{"id":21819,"date":"2023-04-24T09:05:16","date_gmt":"2023-04-24T17:05:16","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/04\/24\/news-15550\/"},"modified":"2023-04-24T09:05:16","modified_gmt":"2023-04-24T17:05:16","slug":"news-15550","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/04\/24\/news-15550\/","title":{"rendered":"Kandji explains its new Endpoint Detection and Response tools"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2023\/04\/unknown-100940153-small.jpg\"\/><\/p>\n<p>The Apple-focused enterprise solutions provider ecosystem is <a href=\"https:\/\/www.computerworld.com\/article\/3692916\/fleet-announces-open-source-cross-platform-mdm-solution.html\">growing apace<\/a> to match the <a href=\"https:\/\/www.computerworld.com\/article\/3689888\/for-apples-enterprise-success-endpoint-management-is-the-new-black.html\">rapidly expanding need<\/a> of enterprise IT. Jamf recently introduced a new <a href=\"https:\/\/www.computerworld.com\/article\/3694191\/jamf-debuts-sophisticated-security-protection-for-executive-iphones.html\">anti-spyware solution<\/a> for high-value targets. Today, competitor Kandji officially introduced its\u00a0<a href=\"https:\/\/www.kandji.io\/endpoint-detection-response\/\" rel=\"noopener nofollow\" target=\"_blank\">Endpoint Detection &amp; Response (EDR)<\/a>) solution, which aims to fight malware on the Mac.<\/p>\n<p>I caught up with Weldon Dodd, Kandji&#8217;s senior vice president for community, to find more.<\/p>\n<p>\u201cApple\u2019s footprint in the enterprise has grown rapidly,\u201d Dodd said. \u201cWith this growth, attention from threat actors has mounted for the Mac ecosystem. While Apple computers are secure, they are not impervious to threats. There are thousands of malware variants that can exploit vulnerabilities of apps running on a Mac, or bypass native security systems.\u201d<\/p>\n<p>Weldon Dodd,\u00a0Kandji senior vice president for community.<\/p>\n<p>The torrent of attacks is unlikely to slow as <a href=\"https:\/\/www.computerworld.com\/article\/3686060\/ciscos-mac-choice-scheme-confirms-apples-future-in-enterprise-tech.html\">Apple\u2019s place in these markets continues to grow<\/a>. Cisco says 59% of new hires choose a Mac and 65% of existing workers switch to Apple\u2019s platform when they get the chance. Add a touch of mobile and the nature of business tech has transformed, with <a href=\"https:\/\/www.applemust.com\/digital-device-penetration-has-just-begun-roger-whittle\/\" rel=\"noopener nofollow\" target=\"_blank\">digital device penetration<\/a> still only at the beginning of <a href=\"https:\/\/www.computerworld.com\/article\/3692817\/should-we-do-more-business-with-our-iphones.html\">full realization of potential<\/a>.<\/p>\n<p>\u201cApple is the platform of choice for more and more workers today. Especially as larger enterprises adopt them, it becomes a bigger focus for bad actors,\u201d said Dodd.<\/p>\n<p>In that context, IT is being asked to deploy and maintain more and more tools to achieve compliance and protection.<\/p>\n<p>\u201cThe solution is a way for IT to roll endpoint protection tooling in with their device management tooling,\u201d said Dodd. \u201cThey can handle the management and protection of their Apple devices without having to maintain multiple agents. It is not a standalone endpoint detection and response system. It has been built natively into Kandji\u2019s Device Management offering.\u201d<\/p>\n<p>Kandji\u2019s protection is deployed via the company\u2019s <a href=\"https:\/\/www.computerworld.com\/article\/3682749\/kandji-improves-its-device-harmony-platform-for-apple-enterprise.html\">existing Device Management tools<\/a>, including its eponymously named Agent and Web app tools. The company says the protection analyzes incoming files for malware signals and enforces custom allow\/block lists, which works to automatically identify and kill malicious files.<\/p>\n<p>Dodd said the software leverages Apple\u2019s technologies to the furthest extent possible. \u201cWe are using nearly every security API provided by Apple,\u201d he said.<\/p>\n<p>The primary API used is Apple\u2019s Endpoint Security Framework (ESF). This kernel-based solution helps the system spot and respond to threats in real time and is similar to Windows ETW (Event Tracing for Windows). Its existence was enabled by Apple\u2019s decision to <a href=\"https:\/\/www.computerworld.com\/article\/3588274\/how-to-prepare-your-mac-deployments-for-big-sur.html\">deprecate Kernel Extensions from its systems<\/a> with the introduction of macOS Catalina.