Policy-driven Security Helps You Stay Ahead of the Bad Guys

Kaspersky Labs just published a new eBook, Cybercriminals: Unmasking the Villain, which provides insight into cybercriminals’ evolving strategies and tactics. There are three points in particular that I want to highlight:

  • “31% of all cyberattacks are directed at businesses with less than 250 employees”
  • “42% of confidential data loss is caused by employees” often due to well-meaning employees “opening unauthorized email attachments, forwarding sensitive information or storing data insecurely”
  • “Hacking a small business to get into a larger business is now standard operating procedure for cybercriminals.”

These evolving cybercriminal practices underscore the reality that proper, up-to-date security practices are more vital than ever to the health and well-being of every company, no matter its size.  The risks are too high, and the incidence of exposure and breaches is only increasing.

On the other hand, each business has its own particular mix of security needs.  When it comes to the critical topic of computer and network security – one size does not fit all. That means picking the tools that match your environment. At the same time, one implementation approach does not fit all either. What you want is the right tool implemented the right way.

Policy-Driven Security

Policy-Driven security, often called Policy-Based Security, makes it possible for companies of any size to right-size their security procedures and deployments. And when this approach is combined with automation, you have a self-running system offering consistently high levels of security protection.

Kaseya VSA delivers both Policy-Based Security and rich automation.  With VSA, you can automate software updates and patch rollouts to ensure that all your devices are running the most secured versions available.  Even better, with VSA you can specify exactly which patches get deployed, as well as when and how to match your business’ specific needs (say to minimize network impact).

In fact, VSA extends this capability with pre-built automation templates that are based on real-world best practices derived from customer experiences. These templates can be quickly applied to easily deploy protection across the network to all required end points, and to ensure this protection is always up to date.

There is deep flexibility as part of this approach through selectable security posture levels.  This means that there are pre-built levels of security monitoring (think something similar to highest, high and regular) from which technicians can quickly select and enable the appropriate level of scanning and remediation for workstations or servers.  Security posture levels can be applied to individual devices or groups of devices guaranteeing compliance with internal or industry standards.

Behavioral-based and Network Attack Detection

Kaseya partners with Kaspersky Lab for its antivirus solution and with Malwarebytes on the anti-malware side of the coin. With either solution, IT professionals and MSPs can choose pre-built automated options for scanning, monitoring and remediation, or can customize these policies and add and tune items such network attack detection and behavior-based threat analysis.

As cybercriminals become more and more sophisticated, it’s important to constantly be advancing security responses as well.  VSA’s customized automated policies leverage the latest attributes of Kaspersky Lab and Malwarebytes, including new behavioral-based and network attack detection, to protect against emerging threats.

This new protection is integrated directly into Kaseya’s overall policy engine, which is key. With this integration, all antivirus and anti-malware admin tasks are handled right from the Kaseya console, so all automation policies can be managed in one centralized place

“The robust Kaseya VSA framework and agent technology enable a Single Pane of Glass methodology for administrators to configure and deploy Kaseya Network Antivirus across the network while providing real-time status updates and alerts to ensure maximum security,” Kaspersky said.

And administrators can decide what options of policies can be set for a single PC or server or groups of machines. These options include:

  • Launch at startup
  • Security level
  • Folder exclusions
  • Trusted applications
  • Enabled components
  • Updates configuration

Similarly, administrators can set configuration settings for a specific user, system type, or groups of computers with a shared security profile, and quickly deploy and continually update the anti-malware solution.

Set It And Forget It

Well, it might not be quite that simple.  But Policy-Based Security (partnered with robust automation to enforce it) is a cornerstone to making sure all the devices on your network are as secure as you can make them – and saving you time and effort.  By going the next step and delivering pre-built templates, based on customer best practices, VSA makes policy management even simpler and faster to implement

And with the pace at which cybercriminals are increasing their attacks, none of us has a minute to waste.


Posted by Doug Barney
Doug Barney was the founding editor of Redmond Magazine, Redmond Channel Partner, Redmond Developer News and Virtualization Review. Doug also served as Executive Editor of Network World, Editor in Chief of AmigaWorld, and Editor in Chief of Network Computing.
Patch Management Super Highway

2019 IT Operations Survey Results: Automated Patch Management Not Widely Adopted

Patch management and vulnerability management play a critical role in endpoint security. The process includes discovering assets in the network,Read More

Data Breach

2019 IT Operations Survey Results: Security Breaches and Outages Show No Sign of Slowing Down

The 2019 Kaseya IT Operations Survey has brought to light a few surprising as well as some obvious results about ITRead More

The Holy Grail basking in light

MSPs are the Holy Grail for Cybercriminals! Are You Protected?

Indiana Jones fans will likely remember the line from the “Last Crusade,” where Dr. Henry Jones tells his son, “TheRead More

Art of people working on a UI design

3 Key Takeaways From the 2019 State of IT Operations Survey

Kaseya conducted its fifth annual IT Operations Survey this past June, aiming to delve into current IT operational state andRead More

Connect IT Asia-Pacific - Don't Miss the Premier IT Management Event of the Year - Join Us in Sydney 1-3 October 2019 - Register Now