White Papers

Read more about the latest IT security technologies and solutions from Kaspersky Lab.

<h3 xmlns="http://www.w3.org/1999/xhtml">Securing the Enterprise with the Kaspersky Cybersecurity Solutions Portfolio</h3>

CYBERSECURITY SOLUTIONS

Securing the Enterprise with the Kaspersky Cybersecurity Solutions Portfolio

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Securing the Enterprise with Kaspersky Cybersecurity Services</h3>

Cybersecurity Services

Securing the Enterprise with Kaspersky Cybersecurity Services

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Reality vs Delusion: A Guide to the Modern Threat Landscape</h3>

CYBERSECURITY SOLUTIONS

Reality vs Delusion: A Guide to the Modern Threat Landscape

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning and Human Expertise</h3>

CYBERSECURITY SOLUTIONS

Machine Learning and Human Expertise

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Advanced Threat Defense and Targeted Attack Risk Mitigation</h3>

ANTI TARGETED ATTACK

Advanced Threat Defense and Targeted Attack Risk Mitigation

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Security for Your Private Data Center: Getting It Right</h3>

Data Center Security

Security for Your Private Data Center: Getting It Right

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Secure your Amazon Cloud with Kaspersky Cloud Security</h3>

CLOUD SECURITY

Secure your Amazon Cloud with Kaspersky Cloud Security

Download PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Virtualization Integrated with VMware NSX</h3>

CLOUD SECURITY

Kaspersky Security for Virtualization Integrated with VMware NSX

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Network: Big Data-powered Security</h3>

CYBERSECURITY SOLUTIONS

Kaspersky Security Network: Big Data-powered Security

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">SOC powered by Kaspersky Lab</h3>

Cybersecurity Services

SOC powered by Kaspersky Lab

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Attacks with Exploits: From Everyday Threats to Targeted Campaigns</h3>

CYBERSECURITY SOLUTIONS

Attacks with Exploits: From Everyday Threats to Targeted Campaigns

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Fileless attacks against enterprise networks</h3>

CYBERSECURITY SOLUTIONS

Fileless attacks against enterprise networks

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">The Protection Technologies of Kaspersky Endpoint Security</h3>

Endpoint Security

The Protection Technologies of Kaspersky Endpoint Security

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Corking the Bottleneck: How To Block an Exploit</h3>

ENDPOINT SECURITY

Corking the Bottleneck: How To Block an Exploit

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">SWIFT Security Controls Mapping</h3>

Financial Services Cybersecurity

SWIFT Security Controls Mapping

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Endpoints and Servers</h3>

Financial Services Cybersecurity

PCI DSS v3.2 Mapping: Endpoints and Servers

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Embedded Systems</h3>

Financial Services Cybersecurity

PCI DSS v3.2 Mapping: Embedded Systems

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">ATM and POS security guide</h3>

Endpoint Security

ATM and POS security guide

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Embedded Systems Security – Safeguarding ATMs</h3>

Endpoint Security

Kaspersky Embedded Systems Security – Safeguarding ATMs

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Point of Threat or Point of Sale: Threats Targeting PoS Terminals</h3>

Endpoint Security

Point of Threat or Point of Sale: Threats Targeting PoS Terminals

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Protecting your business against financial and reputational losses with Kaspersky DDoS Protection</h3>

Telecom Cybersecurity

Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">7 reasons to choose KICS Assessment</h3>

Industrial Cybersecurity

7 reasons to choose KICS Assessment

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Cybersecurity for Electric Power Infrastructure</h3>

Industrial Cybersecurity

Cybersecurity for Electric Power Infrastructure

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">KICS Training and Awareness Programs</h3>

Industrial Cybersecurity

KICS Training and Awareness Programs

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Industrial CyberSecurity: solution overview 2017</h3>

Industrial CyberSecurity

Kaspersky Industrial CyberSecurity: solution overview 2017

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection</h3>

Fraud Prevention

Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention for Mobile</h3>

Fraud Prevention

Kaspersky Fraud Prevention for Mobile

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Proactive Account-based Fraud Protection for Web and Mobile Channels</h3>

Fraud Prevention

Proactive Account-based Fraud Protection for Web and Mobile Channels

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Interactive Protection Simulation (KIPS)</h3>

Kaspersky Security Awareness

Kaspersky Interactive Protection Simulation (KIPS)

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Cybersafety Management Games</h3>

Kaspersky Security Awareness

Cybersafety Management Games

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Employee Skills Training Platform</h3>

Kaspersky Security Awareness

Employee Skills Training Platform

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity</h3>

DATA CENTER SECURITY

Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity

DOWNLOAD PDF