45 Per Cent of Companies Fear More Complex Attacks on Their IT Infrastructures
ABINGDON, England, July 16, 2013 /PRNewswire/ –
Threat of targeted attacks redefines requirements for corporate-class security
Nearly half of the companies that participated in the ‘IDC Market Analysis
Perspective: Worldwide Security Products survey
‘ conducted by IDC in December 2012, believe that increasingly sophisticated
attacks pose a serious threat to their IT infrastructures. It’s becoming more and more
common for cybercriminals to use dedicated malicious software to launch attacks on
corporations, eschewing widely-recognised malware tools and making it harder to detect and
repel intrusions. As a result, companies have more stringent requirements for their
corporate security solutions, analysts say.
“The sophistication and complexity of the attacks increases the need for advanced
anti-malware offerings that appreciate the multiple attack points (web, network, device,
etc.) used to infiltrate the endpoint and minimise the resources needed to thwart these
attacks and protect the asset (device and data),” said Kevin Bailey, Research Director,
EMEA Software Security Products and Services Policies, IDC.
A number of incidents took place last year in different parts of the world that
compromised the security of various corporate networks, with existing security software
powerless to intervene. In the hope of making big gains from selling stolen confidential
data (such as corporate intellectual property, business-critical information, etc.), cyber
criminals invest heavily on purchasing and/or developing malware that can bypass most
existing security solutions. In response, Kaspersky Lab invests heavily in the development
of heuristic and proactive technologies meaning its solutions are capable of detecting
malware even if it is previously unseen or being used for the first time.
Kaspersky Lab proactive protection technologies
Of all new threats detected in 2012 by Kaspersky Lab’s products, 87 per cent were
detected with the help of heuristic technologies incorporated into a number of products,
including Kaspersky Endpoint Security for Business
[http://www.kaspersky.com/business-security ]. Whatever method cyber criminals use when
trying to penetrate a corporate network, they will have to confront these technologies.
For example, if the attackers know that software with unpatched vulnerabilities is
present on corporate computers, they may attempt to exploit them to covertly infect
Cyber criminals typically exploit vulnerabilities existing in popular software, such
as Adobe Flash, Adobe Reader, Java, web browsers or OS components. Since these types of
applications are legitimate and often used by corporate employees, the attackers gamble
that security solutions will “overlook” the irregular behavior of a specific commonly used
program, allowing malware to pass unnoticed. Kaspersky Lab’s products incorporate the
[http://www.kaspersky.com/images/Kaspersky_Lab_Whitepaper_System_Watcher_ENG.pdf ] software
module which regularly analyses code for suspicious modifications, even in trusted
applications. Besides, the dedicated Automatic Exploit Prevention
technology, implemented as part of the System Watcher module, is able
to detect and block typical exploit behavior.
Cyber criminals often attempt to infect computers in the target corporate network with
the help of so-called rootkits and bootkits. These highly dangerous malware types modify
the boot sector on the hard drive of the target computer so they can launch before the
operating system or the installed security software. The Anti-Rootkit technology
implemented in Kaspersky Endpoint Security for Business and several other products,
intercepts and analyses all instances when the hard drive’s boot sector is accessed,
checking their legitimacy and preventing possible infection. Moreover, even if the rootkit
was somehow able to modify the boot record, Kaspersky Lab’s technology will detect it and
undertake to treat the infection.
As the BYOD (Bring your Own Device) trend develops, corporate employers increasingly
allow personal mobile devices for work, giving cybercriminals more and more opportunities
to penetrate corporate networks. The wide range of mobile devices and operating systems
gives them a wide choice of attack vectors. For instance, a vulnerability in a mobile
device connected to a corporate network, once successfully exploited, could allow a
cybercriminal access even if the other network segments are well protected. The
technologies for securing and managing corporate mobile devices available in Kaspersky
Endpoint Security for Business offer a robust response to the growing number and
complexity of attack vectors which develop in BYOD environments.
In particular, Kaspersky Security for Mobile
[http://www.kaspersky.com/business-security/mobile ], apart from scanning mobile devices
for malware, can apply various restrictive policies to installed applications, identify
jailbroken devices, and remotely wipe corporate data stored in a device if there’s a risk
it has been compromised.
In summary, Kaspersky Lab’s technologies protect every weak point presented by mobile
devices, thwarting attempts to attack corporate networks. By virtue of deeply integrated
security technologies for various types of device, they provide security from combined
attacks, when cyber criminals attempt to break into corporate IT infrastructures by using
both vulnerabilities existing in desktop software and breaches in mobile device security.
About Kaspersky Lab
Kaspersky Lab is the world’s largest privately held vendor of endpoint protection
solutions. The company is ranked among the world’s top four vendors of security solutions
for endpoint users*. Throughout its 15-year history Kaspersky Lab has remained an
innovator in IT security and provides effective digital security solutions for consumers,
SMBs and enterprises. The company currently operates in almost 200 countries and
territories across the globe, providing protection for over 300 million users worldwide.
Learn more at http://www.kaspersky.co.uk.
* The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue
by Vendor, 2011. The rating was published in the IDC report “Worldwide Endpoint Security
2012-2016 Forecast and 2011 Vendor Shares (IDC #235930, July 2012). The report ranked
software vendors according to earnings from sales of endpoint security solutions in 2011.
Follow us on Twitter
Like us on Facebook
Editorial contact: Berkeley PR Ella Thompson firstname.lastname@example.org Telephone: +44(0)118-909-0909 1650 Arlington Business Park RG7 4SA, Reading Kaspersky Lab UK Ruth Knowles Ruth.Knowles@kasperskylab.co.uk Telephone: +44(0)7590-440-433 Milton Business Park OX14 4RY, Oxford
(c) 2013 Kaspersky Lab. The information contained herein is subject to change without
notice. The only warranties for Kaspersky Lab products and services are set forth in the
express warranty statements accompanying such products and services. Nothing herein should
be construed as constituting an additional warranty. Kaspersky Lab shall not be liable for
technical or editorial errors or omissions contained herein.
SOURCE Kaspersky Lab