<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=5DiPo1IWhd1070" style="display:none" height="1" width="1" alt="" />

White Papers

Read more about the latest IT security technologies and solutions from Kaspersky Lab.


		<h3 xmlns="http://www.w3.org/1999/xhtml">Securing the enterprise</h3>

KASPERSKY SECURITY SOLUTIONS for ENTERPRISE

Securing the enterprise

Cyber-threats are becoming ever more sophisticated. Without effective solutions to mitigate them, enterprises are at the mercy of cyber-attacks that drain financial resources, disrupt business continuity, leave...

View PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Reality vs Delusion: A Guide to the Modern Threat Landscape</h3>

Reality vs Delusion: A Guide to the Modern Threat Landscape

Reality vs Delusion: A Guide to the Modern Threat Landscape

The ever-going war between hackers and cybersecurity vendors is a fine illustration of the “survival of the fittest” principle. The...

View PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Network: Big Data-powered Security</h3>

Kaspersky Private Security Network

Kaspersky Security Network: Big Data-powered Security

In the never-ending cyber arms race, a true cybersecurity solution is capable of instant, effective response to new malware while striving to anticipate cybercriminals’ next...

View PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Fileless attacks against enterprise networks</h3>

Fileless attacks against enterprise networks

During incident response, a team of security specialists needs to follow the artefacts that attackers have left in the network. Artefacts are stored in logs, memories and hard...

View PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning and Human Expertise</h3>

Machine Learning and Human Expertise

Machine Learning and Human Expertise

How do Kaspersky Lab’s advanced algorithms ensure the best protection for your business against cyber threats?

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Captaining Data Center Security: Putting You at The Helm</h3>

Captaining Data Center Security: Putting You at The Helm

Running a data center involves a plethora of complex tasks, of which security is just one. But the security of virtual environments and...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Be Ready for What’s Next</h3>

KASPERSKY LAB'S AUTOMATIC EXPLOIT PREVENTION TECHNOLOGY

Be Ready for What’s Next

Automatic Exploit Prevention technology specifically targets malware that exploits software vulnerabilities to gain a toehold on enterprise endpoints and networks. Even if a user downloads or opens a malicious file...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Virtualization Security: Understanding the difference</h3>

Virtualization Security: Understanding the difference

Learn more about Virtualization security approaches and differences between them.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Security of Virtual Infrastructure. IT Security Risks Special Report</h3>

Security of Virtual Infrastructure. IT Security Risks Special Report

Find out why the industry’s understanding of virtualization technology, especially virtual-specific security issues, is far from perfect.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Private Security Network: Global threat intelligence for local implementation</h3>

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE – INSIDE THE CORPORATE INFRASTRUCTURE

Kaspersky Private Security Network: Global threat intelligence for local implementation

It takes up to four hours for standard...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Your Guide to Mobile Security Best Practices</h3>

MOBILE SECURITY. BEST PRACTICES

Your Guide to Mobile Security Best Practices

What if you didn’t have to trade security and data breach protection for mobility, productivity and simplicity? Know how in this guide to mobile security best practices.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Delivering powerful data and systems security and maintaining performance levels</h3>

Delivering powerful data and systems security and maintaining performance levels

The volume and complexity of...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Empowering Industrial Cyber Security</h3>

Empowering Industrial Cyber Security

Kaspersky Lab understands that each technology network has its specific features that, in most cases, are unique. Our industrial solution is fully customizable and works as a...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Protecting your business against financial and reputational losses with Kaspersky DDoS Protection</h3>

Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

Find out how our solution seamlessly...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention Overview</h3>

Kaspersky Fraud Prevention Overview

Your bank’s online financial services are under threat. Hundreds of millions of dollars are at stake. Any security incident affecting your bank costs money and time – refunds and...

View PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention Cloud</h3>

Kaspersky Fraud Prevention Cloud

Find out how you can protect against complex fraud attacks, without compromising the relaxed, straightforward online banking experience that creates...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Fraud protection technology for endpoints</h3>

Fraud protection technology for endpoints

Find out how you can protect your customers and their devices from fraud.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Maintenance Service Agreement Leaflet</h3>

Maintenance Service Agreement Leaflet

Learn more about premium support options with Kaspersky Maintenance Service Agreement.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Achieving effective, efficient security for critical payment systems</h3>

ATM AND POS SECURITY GUIDE

Achieving effective, efficient security for critical payment systems

Embedded systems present specific security concerns. They are generally geographically scattered, they can be challenging to...

View PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.1 Mapping</h3>

KASPERSKY EMBEDDED SYSTEMS SECURITY

PCI DSS v3.1 Mapping

PCI DSS 3.1 regulates many technical security requirements and settings for systems operating with credit card data. Sub-points 5.1, 5.1.1, 5.2, 5.3, 6.2 of PCI DSS v3.1 provide for the strict regulation of antivirus...

View PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention - Mobile Banking App Security</h3>

Kaspersky Fraud Prevention - Mobile Banking App Security

The mobile app has introduced a fundamental change to banking.

View PDF