White Papers

Read more about the latest IT security technologies and solutions from Kaspersky Lab.

    <h3 xmlns="http://www.w3.org/1999/xhtml">The road to making our products secure</h3>

    The road to making our products secure

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Enterprise Solutions Catalogue</h3>

    Enterprise Solutions Catalogue

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Securing the Enterprise with Kaspersky Cybersecurity Services</h3>

    Securing the Enterprise with Kaspersky Cybersecurity Services

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Reality vs Delusion: A Guide to the Modern Threat Landscape</h3>

    Reality vs Delusion: A Guide to the Modern Threat Landscape

    View Now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning and Human Expertise</h3>

    Machine Learning and Human Expertise

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning for Malware Detection</h3>

    Machine Learning for Malware Detection

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Advanced Protection and Threat Intelligence to Mitigate the Risk of Targeted Attacks</h3>

    Advanced Protection and Threat Intelligence to Mitigate the Risk of Targeted Attacks

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Security for Your Private Data Center: Getting It Right</h3>

    Security for Your Private Data Center: Getting It Right

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Secure your Amazon cloud with Kaspersky Cloud Security solution</h3>

    Secure your Amazon cloud with Kaspersky Cloud Security solution

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Virtualization Integrated with VMware NSX platform</h3>

    Kaspersky Security for Virtualization Integrated with VMware NSX platform

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Secure NUTANIX Enterprise Cloud Platform with Kaspersky Security for Virtualization</h3>

    Secure NUTANIX Enterprise Cloud Platform with Kaspersky Security for Virtualization

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Network: Big Data-powered Security</h3>

    Kaspersky Security Network: Big Data-powered Security

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">SOC powered by Kaspersky Lab</h3>

    SOC powered by Kaspersky Lab

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Attacks with Exploits: From Everyday Threats to Targeted Campaigns</h3>

    Attacks with Exploits: From Everyday Threats to Targeted Campaigns

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Fileless attacks against enterprise networks</h3>

    Fileless attacks against enterprise networks

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">The Protection Technologies of Kaspersky Endpoint Security for Business</h3>

    The Protection Technologies of Kaspersky Endpoint Security for Business

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Corking the Bottleneck: How To Block an Exploit</h3>

    Corking the Bottleneck: How To Block an Exploit

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">SWIFT Security Controls Mapping</h3>

    SWIFT Security Controls Mapping

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Endpoints and Servers</h3>

    PCI DSS v3.2 Mapping: Endpoints and Servers

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Embedded Systems</h3>

    PCI DSS v3.2 Mapping: Embedded Systems

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">ATM and POS security guide</h3>

    ATM and POS security guide

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Embedded Systems Security – Safeguarding ATMs</h3>

    Kaspersky Embedded Systems Security – Safeguarding ATMs

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Point of Threat or Point of Sale: Threats Targeting PoS Terminals</h3>

    Point of Threat or Point of Sale: Threats Targeting PoS Terminals

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Protecting your business against financial and reputational losses with Kaspersky DDoS Protection</h3>

    Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">7 reasons to choose KICS Assessment</h3>

    7 reasons to choose KICS Assessment

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Cybersecurity for Electric Power Infrastructure</h3>

    Cybersecurity for Electric Power Infrastructure

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">KICS Training and Awareness Programs</h3>

    KICS Training and Awareness Programs

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Industrial Cybersecurity: solution overview 2019</h3>

    Kaspersky Industrial Cybersecurity: solution overview 2019

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection</h3>

    Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention for Mobile</h3>

    Kaspersky Fraud Prevention for Mobile

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Proactive Account-based Fraud Protection for Web and Mobile Channels</h3>

    Proactive Account-based Fraud Protection for Web and Mobile Channels

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Awareness Training Programs</h3>

    Kaspersky Security Awareness Training Programs

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Interactive Protection Simulation (KIPS)</h3>

    Kaspersky Interactive Protection Simulation (KIPS)

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Cybersafety Management Games</h3>

    Cybersafety Management Games

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Employee Skills Training Platform</h3>

    Employee Skills Training Platform

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity</h3>

    Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Microsoft Office 365 how it works infographic</h3>

    Kaspersky Security for Microsoft Office 365 how it works infographic

    View now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Microsoft Office 365 brochure</h3>

    Kaspersky Security for Microsoft Office 365 brochure

    View now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Empowering National Cybersecurity Projects</h3>

    Empowering National Cybersecurity Projects

    View now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Managed Detection and Response brochure</h3>

    Kaspersky Managed Detection and Response brochure

    View now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Token Offering Security</h3>

    KASPERSKY TOKEN OFFERING SECURITY

    Kaspersky Token Offering Security

    VIEW NOW
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Crypto Exchange Security</h3>

    KASPERSKY CRYPTO EXCHANGE SECURITY

    Kaspersky Crypto Exchange Security

    VIEW NOW