<\/p>\n<p>Kandji uses these APIs to, \u201ccollect system data and events [that] are the foundation for Device Harmony, and we use APIs for resource management \u2014 always prioritizing user work over the Kandji Agent\u2019s, and to gather contextual information on system events to enhance threat detection,\u201d Dodd said.<\/p>\n<p>Dodd claims fast threat detection with little impact on Mac system resources.<\/p>\n<p>It works like this: devices managed by the company already rely on Kandji Agent, which is notified by the ESF of each file system event as it takes place in a process that poses \u201calmost no CPU overhead,\u201d Dodd said.<\/p>\n<p>\u201cWe leverage Apple&#8217;s methodologies, so our agent uses system resources as efficiently as possible. For example, the Kandji Agent takes advantage of Apple\u2019s asymmetric multi-processing, so it dynamically uses performance or efficiency cores in Apple Silicon Macs, making sure the user always has the compute power they need.&#8221;<\/p>\n<p>Security is informed by millions of malware definitions, data from the world\u2019s leading threat feeds, and the company\u2019s nine-strong team of threat researchers who curate detection methods and prevention strategies on current and future Mac malware variants. Dobbs told me the system can detect known variants from multiple Advanced Persistent Threat (APT) groups (<a href=\"https:\/\/www.computerworld.com\/article\/3694132\/security-researchers-uncover-nso-group-iphone-attacks-in-europe.html\">such as NSO Group<\/a>) on a Mac. The system also has rules in place to identify some unknown variants based on identifying points in the malware.<\/p>\n<p>Of course, protection of any kind is only part of the solution. Educating employees around good security practices is always the first line of defense. And even the most security-savvy user can be misled. \u201cAttackers are constantly coming up with innovative ways to breach systems,\u201d Dodd said. \u201cEventually someone will accidentally click that link or do something to allow malware onto their computer.<\/p>\n<p>\u201cA well-designed campaign can trick anyone, especially if it happens to come at the right place and right time. And in some cases, malware is spread to systems through compromised software that does not require any user intervention. It is on the company to build the protections so it&#8217;s ready for any possibility.\u201d<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/social.vivaldi.net\/@jonnyevans\" rel=\"noopener nofollow\" target=\"_blank\">Mastodon<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"noopener nofollow\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<\/em><a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"noopener nofollow\" target=\"_blank\"><em>Apple<\/em>\u00a0<em>Discussions<\/em><\/a><em>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3694448\/kandji-explains-its-new-endpoint-detection-and-response-tools.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2023\/04\/unknown-100940153-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>The Apple-focused enterprise solutions provider ecosystem is <a href=\"https:\/\/www.computerworld.com\/article\/3692916\/fleet-announces-open-source-cross-platform-mdm-solution.html\">growing apace<\/a> to match the <a href=\"https:\/\/www.computerworld.com\/article\/3689888\/for-apples-enterprise-success-endpoint-management-is-the-new-black.html\">rapidly expanding need<\/a> of enterprise IT. Jamf recently introduced a new <a href=\"https:\/\/www.computerworld.com\/article\/3694191\/jamf-debuts-sophisticated-security-protection-for-executive-iphones.html\">anti-spyware solution<\/a> for high-value targets. Today, competitor Kandji officially introduced its\u00a0<a href=\"https:\/\/www.kandji.io\/endpoint-detection-response\/\" rel=\"noopener nofollow\" target=\"_blank\">Endpoint Detection &amp; Response (EDR)<\/a>) solution, which aims to fight malware on the Mac.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3694448\/kandji-explains-its-new-endpoint-detection-and-response-tools.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10403,714],"class_list":["post-21819","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-macos","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21819"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21819\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21819"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}