{"id":22669,"date":"2024-04-23T13:00:22","date_gmt":"2024-04-23T09:00:22","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-next-new-portfolio\/22669\/"},"modified":"2024-04-23T13:01:38","modified_gmt":"2024-04-23T09:01:38","slug":"kaspersky-next-new-portfolio","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-next-new-portfolio\/22669\/","title":{"rendered":"Introducing \u2014 Kaspersky Next: a new portfolio of security solutions"},"content":{"rendered":"<p>We\u2019ve decided to revise our portfolio and make it as seamless and customer-friendly as possible. This post explains what exactly we\u2019re changing and why.<\/p>\n<h2>The evolution of protection<\/h2>\n<p>As the threat landscape constantly changes \u2014 so do corporate security needs in response. Just a decade ago, the only tool required to protect a company against most cyberattacks was an <strong>endpoint protection platform (EPP)<\/strong>. Since then, attackers\u2019 methods have grown ever more sophisticated \u2014 to the point where simply scanning workstations and servers is no longer sufficient to detect malicious activity.<\/p>\n<p>Modern cyberattacks can be carried out under the guise of legitimate processes \u2014 without the use of malware at all. Increasingly, mass threats are beginning to deploy tactics and techniques previously associated only with targeted attacks. To detect such activity and ensure proper incident investigation, companies now need to collect and correlate data from endpoints, identify suspicious activity in their infrastructure, and, most importantly, take prompt countermeasures: isolate suspicious files, halt malicious processes, and sever network connections. To adequately respond to the increased complexity of threats, other tools are now indispensable: <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/edr-endpoint-detection-response\/\" target=\"_blank\" rel=\"noopener\"><strong>Endpoint Detection &amp; Response<\/strong><\/a><strong> (EDR)<\/strong> at a minimum, and ideally \u2014 <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/xdr-extended-detection-and-response\/\" target=\"_blank\" rel=\"noopener\"><strong>Extended Detection and Response<\/strong><\/a><strong> (XDR)<\/strong>.<\/p>\n<p>Yet EDR is no replacement for EPP. These are different solutions that solve different problems. For effective infrastructure protection, they need to work in tandem. As a result, customers have found themselves having to purchase both tools to ensure an adequate level of information security. We decided to simplify this process by rolling out a new line of products that deliver the security processes necessary in today\u2019s world \u2014 with EDR and XDR capabilities at the core.<\/p>\n<h2>Simplified product line<\/h2>\n<p>Another reason for rethinking our product line was the ever increasing variety of the solutions we offer. Customers had to study many different products, which of course takes a lot of precious time. Therefore, we decided to simplify the line and make sure that each tier of Kaspersky Next covers the main needs of particular groups (rather \u2014 profiles) of corporate users. This approach provides room for maneuver while allowing us to use resources to develop the tools necessary to hone our XDR \u2014 a single console for products that protect different assets, expanded capabilities for the integration needed for cross-detection of threats, and the launch of new products to further enhance our XDR.<\/p>\n<p>Our new Kaspersky Next approach guarantees maximum transparency of our products\u2019 capabilities. With the particular kinds of threats that are relevant to your company in mind \u2014 combined with an accurate assessment of the skill level of your security team \u2014 you can choose one of the three Kaspersky Next tiers\u2019 solutions, and then expand its capabilities with, first, additional products that cover specific attack vectors, and, second, services that provide expert assistance when and where your in-house team needs it.<\/p>\n<h2>What about the old licenses?<\/h2>\n<p>We\u2019ve no intention of abandoning customers who use our time-tested solutions. Nor do we plan to cease selling them right away. At least until the end of this year, companies have the option to buy both old and new products. In time, we\u2019ll stop selling licenses for legacy solutions; however, we understand that abrupt migration to new software can have an impact on companies\u2019 workflows, so we\u2019ll continue to renew already purchased licenses as required. The retirement of legacy products won\u2019t occur in the short term.<\/p>\n<p>For customers wishing to switch from older products to the Kaspersky Next line, we offer a flexible license renewal scheme involving trade-in mechanisms.<\/p>\n<p>To learn more about Kaspersky Next, please visit our <a href=\"https:\/\/me-en.kaspersky.com\/next?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____655fe72318f39647\" target=\"_blank\" rel=\"noopener\">official page<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kaspersky-next\">\n","protected":false},"excerpt":{"rendered":"<p>Let\u2019s talk about our updated line of corporate security solutions.<\/p>\n","protected":false},"author":2706,"featured_media":22670,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[2294,2185,1566,2297],"class_list":{"0":"post-22669","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-edr","11":"tag-kaspersky-next","12":"tag-next","13":"tag-xdr"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-next-new-portfolio\/22669\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/kaspersky-next-new-portfolio\/11565\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kaspersky-next-new-portfolio\/29980\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/kaspersky-next-new-portfolio\/27242\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/kaspersky-next-new-portfolio\/29849\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/kaspersky-next-new-portfolio\/28777\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-next-new-portfolio\/50953\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/kaspersky-next-new-portfolio\/21707\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/kaspersky-next-new-portfolio\/22478\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/kaspersky-next-new-portfolio\/36335\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-next-new-portfolio\/33160\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/kaspersky-next\/","name":"Kaspersky Next"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22669"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22669\/revisions"}],"predecessor-version":[{"id":22672,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22669\/revisions\/22672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22670"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}