White Papers

Read more about the latest IT security technologies and solutions from Kaspersky Lab.

<h3 xmlns="http://www.w3.org/1999/xhtml">Securing the enterprise</h3>


Securing the enterprise

Cyber-threats are becoming ever more sophisticated. Without effective solutions to mitigate them, enterprises are at the mercy of cyber-attacks that drain financial resources, disrupt business continuity, leave confidential data exposed and cause reputational damage.

View PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Reality vs Delusion: A Guide to the Modern Threat Landscape</h3>

Reality vs Delusion: A Guide to the Modern Threat Landscape

The ever-going war between hackers and cybersecurity vendors is a fine illustration of the “survival of the fittest” principle. The leading developers of defensive solutions are dead serious in their resolution to stop attackers in their track. But this sort of pressure has also been a great stimulus to hackers inventing new tricks, techniques and business models, just in order to stay in business.

View PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Network: Big Data-powered Security</h3>

Kaspersky Private Security Network

Kaspersky Security Network: Big Data-powered Security

In the never-ending cyber arms race, a true cybersecurity solution is capable of instant, effective response to new malware while striving to anticipate cybercriminals’ next moves. A key component of that capability is the use of cloud technologies that apply distributed data mining and Data Science technologies to threat information processing.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Future risks: Be prepared</h3>

Future risks: Be prepared

Special report on mitigation strategies for advanced threats.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Captaining Data Center Security: Putting You at The Helm</h3>

Captaining Data Center Security: Putting You at The Helm

Running a data center involves a plethora of complex tasks, of which security is just one. But the security of virtual environments and data storage in particular is critical to the modern data center.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Be Ready for What’s Next</h3>


Be Ready for What’s Next

Automatic Exploit Prevention technology specifically targets malware that exploits software vulnerabilities to gain a toehold on enterprise endpoints and networks. Even if a user downloads or opens a malicious file, AEP technology will prevent the malware from executing.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Virtualization Security: Understanding the difference</h3>

Virtualization Security: Understanding the difference

Learn more about Virtualization security approaches and differences between them.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Security of Virtual Infrastructure. IT Security Risks Special Report</h3>

Security of Virtual Infrastructure. IT Security Risks Special Report

Find out why the industry’s understanding of virtualization technology, especially virtual-specific security issues, is far from perfect.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Private Security Network: Global threat intelligence for local implementation</h3>


Kaspersky Private Security Network: Global threat intelligence for local implementation

It takes up to four hours for standard security solutions to receive the information needed to detect. Threat intelligence sharing via Kaspersky Private Security Network provides this information in 30-40 seconds – from within the organization.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Your Guide to Mobile Security Best Practices</h3>


Your Guide to Mobile Security Best Practices

What if you didn’t have to trade security and data breach protection for mobility, productivity and simplicity? Know how in this guide to mobile security best practices.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Delivering powerful data and systems security and maintaining performance levels</h3>

Delivering powerful data and systems security and maintaining performance levels

The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating. In this constantly evolving threat landscape, a single infected file can take your organization’s data center off-line, totally disabling mission-critical business processes.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Empowering Industrial Cyber Security</h3>

Empowering Industrial Cyber Security

Kaspersky Lab understands that each technology network has its specific features that, in most cases, are unique. Our industrial solution is fully customizable and works as a ‘construction set’ that can be tailored to specific customer needs and to fit unique challenges, demands and specific infrastructures.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Protecting your business against financial and reputational losses with Kaspersky DDoS Protection</h3>

Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

Find out how our solution seamlessly protects against the most complex DDoS attacks.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention Overview</h3>

Kaspersky Fraud Prevention Overview

Your bank’s online financial services are under threat. Hundreds of millions of dollars are at stake. Any security incident affecting your bank costs money and time – refunds and compensation payments are just the tip of the iceberg.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Clientless Engine Smarter Security – Better Digital Banking</h3>

Clientless Engine Smarter Security – Better Digital Banking

Find out how you can protect against complex fraud attacks, without compromising the relaxed, straightforward online banking experience that creates happy, loyal customers.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Fraud protection technology for endpoints</h3>

Fraud protection technology for endpoints

Find out how you can protect your customers and their devices from fraud.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Maintenance Service Agreement Leaflet</h3>

Maintenance Service Agreement Leaflet

Learn more about premium support options with Kaspersky Maintenance Service Agreement.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Achieving effective, efficient security for critical payment systems</h3>


Achieving effective, efficient security for critical payment systems

Embedded systems present specific security concerns. They are generally geographically scattered, they can be challenging to manage and they are rarely updated.

View PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.1 Mapping</h3>


PCI DSS v3.1 Mapping

PCI DSS 3.1 regulates many technical security requirements and settings for systems operating with credit card data. Sub-points 5.1, 5.1.1, 5.2, 5.3, 6.2 of PCI DSS v3.1 provide for the strict regulation of antivirus protection relating to any endpoint which is operating with Cardholder Details Data.

View PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention - Mobile Banking App Security</h3>

Kaspersky Fraud Prevention - Mobile Banking App Security

The mobile app has introduced a fundamental change to banking.

View PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Effective Learning Approach</h3>

Security Awareness

Effective Learning Approach

Most of cybersecurity awareness training programs are boring and irrelevant for employees and ineffective on the organizational level. What makes Kaspersky Lab approach actionable and effective?