{"id":5758,"date":"2015-05-14T06:59:11","date_gmt":"2015-05-14T10:59:11","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5758"},"modified":"2020-02-26T15:11:09","modified_gmt":"2020-02-26T15:11:09","slug":"kaspersky-security-network-explained","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/kaspersky-security-network-explained\/5758\/","title":{"rendered":"Cloud Security explained: 1 technical term, 0 complicated charts"},"content":{"rendered":"<p><strong>Updated:<\/strong> Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found <a href=\"https:\/\/www.kaspersky.com\/about\/data-protection\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p class=\"Body\"><span lang=\"EN-US\">Cloud-based security approach is not a novelty, but it gets a lot of attention lately, most likely because everything today is \u201cin the cloud\u201d. Your smartphone\u2019s contacts, photos, e-mails, music, purchased movies and books is now mostly stored somewhere else, not on your computer or mobile device.<\/span><\/p>\n<p class=\"Body\">\n<\/p><p>We often get questions like \u201chow does it work\u201d or \u201cis my personal information safe\u201d or \u201cwhy don\u2019t you just use cloud security only, if it\u2019s so good\u201d. Here we will try to answer some of the most popular questions. But, to keep things simple, we tried to avoid all technical terms, except one \u2014 the very \u201ccloud security\u201d.<\/p>\n<h3>What\u2019s up with the cloud?<\/h3>\n<p>\u201cClouds\u201d are about storing or processing data some place else, making access to information convenient and connecting people for a mutual benefit. What is \u201ccloud security\u201d then? Our own implementation of a cloud security model is called Kaspersky Security Network. And here we\u2019ll explain how it actually works.<\/p>\n<p>If you have, let\u2019s say, <a href=\"https:\/\/www.kaspersky.com\/advert\/multi-device-security?redef=1&amp;THRU&amp;reseller=gl_KDpost_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> installed on your PC or Mac, it continually checks it for infection. The \u201ctraditional\u201d security technology do most of the job offline and sometimes they download an update from Kaspersky lab. This traditional approach requires about an hour to respond to a new threat.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Find out, how Kaspersky Security Networks works #KSN #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FKVs7&amp;text=Find+out%2C+how+Kaspersky+Security+Networks+works+%23KSN+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In a modern world an hour is sometimes too much. What if the file you\u2019re opening or a web page you\u2019re loading cannot be deemed malicious immediately, but looks suspicious to our product? That\u2019s where Kaspersky Security Network kicks in.<\/p>\n<p>Using this cloud security network, you can ask other users, if they did see a similar object lately. Was it suspicious as well? You can also ask our security experts (<a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-lab-european-research-center\/\" target=\"_blank\" rel=\"noopener nofollow\">these guys are working 24\/7 in different countries<\/a>), what does they think about it. Based on this conversation the cloud security network gives you advice: hey, this file or web page is way too suspicious, you\u2019d better not open it.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/05\/05195320\/Comix-clowd-Main-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5760\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/05\/05195320\/Comix-clowd-Main-876x1024.jpg\" alt=\"Comix clowd Main\" width=\"876\" height=\"1024\"><\/a><\/p>\n<p>Of course, you don\u2019t ask all those questions personally, that would be too complicated. Our security solutions do all this work automatically. From a technical point of view it\u2019s a bit more complicated, but now you get the core idea, how Kaspersky Security Network works.<\/p>\n<p>In short, for some of those cyber threats it reduces response time (i.e. the time between a cyber-criminal starts an attack to the time when attack is blocked) from hours to minutes!<\/p>\n<p>&lt;h3&gt;OK, sounds cool. Why don\u2019t security companies use only that cloud technology?&lt;\/h3&gt;<\/p>\n<p>Without other, traditional technologies, Kaspersky Security Network could not be efficient. Our security solution is like a private detective assigned to your computer. Without network access, it is capable of detecting vast majority of attacks using its expertise and tools.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The Wonders of <a href=\"https:\/\/twitter.com\/hashtag\/Whitelisting?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Whitelisting<\/a> (as Opposed to <a href=\"https:\/\/twitter.com\/hashtag\/Blacklisting?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Blacklisting<\/a>) \u2013  <a href=\"https:\/\/t.co\/WqmaKfmT6O\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/WqmaKfmT6O<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/antivirus?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#antivirus<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/523142735210237953?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 17, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Cloud security helps to bring this result even closer to a hundred, and to make it fast. However, sending all data to the cloud, instead of consulting about a few suspicious objects could consume your data plan and take too much time to process \u2014 we don\u2019t want that.<\/p>\n<h3>Is my personal data safe? Do you process it?<\/h3>\n<p>Yes, it is completely safe. More than that, speaking in terms of law, Kaspersky Security Network doesn\u2019t process any personal data. Getting your photos, documents or emails and storing it somewhere never is the goal as well. The goal is to look for suspicious objects, more specifically, not even files themselves, but their behaviour, analyse how bad guys are conducting their attacks and block them.<\/p>\n<p>Actually, Kaspersky Security Network is designed to process as little information as possible. And there\u2019re good reasons for this: we want to make data transmission really fast and secure (i.e. encrypted). So transmitting, encrypting, storing and then decrypting any data unnecessary to complete the main goal, which is to detect new threats, would be waste of resources.<\/p>\n<p>Our general rule is that we use Kaspersky Security Network to, let\u2019s say, identify the most widespread threats in a particular country, to protect our clients in this country better. But we don\u2019t track a particular user.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Check out our new interactive map of online threats <a href=\"http:\/\/t.co\/evG9cGhBXw\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/evG9cGhBXw<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cyberthreats?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cyberthreats<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/KSN?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#KSN<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/448159912099856384?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 24, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Can I opt out of Kaspersky Security Network? And will my computer be vulnerable if so?<\/h3>\n<p>Yes, you can disable Kaspersky Security Network (or turn it back on) at any time. When you opt out, our product stops sending data from you to the cloud system. This won\u2019t decrease your own level of protection, you will be getting latest and updates in any case.<\/p>\n<p>However, cloud security works a bit like mass vaccination, because the behaviour of computer malware is very similar to that of biologic viruses, especially the ability to poly-morph. When a few people avoid it, it won\u2019t affect public health (or security in our case).<\/p>\n<p>When the majority stops using it, everyone becomes vulnerable. Thus, participating in Kaspersky Security Network is also important because it helps to make cyber world a better and safer place. But taking part in this effort is definitely up to you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our own implementation of a cloud security model is called Kaspersky Security Network. And here we\u2019ll explain how it actually works<\/p>\n","protected":false},"author":40,"featured_media":5759,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,2026],"tags":[801,784,224,974,43,502],"class_list":{"0":"post-5758","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"category-threats","9":"tag-cloud-security","10":"tag-cloud-services","11":"tag-kaspersky-security-network","12":"tag-ksn","13":"tag-privacy","14":"tag-products-2"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/kaspersky-security-network-explained\/5758\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/kaspersky-security-network-explained\/4876\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-security-network-explained\/4804\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kaspersky-security-network-explained\/5342\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/kaspersky-security-network-explained\/6060\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/kaspersky-security-network-explained\/7758\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-security-network-explained\/8657\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/kaspersky-security-network-explained\/3014\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/kaspersky-security-network-explained\/7614\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/kaspersky-security-network-explained\/7758\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-security-network-explained\/8657\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-security-network-explained\/8657\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/cloud-security\/","name":"cloud security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5758"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5758\/revisions"}],"predecessor-version":[{"id":19217,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5758\/revisions\/19217"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5759"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}