![]() Most often high-severity incidents were detected in IT (39%), industrial (30.2%), and financial (29.1%) organizations.Most incidents were detected at the initial access (27.3%) and lateral movement (16.3%) stages.40.7% of high-severity incidents were targeted attacks 18% were ethical offensive exercises (penetration testing, red teaming etc.).The average identification time of high-severity incidents was 41.4 minutes.14% of incidents were high-severity, 66% medium-severity, and 20% low-severity. ![]() 77.4% of all incidents are related to only one alert.63.74% of received alerts were processed by SOC analysts, 6.67% of which were related to real incidents reported to customers via the MDR portal.Kaspersky SOC investigates alerts and notifies the client if there is something bad going on, providing response actions and recommendations. We collect telemetry from clients’ networks and analyze it using machine learning and artificial intelligence, plus human threat-hunting analysts. Kaspersky Managed Detection and Response (MDR) helps organizations to complement existing detection capabilities or to expand limited in-house resources to protect their infrastructure from the growing number and complexity of threats in real time.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |