{"id":4804,"date":"2015-05-14T08:50:02","date_gmt":"2015-05-14T12:50:02","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4804"},"modified":"2019-11-15T15:24:35","modified_gmt":"2019-11-15T11:24:35","slug":"kaspersky-security-network-explained","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-security-network-explained\/4804\/","title":{"rendered":"Cloud Security explained: 1 technical term, 0 complicated charts"},"content":{"rendered":"<p><strong>Updated:<\/strong> Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found <a href=\"https:\/\/www.kaspersky.com\/about\/data-protection\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>While the cloud-based security approach is not a novelty, it\u2019s been getting a lot of attention lately \u2014 most likely because everything today is \u201cin the cloud.\u201d In this day and age, your smartphone\u2019s contacts, photos, e-mails, music, purchased movies and books are largely stored \u201csomewhere else,\u201d not on your computer or mobile device.<\/p>\n<p>We often get questions like \u201cHow does it work?\u201d \u201cIs my personal information safe?\u201d and \u201cWhy don\u2019t you only use cloud security, if it\u2019s so good?\u201d Here we will try to answer some of the most popular questions. To keep things simple, we tried to avoid all technical terms except one \u2014 the very \u201ccloud security\u201d itself.<\/p>\n<h3>What\u2019s up with the cloud?<\/h3>\n<p>\u201cClouds\u201d store or process data someplace else, making access to information convenient, and connecting people for a mutual benefit. What is \u201ccloud security\u201d then? Our personal implementation of the cloud security model is called Kaspersky Security Network. And here we\u2019ll explain how it actually works.<\/p>\n<p>Let\u2019s say, for example, you have Kaspersky Internet Security installed on your PC or Mac to routinely check your device for infection. Besides occasional updates, this \u201ctraditional\u201d security technology does most of its job offline and requires approximately an hour to respond to a new threat.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Find out, how Kaspersky Security Networks works #KSN #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FMH6a&amp;text=Find+out%2C+how+Kaspersky+Security+Networks+works+%23KSN+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In a modern world, however, an hour can be too long. What if you\u2019re opening a file or loading a web page that seems suspicious, but your traditional security program can\u2019t immediately deem the content malicious? That\u2019s where Kaspersky Security Network kicks in.<\/p>\n<p>Using this cloud security network, you can ask other users if they\u2019ve come across a similar file or webpage lately. Was it suspicious as well? You can also ask our security experts (<a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-lab-european-research-center\/\" target=\"_blank\" rel=\"noopener nofollow\">these guys are working 24\/7 in different countries<\/a>) what they think. Based on these conversations, the cloud security network gives you advice: \u201cHey, this file or web page is way too suspicious, you\u2019d better not open it.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4806\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/05\/05103924\/Comix-clowd-Main.jpg\" alt=\"Comix-clowd-Main\" width=\"2500\" height=\"2922\"><\/p>\n<p>Of course, you don\u2019t have to ask all of these questions personally \u2014 that would be way too complicated. Our security solutions do this work automatically. Understanding the technical process is a bit more complex, but at least you now understand the core idea of how Kaspersky Security Network works.<\/p>\n<p>In short, for some cyber threats, Kaspersky Security Network can reduce response time (i.e. the time between when a cybercriminal starts an attack and when the attack is blocked) from hours to minutes!<\/p>\n<h3>OK, sounds cool. Why don\u2019t security companies only use cloud technology?<\/h3>\n<p>Without other traditional technologies, like Kaspersky Internet Security, Kaspersky Security Network would not be efficient. Our security solution is like a private detective assigned to your computer. Without network access, our program is capable of detecting a large percentage of attacks using its expertise and tools.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The Wonders of <a href=\"https:\/\/twitter.com\/hashtag\/Whitelisting?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Whitelisting<\/a> (as Opposed to <a href=\"https:\/\/twitter.com\/hashtag\/Blacklisting?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Blacklisting<\/a>) \u2013  <a href=\"https:\/\/t.co\/WqmaKfmT6O\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/WqmaKfmT6O<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/antivirus?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#antivirus<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/523142735210237953?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 17, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Cloud security helps to bring this percentage even closer to one hundred, and it works faster. However, sending all of your data to the cloud, instead of consulting about a few suspicious objects, could consume your data plan and take too much time to process \u2014 we don\u2019t want that.<\/p>\n<h3>Is my personal data safe? Do you process it?<\/h3>\n<p>Yes, it is completely safe. In keeping with the terms of the law, Kaspersky Security Network doesn\u2019t process any personal data. Our goal isn\u2019t to obtain and store your photos, documents, or emails \u2014 we don\u2019t even look at the files themselves. Instead, we look for suspicious file behavior, analyze how bad guys are conducting their attacks, and implement ways to block them.<\/p>\n<p>In fact, Kaspersky Security Network is designed to process as little information as possible, and for good reason: we want to make data transmission really fast and secure (i.e. encrypted). To do this, we focus only on the data necessary to complete the main goal of detecting new threats. Transmitting, encrypting, storing, and decrypting any other data would be a waste of resources.<\/p>\n<p>Generally, we use Kaspersky Security Network on a larger scale. Like, for example, to identify the most widespread threats in a particular country to better protect our clients in that country. We don\u2019t track single users.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Check out our new interactive map of online threats <a href=\"http:\/\/t.co\/evG9cGhBXw\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/evG9cGhBXw<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cyberthreats?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cyberthreats<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/KSN?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#KSN<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/448159912099856384?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 24, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Can I opt out of Kaspersky Security Network? And will my computer be vulnerable if so?<\/h3>\n<p>Yes, you can disable (and enable) Kaspersky Security Network at any time. When you opt out, our product stops sending data from your device to the cloud system. This won\u2019t decrease your own level of protection; you will still get the latest updates in any case.<\/p>\n<p>However, cloud security works a bit like mass vaccination \u2014 the behavior of computer malware is very similar to that of biological viruses, especially the ability to polymorph. When a few people avoid vaccination, it doesn\u2019t affect public health, just like a few people disabling Kaspersky Security Network won\u2019t affect public security.<\/p>\n<p>But when the majority doesn\u2019t get vaccinated, or the majority doesn\u2019t utilize cloud security, everyone becomes vulnerable. Thus, participating in Kaspersky Security Network is not only personally beneficial, but it also helps to make the cyber world a better and safer place. Ultimately, whether or not you take part in this effort is up to you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Updated: Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found here. While the cloud-based security approach is not a novelty, it\u2019s<\/p>\n","protected":false},"author":40,"featured_media":4805,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,7],"tags":[799,986,224,973,43,499],"class_list":{"0":"post-4804","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-products","9":"tag-cloud-security","10":"tag-cloud-service","11":"tag-kaspersky-security-network","12":"tag-ksn","13":"tag-privacy","14":"tag-products-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-security-network-explained\/4804\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/kaspersky-security-network-explained\/4876\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kaspersky-security-network-explained\/5342\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/kaspersky-security-network-explained\/5758\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/kaspersky-security-network-explained\/6060\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/kaspersky-security-network-explained\/7758\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-security-network-explained\/8657\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/kaspersky-security-network-explained\/3014\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/kaspersky-security-network-explained\/7614\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/kaspersky-security-network-explained\/7758\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-security-network-explained\/8657\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-security-network-explained\/8657\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cloud-security\/","name":"cloud security"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4804"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4804\/revisions"}],"predecessor-version":[{"id":14963,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4804\/revisions\/14963"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4805"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}