Kaspersky Launches Threat Hunting Services Enabling Timely Detection of Adversarial Activity

Kaspersky Launches Threat Hunting Services Enabling Timely Detection of Adversarial Activity

March 17, 2021

3 Min Read


Woburn, MA – March 16, 2021 – Today, Kaspersky announces a brand new service, Kaspersky Threat Hunting, that enables the timely detection of adversarial activities. This new service allows for a more effective response, saving security teams’ resources for threat analysis, investigation and response.

Detecting and responding to sophisticated attacks requires specific expertise, while internal training or hiring additional experts may not always fit into the cybersecurity budget. A lack of resources can lead to untimely responses to incidents and, as a result, increase the losses of the organization. According to a Kaspersky report, for enterprises, the average cost of a data breach rises by more than $400k depending on whether a breach is discovered almost instantly or beyond seven days.

Targeted towards such organizations, Kaspersky Threat Hunting provides major benefits of an outsourced security operations center (SOC) and does not require specialized threat hunting and incident analysis skills from internal teams. The service is complemented by detection technologies as well as extensive expertise in threat hunting and incident response from professional units including the Global Research & Analysis Team (GReAT).

It is also empowered with an AI analyst that enables automatic alert resolution and allows Kaspersky SOC analysts to concentrate on the most important alerts. The combination of technologies and expertise gives customers protection form threats that evade detection, for example, by mimicking legitimate programs. IT security experts can see the protection status of all assets and threat detections in real time, receive ready-made response recommendations or authorize managed response scenarios. 

The service integrates several components. Kaspersky products send their telemetry to the Kaspersky Security Network[1] and this telemetry is then analyzed in the internal Kaspersky Security Operations Center using more than 700 constantly updated proprietary TTP-based ‘hunts’[2] tailored to the customer's environment along with various detection engines. Since alerts are collected from all endpoints, this allows the system to detect links of one attack chain on various machines. All detections are further validated and prioritized by Kaspersky’s threat hunting team to ensure a timely response.

After investigation, customers receive incident alerts and a comprehensive guide to incident response in the dedicated threat hunting portal. Response options can then be initiated through an EDR agent. Customers can also combine Threat Hunting with Kaspersky’s Incident Response retainer to completely outsource incident investigation, forensics and elimination.

“For many customers, one of their biggest challenges is being able to answer the question of whether or not they are under attack,” said Ori Ammar, head of presales for Kaspersky. “Kaspersky Threat Hunting allows cybersecurity professionals to strengthen their company’s resiliency to cybersecurity threats, while still optimizing their existing resources. This offering allows for scalable, turnkey deployment that enables an instantly matured IT security function without the need to invest in additional staff or expertise. The peace of mind our customers feel once that have deployed Kaspersky Threat Hunting is a significant achievement for our brand.”

Effective threat protection is always a set of measures that must be well coordinated with each other, easy to manage and meet the needs of customers, explains Dmitry Aleshin, vice president of product marketing at Kaspersky. “Another advantage is that, unlike one specific solution, threat hunting offers a cybersecurity roadmap for the company, assuring the transition from one IT security maturity level to another when the time comes. Thus, in the case of Threat Hunting, at a more basic level of information security development, a company can receive a fully automated service. When the expertise of its specialists grows, switch to the expert level and get involved in the threat hunting and investigation.”

For more information about Kaspersky Threat Hunting, please visit the webpage.

[1] Kaspersky Security Network (KSN) is a distributed infrastructure that works with various anti-malware protection components. The statistics consist of depersonalized metadata which is voluntarily provided by KSN participants among Kaspersky’s customers.

[2] Hunt is a rule containing the description of a suspicious activity in the system that could be a sign of an attack.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights