Kaspersky CyberTrace aims to boost threat intelligence for faster cyber attack response

The free tool will help CISOs detect and manage threats to keep their business secure

Threat

Kaspersky is targeting under pressure CISOs with its threat intelligence service, helping top-level IT security management better understand threat intelligence.

CyberTrace pools together data feeds to help organisations identify threats to their business and ensures they can focus on the most important for their specific organisation.

The information is collated from various sources, including Kaspersky own labs, third-party vendors, open source repositories and custom intelligence databases.

When CyberTrace detects a potential threat, it will send out an alert to supported security information and event management (SIEM) systems, such as IBM QRadar, Splunk, ArcSight ESM, LogRhythm, RSA NetWitness, and McAfee ESM to validate the threat and helps them translate the threat to the organisation. The threats are categorised and filed to make it easier for SIEMs to look them up if needed and provide a contextual response.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Businesses can also look up log files and other data related to incidents for an in-depth threat investigation.

CyberTrace will also provide feed usage statistics to measure how effective a feed has been to detect threats and identify which are the most relevant for particular environments.

"Being aware of the most relevant zero-days, emerging threats and advanced attack vectors is key to an effective cybersecurity strategy. However, manually collecting, analysing and sharing threat data doesn't provide the level of responsiveness required by an enterprise," said David Emm, principal security researcher at Kaspersky Lab UK.

"There's a need for a centralised point for accessible data sources and task automation. Kaspersky CyberTrace helps organisations better understand their risks, increase the productivity of their security teams and ensure a more robust protection against cyber threats."

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020