Policy-driven Security Helps You Stay Ahead of the Bad Guys

Kaspersky Labs just published a new eBook, Cybercriminals: Unmasking the Villain, which provides insight into cybercriminals’ evolving strategies and tactics. There are three points in particular that I want to highlight:

  • “31% of all cyberattacks are directed at businesses with less than 250 employees”
  • “42% of confidential data loss is caused by employees” often due to well-meaning employees “opening unauthorized email attachments, forwarding sensitive information or storing data insecurely”
  • “Hacking a small business to get into a larger business is now standard operating procedure for cybercriminals.”

These evolving cybercriminal practices underscore the reality that proper, up-to-date security practices are more vital than ever to the health and well-being of every company, no matter its size.  The risks are too high, and the incidence of exposure and breaches is only increasing.

On the other hand, each business has its own particular mix of security needs.  When it comes to the critical topic of computer and network security – one size does not fit all. That means picking the tools that match your environment. At the same time, one implementation approach does not fit all either. What you want is the right tool implemented the right way.

Policy-Driven Security

Policy-Driven security, often called Policy-Based Security, makes it possible for companies of any size to right-size their security procedures and deployments. And when this approach is combined with automation, you have a self-running system offering consistently high levels of security protection.

Kaseya VSA delivers both Policy-Based Security and rich automation.  With VSA, you can automate software updates and patch rollouts to ensure that all your devices are running the most secured versions available.  Even better, with VSA you can specify exactly which patches get deployed, as well as when and how to match your business’ specific needs (say to minimize network impact).

In fact, VSA extends this capability with pre-built automation templates that are based on real-world best practices derived from customer experiences. These templates can be quickly applied to easily deploy protection across the network to all required end points, and to ensure this protection is always up to date.

There is deep flexibility as part of this approach through selectable security posture levels.  This means that there are pre-built levels of security monitoring (think something similar to highest, high and regular) from which technicians can quickly select and enable the appropriate level of scanning and remediation for workstations or servers.  Security posture levels can be applied to individual devices or groups of devices guaranteeing compliance with internal or industry standards.

Behavioral-based and Network Attack Detection

Kaseya partners with Kaspersky Lab for its antivirus solution and with Malwarebytes on the anti-malware side of the coin. With either solution, IT professionals and MSPs can choose pre-built automated options for scanning, monitoring and remediation, or can customize these policies and add and tune items such network attack detection and behavior-based threat analysis.

As cybercriminals become more and more sophisticated, it’s important to constantly be advancing security responses as well.  VSA’s customized automated policies leverage the latest attributes of Kaspersky Lab and Malwarebytes, including new behavioral-based and network attack detection, to protect against emerging threats.

This new protection is integrated directly into Kaseya’s overall policy engine, which is key. With this integration, all antivirus and anti-malware admin tasks are handled right from the Kaseya console, so all automation policies can be managed in one centralized place

“The robust Kaseya VSA framework and agent technology enable a Single Pane of Glass methodology for administrators to configure and deploy Kaseya Network Antivirus across the network while providing real-time status updates and alerts to ensure maximum security,” Kaspersky said.

And administrators can decide what options of policies can be set for a single PC or server or groups of machines. These options include:

  • Launch at startup
  • Security level
  • Folder exclusions
  • Trusted applications
  • Enabled components
  • Updates configuration

Similarly, administrators can set configuration settings for a specific user, system type, or groups of computers with a shared security profile, and quickly deploy and continually update the anti-malware solution.

Set It And Forget It

Well, it might not be quite that simple.  But Policy-Based Security (partnered with robust automation to enforce it) is a cornerstone to making sure all the devices on your network are as secure as you can make them – and saving you time and effort.  By going the next step and delivering pre-built templates, based on customer best practices, VSA makes policy management even simpler and faster to implement

And with the pace at which cybercriminals are increasing their attacks, none of us has a minute to waste.


Posted by Doug Barney
Doug Barney was the founding editor of Redmond Magazine, Redmond Channel Partner, Redmond Developer News and Virtualization Review. Doug also served as Executive Editor of Network World, Editor in Chief of AmigaWorld, and Editor in Chief of Network Computing.

The Role of Endpoint Management Tools in IT Security

IT security has been the top priority of IT teams for the past several years. According to the 2020 StateRead More

Connecting IT Podcast - 2021 With Mike Puglia and Nadir Merchant

Connecting IT Podcast – 2021 With Mike Puglia and Nadir Merchant

In this edition of the Connecting IT Podcast, host Dan Tomaszewski, Senior Vice President of Channel and Community at Kaseya,Read More

Two security experts reviewing data

Cybersecurity is Crucial: Things You Must Know From the Latest Federal Hack

Endpoint security is highly critical for an organization, as a single vulnerable endpoint can act as a doorway for cybercriminalsRead More

SD Wan in Action with Eric Gray from Convergence Networks

How One MSP Improved Customer Satisfaction and Reduced Support Tickets

Because so many business applications we use are now in the Cloud, internet continuity is critical to daily operations, employeeRead More

2020 IT Operations Survey Results - Highlighs and Key Takeaways - Watch Now
2020 MSP Benchmark Survey Report