Streamlining SOC Operations with Unified XDR Architecture and Generative AI Integration
In an era of increasingly sophisticated cyber threats, the burden on Security Operations Centers (SOC) has never been higher. Recognizing this, Kaspersky has unveiled a major update to its Kaspersky Next flagship line, focusing on two critical pillars: architectural unification and the practical application of Artificial Intelligence.
The headline of this update is the migration of Kaspersky Next EDR Expert to the Open Single Management Platform (OSMP). By uniting EPP, EDR, XDR, and SIEM tools within a single, cohesive console, security teams can finally move away from swivel-chair management.
This architectural shift isn’t just about visibility, it’s about resource optimization. The new release reduces hardware requirements by up to 30% for EDR Expert and a staggering 60% for XDR Expert users. For enterprises looking to scale their security posture without a proportional increase in infrastructure costs, this represents a significant win for operational efficiency.
The update introduces advanced AI-driven mechanisms designed to detect complex attack vectors that often bypass traditional signature-based tools:
- DLL Hijacking Detection: AI now examines program execution parameters to identify when legitimate software is being manipulated into loading malicious libraries.
- Compromised Account Spotting: By establishing a baseline of “normal” login activity, the system can now trigger alerts for abnormal events, effectively identifying account theft in real-time.
Perhaps the most forward-looking addition is the Kaspersky Investigation and Response Assistant (KIRA AI). As a Generative AI-powered tool, KIRA is designed to reduce the cognitive load on SOC analysts. From translating natural language Threat Hunting queries into structured database syntax to generating instant incident summaries, KIRA allows human analysts to focus on high-level strategy rather than manual data deobfuscation.
The update brings several quality-of-life and technical improvements to the EDR agent, particularly for Linux environments. New features like Live Shell (remote terminal response) and an Attack Development Graph provide a visual and interactive way to trace an attack chain, allowing for faster neutralization and more accurate forensic reporting.






























