White Papers

Read more about the latest IT security technologies and solutions from Kaspersky Lab.

<h3 xmlns="http://www.w3.org/1999/xhtml">Enterprise Solutions Catalogue</h3>

Cybersecurity Solutions

Enterprise Solutions Catalogue

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Securing the Enterprise with Kaspersky Cybersecurity Services</h3>

Cybersecurity Services

Securing the Enterprise with Kaspersky Cybersecurity Services

view now

		<h3 xmlns="http://www.w3.org/1999/xhtml">Reality vs Delusion: A Guide to the Modern Threat Landscape</h3>

Cybersecurity Solutions

Reality vs Delusion: A Guide to the Modern Threat Landscape

view now

		<h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning and Human Expertise</h3>

Cybersecurity Solutions

Machine Learning and Human Expertise

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning for Malware Detection</h3>

Machine Learning for Malware Detection

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Advanced Threat Defense and Targeted Attack Risk Mitigation</h3>

Anti Targeted Attack

Advanced Threat Defense and Targeted Attack Risk Mitigation

View Now
<h3 xmlns="http://www.w3.org/1999/xhtml">Security for Your Private Data Center - