Kaspersky Managed Detection and Response (MDR) helps organizations to complement existing detection capabilities or to expand limited in-house resources to protect their infrastructure from the growing number and complexity of threats in real time. We collect telemetry from clients’ networks and analyze it using machine learning and artificial intelligence, plus human threat-hunting analysts. Kaspersky SOC investigates alerts and notifies the client if there is something bad going on, providing response actions and recommendations.
MDR in 2021 in numbers
- Kaspersky MDR received 414K alerts.
- 74% of received alerts were processed by SOC analysts, 6.67% of which were related to real incidents reported to customers via the MDR portal
- 4% of all incidents are related to only one alert
- 14% of incidents were high-severity, 66% medium-severity, and 20% low-severity
- The average identification time of high-severity incidents was 41.4 minutes
- 7% of high-severity incidents were targeted attacks; 18% were ethical offensive exercises (penetration testing, red teaming etc.)
- Most incidents were detected at the initial access (27.3%) and lateral movement (16.3%) stages
- Most often high-severity incidents were detected in IT (39%), industrial (30.2%), and financial (29.1%) organizations
- The LOL binaries most often used by attackers were cmd.exe, powershell.exe, and rundll.exe
To get the full Kaspersky Managed Detection and Response 2021 report, please fill out the form below.
Article Link: Kaspersky MDR analyst report for 2021 | Securelist