Dismiss this notice
EaseUS Partition Master Professional Halloween 2020 Giveaway - [Only registered and activated users can see links Click here to register]

Dismiss this notice
SoftMaker Office Standard 2021 Halloween 2020 Giveaway - [Only registered and activated users can see links Click here to register]

Dismiss this notice
Advanced Uninstaller PRO Halloween 2020 Giveaway - [Only registered and activated users can see links Click here to register]

Dismiss this notice
O&O Defrag 24 Professional Halloween 2020 Giveaway - [Only registered and activated users can see links Click here to register]

Dismiss this notice
O&O DiskImage 16 Professional Halloween 2020 Giveaway - [Only registered and activated users can see links Click here to register]

Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
A structured approach to ransomware protection
#1
Lightbulb 
Quote:
[Image: structured-approach-ransomware-featured.jpg]

To counter modern ransomware threats, you need more than just endpoint protection.

For most of the past year, ransomware stories have featured regularly on news websites — and not just high-profile incidents (although there’s no shortage of those). Ransomware creators are actively refining their methods and technologies. In 2020, we saw the merger of several groups into a cartel, the creation of sites for the publication of stolen materials, auctions for the sale of stolen information, and the first ransomware for Linux. More recently, news also emerged that a ransomware group had started using hacked Facebook accounts to intimidate victims.

According to [Only registered and activated users can see links Click here to register], a group calling itself Ragnar_Locker Team took over the Facebook page of a Chicago-based DJ, launching an ad campaign in his name. Meanwhile, announcements with the subheading “Ragnar_Locker Team press release” pointed directly to a successful attack on beverage maker Campari Group. In them, the attackers also boasted about the amount of stolen information in their possession, threatening to publish it if Campari refused to pay the ransom demand.

All this seems to confirm that ransomware authors feel untouchable and are willing to spend part of their ill-gotten gains on mastering new technical tools and pressure levers. That means antiransomware efforts require more than just a security product on a workstation. And we’re not the only ones who have come to that conclusion: Gartner recently proposed the Ransomware Defense Architecture method of protection.

Gartner’s structured approach

Ransomware Defense Architecture combines IT systems and operations with security risk management. According to Gartner, technical professionals cannot approach ransomware defense from just one domain. Domains such as storage, networking and data protection, on-premises, in the cloud, and at the edge all have to take security into consideration when confronting a ransomware attack. Gartner sees ransomware attacks on a continuum timeline with five phases:
  • Phase 1 — Prepare
  • Phase 2 — Prevent
  • Phase 3 — Detect
  • Phase 4 — Mitigate
  • Phase 5 — Recover
Whereas phases 1 and 2 take place before an incident, phases 3 and 4 are during or at about the same time as the incident, and phase 5 occurs postincident.

Our solutions

As we see it, we offer the most comprehensive portfolio of solutions to cover the Gartner Ransomware Defense Architecture structure, with customer reviews for these solutions on Gartner Peer Insights placing us among the highest rated. In response to the high level of ratings we achieved, Kaspersky was named a Gartner Peer Insights Customers’ Choice in the most recent iteration for [Only registered and activated users can see links Click here to register] in 2019, and [Only registered and activated users can see links Click here to register] and [Only registered and activated users can see links Click here to register] in 2020.

Phase 1: Prepare

Technology: Phishing Training Security Hygiene
Gartner Peer Insights Market: Security Awareness Computer-Based Training
Our solutions: [Only registered and activated users can see links Click here to register], [Only registered and activated users can see links Click here to register]
Customer Reviews (as of Nov. 1, 2020): [Only registered and activated users can see links Click here to register]; 98% Would Recommend; 45 reviews in the last 12 months

Phase 2: Prevent

Technologies: EPP, MTD, SEG
Gartner Peer Insights Market: Endpoint Protection Platforms
Our solution: [Only registered and activated users can see links Click here to register]
Customer Reviews (as of Nov. 1, 2020): [Only registered and activated users can see links Click here to register]; 94% Would Recommend; 512 reviews in the last 12 months

Technology: EDR
Gartner Peer Insights Market: Endpoint Detection and Response Solutions
Our solutions: [Only registered and activated users can see links Click here to register]
Customer Reviews (as of Nov. 1, 2020): 84 reviews; [Only registered and activated users can see links Click here to register]; 100% Would Recommend;

Technology: VM and Patch
Gartner Peer Insights Market: Cloud Workload Protection Platforms
Our solutions: [Only registered and activated users can see links Click here to register]
Customer Reviews (as of Nov. 1, 2020): 69 reviews in the last 12 months; [Only registered and activated users can see links Click here to register]; 99% Would Recommend

Phase 3: Detect

Technologies: EDR, MTD
Gartner Peer Insights Market: Endpoint Detection and Response Solutions
Our solutions: [Only registered and activated users can see links Click here to register]
Customer Reviews (as of Nov. 1, 2020): 84 reviews; [Only registered and activated users can see links Click here to register]; 100% Would Recommend

Technology: SWG
Gartner Peer Insights Market: Secure Web Gateways
Our solutions: [Only registered and activated users can see links Click here to register]
Customer Reviews (as of Nov. 1, 2020): 57 reviews; [Only registered and activated users can see links Click here to register]; 95% Would Recommend

Technology: NDR
Gartner Peer Insights Market: Endpoint Detection and Response Solutions
Our solutions:[Only registered and activated users can see links Click here to register]
Customer Reviews (as of Nov. 1, 2020): 84 reviews; [Only registered and activated users can see links Click here to register]  ;100% Would Recommend

Technology: NDR
Gartner Peer Insights Market: Operational Technology Solution
Our solutions: [Only registered and activated users can see links Click here to register]
Customer Reviews (as of Nov. 1, 2020): 74 reviews; [Only registered and activated users can see links Click here to register] ; 95% Would Recommend

Phase 4: Detect

Technology: EDR, MTD
Gartner Peer Insights Market: Endpoint Detection and Response Solutions
Our solutions: [Only registered and activated users can see links Click here to register]
Customer Reviews (as of Nov. 1, 2020): 84 reviews; [Only registered and activated users can see links Click here to register]; 100% Would Recommend;

This type of feedback from our customers is a genuine honor and spurs us to continue developing cutting-edge solutions. All of us at Kaspersky are enormously grateful to our customers for taking time from their busy schedules to voice their opinions of our solutions and help other peers in their decision-making process — theirs are the opinions we consider the most important. Finally, we want to recognize our various teams, without whose tireless efforts none of this would be possible.

[sup]The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.[/sup]
...
[Only registered and activated users can see links Click here to register]
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Recent Posts
GFYI [Official] O&O DiskImage 16 Profes...
Share feedback about...mjcn19 — 12:06
Qihoo 360 Total Security 10.8.0.1200
10.8.0.1200 releas...harlan4096 — 09:17
Avast_Security_News: The return of the M...
News on the (ma...harlan4096 — 09:00
Avast Blog_Tips & Advices: 5 tips for sa...
Let's face it: ...harlan4096 — 08:57
Avast_Security_News: Eliminating violenc...
In abusive rela...harlan4096 — 08:54

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
harlan4096's profile harlan4096
Administrator

>