Woburn, MA – June 26, 2014 - The United States Patent and Trademark Office (USPTO) has granted patent 8739287 to Kaspersky Lab for a technology that detects threats in corporate IT infrastructure without compromising confidential information.
Not all threats can be detected using locally installed solutions – some of them require more extensive analysis. To do this, suspicious files are delivered to a special infrastructure operated by the security vendor. This infrastructure has more resources to carry out comprehensive analysis in isolated conditions. However, most companies use their IT infrastructure to store confidential data. Often, it is strictly prohibited to share this information with third parties, either by corporate rules or regulatory requirements. This means that storage space for confidential files is often vulnerable, especially to sophisticated threats –like malware with rootkit functions – that cannot be detected on the client side. Kaspersky Lab has developed a new technology that allows corporate network administrators to sift through the content sent for analysis and prevent potentially infected confidential data from leaking.
The technology works by integrating the security solution’s components into the corporate IT infrastructure and collecting metadata – information that makes it possible to investigate the characteristics of the data without directly accessing the data itself. This metadata is transferred to an external server for analysis. If that analysis requires further information, the server requests the objects it needs from the corporate infrastructure. Admins can examine this list, determine which items can be freely shared and approve the transmission. Once it gets the information requested, the server completes its analysis in autonomous mode. If any malware is detected, it will send a notification and, if possible, the tools to fix the problem.
“Companies working with sensitive data become hostages of their privacy – by protecting valuable information from disclosure they expose it to other dangers. But malware infects all files regardless of whether it’s secret or non-secret. It is usually safe to transmit at least part of the infected files for verification, and that enables Kaspersky Lab’s technology to detect the threat and find an appropriate solution without having to access confidential resources,” said Alexey Polyakov, Head of the Global Emergency Response Team at Kaspersky Lab and one of the authors of the patented technology.
The technology is already integrated into Kaspersky Endpoint Security 8.0 for Windows and Kaspersky Endpoint Data Protection Edition (Endpoint 10).
Kaspersky Lab continues to obtain more and more patents for its cutting-edge digital security technologies. At present, Kaspersky Lab’s portfolio includes 213 patents issued in Russia, the US, the EU and China. In addition to that, 217 patent applications are currently under consideration by the patent authorities in these countries.
Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions. The company is ranked among the world’s top four vendors of security solutions for endpoint users*. Throughout its more than 16-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for large enterprises, SMBs and consumers. Kaspersky Lab, with its holding company registered in the United Kingdom, currently operates in almost 200 countries and territories across the globe, providing protection for over 300 million users worldwide. Learn more at www.kaspersky.com.
* The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2012. The rating was published in the IDC report "Worldwide Endpoint Security 2013–2017 Forecast and 2012 Vendor Shares (IDC #242618, August 2013). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2012.
For the latest in-depth information on security threat issues and trends, please visit:
Securelist | Information about Viruses, Hackers and Spam
Follow @Securelist on Twitter
Threatpost | The First Stop for Security News
Follow @Threatpost on Twitter