White Papers

Read more about the latest IT security technologies and solutions from Kaspersky Lab.

    <h3 xmlns="http://www.w3.org/1999/xhtml">Enterprise Solutions Catalogue</h3>

    Cybersecurity Solutions

    Enterprise Solutions Catalogue

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Securing the Enterprise with Kaspersky Cybersecurity Services</h3>

    Cybersecurity Services

    Securing the Enterprise with Kaspersky Cybersecurity Services

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Reality vs Delusion: A Guide to the Modern Threat Landscape</h3>

    Cybersecurity Solutions

    Reality vs Delusion: A Guide to the Modern Threat Landscape

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning and Human Expertise</h3>

    Cybersecurity Solutions

    Machine Learning and Human Expertise

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning for Malware Detection</h3>

    Machine Learning for Malware Detection

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Advanced Threat Defense and Targeted Attack Risk Mitigation</h3>

    Anti Targeted Attack

    Advanced Threat Defense and Targeted Attack Risk Mitigation

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Security for Your Private Data Center - Getting It Right</h3>

    Data Center Security

    Security for Your Private Data Center - Getting It Right

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Secure your Amazon Cloud with Kaspersky Cloud Security</h3>

    Cloud Security

    Secure your Amazon Cloud with Kaspersky Cloud Security

    Download PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Virtualization Integrated with VMware NSX</h3>

    Cloud Security

    Kaspersky Security for Virtualization Integrated with VMware NSX

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Network: Big Data-powered Security</h3>

    Cybersecurity Solutions

    Kaspersky Security Network: Big Data-powered Security

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">SOC powered by Kaspersky Lab</h3>

    Cybersecurity Services

    SOC powered by Kaspersky Lab

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Attacks with Exploits: From Everyday Threats to Targeted Campaigns</h3>

    Cybersecurity Solutions

    Attacks with Exploits: From Everyday Threats to Targeted Campaigns

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Fileless attacks against enterprise networks</h3>

    Cybersecurity Solutions

    Fileless attacks against enterprise networks

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">The Protection Technologies of Kaspersky Endpoint Security</h3>

    Endpoint Security

    The Protection Technologies of Kaspersky Endpoint Security

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Corking the Bottleneck: How To Block an Exploit</h3>

    Corking the Bottleneck: How To Block an Exploit

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">SWIFT Security Controls Mapping</h3>

    Financial Services Cybersecurity

    SWIFT Security Controls Mapping

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Endpoints and Servers</h3>

    Financial Services Cybersecurity

    PCI DSS v3.2 Mapping: Endpoints and Servers

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Embedded Systems</h3>

    Financial Services Cybersecurity

    PCI DSS v3.2 Mapping: Embedded Systems

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">ATM and POS security guide</h3>

    Endpoint Security

    ATM and POS security guide

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Embedded Systems Security – Safeguarding ATMs</h3>

    Endpoint Security

    Kaspersky Embedded Systems Security – Safeguarding ATMs

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Point of Threat or Point of Sale: Threats Targeting PoS Terminals</h3>

    Endpoint Security

    Point of Threat or Point of Sale: Threats Targeting PoS Terminals

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Protecting your business against financial and reputational losses with Kaspersky DDoS Protection</h3>

    Telecom Cybersecurity

    Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">7 reasons to choose KICS Assessment</h3>

    Industrial Cybersecurity

    7 reasons to choose KICS Assessment

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Cybersecurity for Electric Power Infrastructure</h3>

    Industrial Cybersecurity

    Cybersecurity for Electric Power Infrastructure

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">KICS Training and Awareness Programs</h3>

    Industrial Cybersecurity

    KICS Training and Awareness Programs

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Industrial Cybersecurity: solution overview 2018</h3>

    Industrial Cybersecurity

    Kaspersky Industrial Cybersecurity: solution overview 2018

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection</h3>

    Fraud Prevention

    Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention for Mobile</h3>

    Fraud Prevention

    Kaspersky Fraud Prevention for Mobile

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Proactive Account-based Fraud Protection for Web and Mobile Channels</h3>

    Fraud Prevention

    Proactive Account-based Fraud Protection for Web and Mobile Channels

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Interactive Protection Simulation (KIPS)</h3>

    Kaspersky Security Awareness

    Kaspersky Interactive Protection Simulation (KIPS)

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Cybersafety Management Games</h3>

    Kaspersky Security Awareness

    Cybersafety Management Games

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Employee Skills Training Platform</h3>

    Kaspersky Security Awareness

    Employee Skills Training Platform

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity</h3>

    Data Center Security

    Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity

    DOWNLOAD PDF