The main danger of targeted attacks is that they are carefully designed for specific organizations, so they are difficult to resist and often they are not detected for a long time. They can lead to leakage of confidential data, significant financial and reputational losses.
To protect against complex threats and targeted attacks of any complexity, Kaspersky Lab offers the Kaspersky Anti Targeted Attack (KATA) solution.
KATA allows you to resist attacks at all stages of network penetration, detect cyberattacks at the initial stages and mitigate damage from them, as well as protect the enterprise from potential targeted attacks and assess security risks at the moment.
This solution is part of a comprehensive strategic approach for creating an adaptive model for protecting against new threats and responding to information security incidents.
Kaspersky Anti Targeted Attack allows you to counter targeted attacks and advanced information security threats:
- Detection of attacks that are already on the corporate network.
- Protection against failures caused by targeted attacks.
- Eliminating the long-term impact of targeted attacks on a company's position in the market.
- Reducing financial damage from targeted attacks.
- Counteracting the compromise of corporate documents and data.
- Protection of business reputation and brand image.
- Kaspersky Anti Targeted Attack solution combines the latest technologies and global analytics to timely respond to targeted attacks and counteract them at all stages of implementation.
Features of Kaspersky Anti Targeted Attack:
- Monitoring network activity
- Dedicated network and workstation sensors allow you to locate control points in different parts of the network and quickly detect complex threats to your infrastructure.
- Object behavior analysis
- Suspicious objects detected in email and Internet traffic are transmitted by sensors to a sandbox - an isolated virtual environment. Each such object is analyzed for malicious activity, which makes it possible to detect an attack at an early stage.
- Anomaly analysis
- The Targeted Attack Analyzer receives information from network sensors, workstation sensors and servers to create typical patterns of program behavior. Further, based on deviations from these patterns, it is determined whether the activity is potentially part of a targeted attack.
- Technical support