Kaspersky Lab recently launched New Kaspersky CyberTrace for better initial response to cyber threats
Kaspersky Lab had recently launched Kaspersky CyberTrace – a free threat intelligence fusion and analysis tool. The new tool integrates numerous threat data feeds with SIEM solutions to immediately leverage threat intelligence for monitoring, detection and incident responses in security operation workflows. Commenting on the purpose and need to elude cyber-threats, Sergey Martsynkyan, Head of B2B Product Marketing at Kaspersky Lab, commented, “Being aware of the most relevant zero-days, emerging threats and advanced attack vectors is key to an effective cyber security strategy. However, manually collecting, analyzing and sharing threat data doesn’t provide the level of responsiveness required by an enterprise. There’s a need for a centralized point for accessible data sources and task automation. Kaspersky Cyber Trace helps organizations better understand their risks, increase the productivity of their security teams and ensure a more robust protection against cyber threats.”
Kaspersky Cyber Trace further helps prioritize tasks by giving analysts a set of instruments for conducting alert triage and response through categorization and validation of identified matches. On-demand lookup of indicators or scanning of logs and files enables advanced in-depth threat investigation, which accelerates forensic and threat hunting activities. The tool also provides feed usage statistics to measure the effectiveness of feeds and their relevance for a certain environment. To make it easier for enterprises to keep up to date with the latest threats, Kaspersky Cyber Trace retrieves continuously updated threat data feeds from multiple threat intelligence sources – including Kaspersky Lab, other vendors, open source intelligence or even custom sources – and automatically and rapidly matches them with incoming security events, offloading SIEMs from this high-load operation.
The variety of threat intelligence sources available on the market doesn’t always translate into protection from cyber attacks, as organizations struggle to decide which are relevant and most important for them. SIEMs or network security controls get overloaded with a large number of Indicators of Compromise (IoC), and the fact that threat data is provided in different formats only worsens the situation. If IoC from threat intelligence feeds are found in any log source within an organization’s environment, Kaspersky CyberTrace automatically sends alerts to SIEMs for ongoing monitoringand validation to reveal additional contextual evidence for the security incidents. The tool integrates smoothly with a variety of SIEMs, including IBM QRadar, Splunk, ArcSight ESM, LogRhythm, RSA NetWitness, and McAfee ESM, as well as other security controls such as firewalls and gateways.
Read more news: