done to meet these more essential needs? We\u2019ve come up with our new and improved <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/edr-security-software-solution?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">KEDR Optimum<\/a>: \u201cadvanced detection, simple investigation and automated response in an easy-to-use package to protect business against the latest threats\u201d. For example, in its new alert cards, besides detailed descriptions of suspicious events and threats, there\u2019s also now a Guided Response section. This gives step-by-step recommendations for investigation and response regarding discovered threats.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/09\/20153756\/introducing-kedr-optimum-details.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/09\/20153756\/introducing-kedr-optimum-details.jpg\" alt=\"Kaspersky Endpoint Detection and Response Optimum recommendations.\" width=\"1200\" height=\"616\" class=\"aligncenter size-full wp-image-45551\"><\/a><\/p>\n<p>Recommendations like this have been prepared based on the decades of dedicated work of our leading experts, and come in the form of links to detailed descriptions of protective procedures. This not only raises reaction speeds, it also allows infosec specialist trainees to boost their skills, for example \u2013 with interactive pop-ups:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/09\/20153800\/introducing-kedr-optimum-popup.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/09\/20153800\/introducing-kedr-optimum-popup.jpg\" alt=\"Kaspersky Endpoint Detection and Response Optimum interactive pop-up.\" width=\"1200\" height=\"614\" class=\"aligncenter size-full wp-image-45550\"><\/a><\/p>\n<p>Another thing KEDR Optimum can now do is to keep an eye on infosec specialists possibly inadvertently blocking this or that critical system object. After all, malware can sometimes launch using legitimate operating system files \u2013 and blocking such files can hinder the operation of the whole IT infrastructure. With KEDR Optimum \u2013 you\u2019re covered.<\/p>\n<p>And finally, I must mention just one other thing about KEDR Optimum. All the above was written by me \u2013 Mr. <em>K<\/em>. Prefer something more impartial? Be my guest! Head on over to independent testing laboratories to see what they think. For example: <a href=\"https:\/\/media.kaspersky.com\/en\/business-security\/IDC_MarketScape_Worldwide_Modern_Endpoint_Security_for_Enterprises_2021_Vendor_Assessment.pdf\" target=\"_blank\" rel=\"noopener nofollow\">IDC<\/a>, <a href=\"https:\/\/go.kaspersky.com\/rs\/802-IJN-240\/images\/Licensed_Endpoint_Security_Market_Quadrant_2021.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Radicati<\/a> and <a href=\"https:\/\/www.kaspersky.ru\/about\/press-releases\/2022_reshenie-kaspersky-edr-expert-otrazilo-100-kiberatak-v-hode-mezhdunarodnogo-testa-se-labs\" target=\"_blank\" rel=\"noopener\">SE Lab<\/a>. There. 100% transparent and fair.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Endpoint Detection and Response Optimum \u2013 superior enterprise-cybersecurity, with no fluff.<\/p>\n","protected":false},"author":13,"featured_media":20073,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,7],"tags":[2294,499,1552,2297],"class_list":{"0":"post-20071","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-products","10":"tag-edr","11":"tag-products-2","12":"tag-threat-intelligence","13":"tag-xdr"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/introducing-kedr-optimum\/20071\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/introducing-kedr-optimum\/24604\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/introducing-kedr-optimum\/27062\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/introducing-kedr-optimum\/24961\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/introducing-kedr-optimum\/25354\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/introducing-kedr-optimum\/27753\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/introducing-kedr-optimum\/34032\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/introducing-kedr-optimum\/11040\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/introducing-kedr-optimum\/45549\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/introducing-kedr-optimum\/19541\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/introducing-kedr-optimum\/20109\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/introducing-kedr-optimum\/29322\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/introducing-kedr-optimum\/31011\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/introducing-kedr-optimum\/30707\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/edr\/","name":"EDR"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20071"}],"version-history":[{"count":5,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20071\/revisions"}],"predecessor-version":[{"id":20089,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20071\/revisions\/20089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20073"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}