Vulnerabilities in Third-party Applications Cause 75 percent of Cyber Attacks: Maxim Mitrokhin

Maxim Mitrokhin, Director-Operations, Kaspersky Lab, APAC, talks about the company's aspirations for the Indian market.

Enterprise security is a crowded space with many well-entrenched vendors. Don't you think you've made a late entry?

We are definitely not late. Kapsersky started with a corporate (B2B) product. We sold much more in the B2B space in the early 2000s. In 2005-06 we launched a good consumer product (KV and KS version 6) which boosted our B2C revenues. Our worldwide revenue split today is 70:30, in favor of B2C. In India, it stretches to 80:20. We are not content with the B2B market share. Hence, the renewed focus on driving this segment.

How realistic is your GTM strategy in your bid to defeat companies like McAfee and Symantec? And how soon will that happen?

Despite the fact that we are comfortably placed in the B2C space, we never ignore the B2B market. We launched EP8 last October. It's difficult to win the hearts of big corporations that have been working with other dominant vendors for a long time. We had to introduce something different. 'Kaspersky Endpoint Security for Business' is a breakthrough product with a revolutionary 'One Platform, One Console, One Price' approach.

But hasn't the 'One Platform' concept been talked about by the likes of McAfee for many years now?

I would not like to compare it with the others. The biggest challenge today that IT managers face is the complexity that stems from security solutions across different platforms. Previously, only malware was a major threat. Today, about 75 percent of cyber attacks happen due to vulnerabilities in third-party applications. Software companies constantly release updates and patches which makes prioritization difficult for IT administrators. Also, the proliferation of laptops and smartphones at work underscores the need for MDM. Addressing all these threats means that there is a need for four different consoles and corresponding policies. There are tools in the market but they are all separate. To reduce this complexity, we introduced a single platform with one console. Many security vendors claim to offer one platform, but it is often built through some acquisition. The 'Endpoint Security for Business' platform is our own IP--it is our biggest differentiator.

How does the 'One Price' solution work with respect to new-age security threats and limited IT budgets?

IT managers buy security solutions from different vendors intermittently. But they need to convince their managements, and get budget approvals each time. The enterprise can buy our entire product with a one time budget approval. It also allows IT admins to see, control, and protect all systems and endpoints in the network. Our set of services is divided into four categories: Core, the foundation of workstation anti-malware protection and firewall; Select, which includes workstation and file server security, app control with dynamic whitelisting, device and Web control, and MDM; Advanced, which has the features of Select, and also includes encryption and systems management tools; and Total, which has additional protection with the inclusion of infrastructure-level protection for Web, mail, and collaboration servers.

The cloud has not been a roller coaster ride in India. Traditional vendors are struggling against niche MDM vendors like MobileIron. What is your cloud and mobility story?

The cloud option is in-built in our product. Some concepts appear to move fast but the actual adoption takes time. For corporations, information is everything. They want to keep it close. Our customers, presently, are more comfortable with the on-premise model. MDM is part of the new product, supporting various mobility platforms. The solution has a unique containerization feature, wherein one can store data in an encrypted form in separate folders.

Join the CSO newsletter!

Error: Please check your email address.

Tags securitykaspersky lab

More about APACKasperskyKasperskyMcAfee AustraliaMobileIronSymantec

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Yogesh Gupta

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts