Kaspersky Lab announces the global availability of Kaspersky Threat Lookup – a security intelligence service aimed at enhancing enterprise incident response and cyber security forensics capabilities. Kaspersky Threat Lookup provides access to several petabytes of global security intelligence data that is being updated almost in real-time. This always-on web service helps businesses to properly analyze digital evidence in light of a security incident and obtain the insights needed to speed up detection and remediation.
According to a survey of more than 4,000 business representatives worldwide, conducted by Kaspersky Lab and B2B International in 2016, time is the crucial factor in incident detection and response. The survey findings show that enterprises pay over 100% more in recovery fees if they are unable to detect a security breach in a short time. The average recovery cost of a breach that stays undetected for a week or more is over $US1 million, while instantly discovered incidents cost US$400,000 to mitigate, almost half the overall industry average. Detection and response are some of the most time-critical activities on the agenda of security operations centers (SOCs) in organizations around the world, and both require reliable security intelligence.
Accelerating incident response
Kaspersky Threat Lookup is the solution of choice for corporate IT security teams to accelerate their incident response and forensic capabilities. Once suspicious indicators such as IP, URL or file hash have been identified by a corporate IT security officer, they can be entered into the service web interface. In return, users are provided with meaningful and structured information about a potential threat and offers global insights that help identify a targeted attack in progress.
Kaspersky Lab’s security intelligence is collected from various sources including Kaspersky Lab’s cloud security network, spam traps, botnet monitoring initiatives and web crawlers. More importantly, that data is constantly being cross-checked by Kaspersky Lab’s own research team and automatically correlated. The solution offers corporate security officers contextual intelligence capabilities. It enables them to quickly investigate the source of the problem, distinguish between potentially malicious and benign actions, and obtain data for fast and efficient incident investigation. Overall, Kaspersky Threat Lookup allows SOC operators to prioritize and act efficiently in the typical scenario of hundreds and thousands alerts received every day.
Kaspersky Threat Lookup offers enterprises the same level of intelligence that Kaspersky Lab specialists use to analyze the most sophisticated threats, and includes indicators of compromise for these new attacks. The solution makes it possible to match data obtained during an investigation due to vast knowledge of malicious objects, as well as access to one of the largest databases of clean objects, part of the Kaspersky Whitelist service.
One of the early adopters of Kaspersky Threat Lookup service is INTERPOL. Kaspersky Lab has been offering early access to the organization’s threat intelligence according to the expertise sharing agreement to help investigate cyber crime.
Veniamin Levtsov, Vice President, Enterprise Business at Kaspersky Lab, comments: “In 2016 we have rapidly expanded our range of Security Intelligence Services, including Threat Data Feeds, to provide businesses with the actionable intelligence required for faster detection. But in order to significantly reduce recovery costs, businesses need to improve detection together with response and forensic capabilities. That is, they need to understand the scope of the problem, identify the source of the security event and collect necessary intelligence to mitigate the threat. The Kaspersky Threat Lookup portal is an important addition to the family of Security Intelligence Services that directly addresses these challenges. It provides instant access to Kaspersky Lab’s threat intelligence directly from cloud sources and contains comprehensive information on requested file hash, URL or IP.”