Enterprise Security White Papers | Kaspersky Lab

White Papers

Read more about the latest IT security technologies and solutions from Kaspersky Lab.


		<h3 xmlns="http://www.w3.org/1999/xhtml">Integration with VMware NSX for even faster and automated protection</h3>

Kaspersky Security                 for Virtualization                 and VMware NSX

Integration with VMware NSX for even faster and automated protection

Native integration of Kaspersky Lab's solution with the VMware NSX platform means your virtual infrastructure has just became even more...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Enterprise Security Gets Adaptive</h3>

Enterprise Security Gets Adaptive

Advanced Persistent Threats (APTs), sophisticated malware and targeted attacks are just some of the new, constantly evolving threats the enterprise faces. A new, more adaptive, integrated approach built on the pillars of prediction, prevention...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Future risks: Be prepared</h3>

Future risks: Be prepared

Special report on mitigation strategies for advanced threats.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Captaining Data Center Security: Putting You at The Helm</h3>

Captaining Data Center Security: Putting You at The Helm

Running a data center involves a plethora of complex tasks, of which security is just one. But the security of virtual environments and data storage...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Be Ready for What’s Next</h3>

KASPERSKY LAB'S AUTOMATIC EXPLOIT PREVENTION TECHNOLOGY

Be Ready for What’s Next

Automatic Exploit Prevention technology specifically targets malware that exploits software vulnerabilities to gain a toehold on enterprise endpoints and networks. Even if a user downloads or opens a malicious file, AEP technology will prevent the malware from executing.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Virtualization Security: Understanding the difference</h3>

Virtualization Security: Understanding the difference

Learn more about Virtualization security approaches and differences between them.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Security of Virtual Infrastructure. IT Security Risks Special Report</h3>

Security of Virtual Infrastructure. IT Security Risks Special Report

Find out why the industry’s understanding of virtualization technology, especially virtual-specific security issues, is far from perfect.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Private Security Network: Global threat intelligence for local implementation</h3>

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE – INSIDE THE CORPORATE INFRASTRUCTURE

Kaspersky Private Security Network: Global threat intelligence for local implementation

It takes up to four hours for standard security solutions to receive the information needed to...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Your Guide to Mobile Security Best Practices</h3>

MOBILE SECURITY. BEST PRACTICES

Your Guide to Mobile Security Best Practices

What if you didn’t have to trade security and data breach protection for mobility, productivity and simplicity? Know how in this guide to mobile security best practices.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Delivering powerful data and systems security and maintaining performance levels</h3>

Delivering powerful data and systems security and maintaining performance levels

The volume and complexity of cyber-attacks targeting large enterprises and infrastructure...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Empowering Industrial Cyber Security</h3>

Empowering Industrial Cyber Security

Kaspersky Lab understands that each technology network has its specific features that, in most cases, are unique. Our industrial solution is fully customizable and works as a ‘construction set’ that can be tailored to specific customer needs and to...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Protecting your business against financial and reputational losses with Kaspersky DDoS Protection</h3>

Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

Find out how our solution seamlessly protects against the most complex DDoS attacks.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention Overview</h3>

Kaspersky Fraud Prevention Overview

Your bank’s online financial services are under threat. Hundreds of millions of dollars are at stake. Any security incident affecting your bank costs money and time – refunds and compensation payments are just the tip of the iceberg.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Clientless Engine Smarter Security – Better Digital Banking</h3>

Clientless Engine Smarter Security – Better Digital Banking

Find out how you can protect against complex fraud attacks, without compromising the relaxed, straightforward online banking experience that...

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Fraud protection technology for endpoints</h3>

Fraud protection technology for endpoints

Find out how you can protect your customers and their devices from fraud.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Maintenance Service Agreement Leaflet</h3>

Maintenance Service Agreement Leaflet

Learn more about premium support options with Kaspersky Maintenance Service Agreement.

View PDF

          <h3 xmlns="http://www.w3.org/1999/xhtml">Achieving effective, efficient security for critical payment systems</h3>

ATM AND POS SECURITY GUIDE

Achieving effective, efficient security for critical payment systems

Embedded systems present specific security concerns. They are generally geographically scattered, they can be challenging to manage and...

View PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.1 Mapping</h3>

KASPERSKY EMBEDDED SYSTEMS SECURITY

PCI DSS v3.1 Mapping

PCI DSS 3.1 regulates many technical security requirements and settings for systems operating with credit card data. Sub-points 5.1, 5.1.1, 5.2, 5.3, 6.2 of PCI DSS v3.1 provide for the strict regulation of antivirus protection relating to any endpoint which is operating with Cardholder Details Data.

View PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention - Mobile Banking App Security</h3>

Kaspersky Fraud Prevention - Mobile Banking App Security

The mobile app has introduced a fundamental change to banking.

View PDF