The new version promises to business improvements in terms of scalability, visibility, and usability, and detection.

Kaspersky Lab has had a hand in their solution Kaspersky Anti-Targeted Attack Platform, which is intended to act against attacks aimed at businesses and advanced threats.

The new version of Kaspersky Anti-Targeted Attack Platform, which is nourished by intelligence threats and technology of machine learning, said to be able to detect these attacks at any stage of development. In addition, characterised by their scalability and adaptation to the needs of the client and visibility.

In terms of scalability, Kaspersky Lab has decentralized the infrastructure of sandbox. The new version of Kaspersky Anti-Targeted Attack Platform provides supervision of the corporate workflow, such as web traffic and e-mail. It also blocks emails malicious in combination with Kaspersky Security for Mail Gateway. On the topic of visibility, it has reviewed the panel to provide information to the detail of events, incidents and controls. It will be possible to restrict access, and administrators have different roles.

“In accordance with our strategic vision on the adaptive security efficient for companies, we have introduced three main areas of improvement of the product. The first, and most important, is the addition of new operational scenarios aimed at improving the general visibility, the capabilities of analysis and the correlation of automated multiple events probably connected to a single incident. In second place is the new scalability, flexibility and ability to adapt to the requirements of performance only solution”, explica Oleg Glebov, Anti Targeted Attacks Solution Business Lead at Kaspersky Lab.

“Finally”, says Glebov, “there is the factor of usability: a display of clean, understandable, and customizable how it works our solution is also vital for faster detection and response-aligned”.

it should Be noted that Kaspersky Anti-Targeted Attack Platform has also given back to the own detection. It allows, for example, to scan suspicious objects repeatedly, and to process URLs in addition to files protected by a password.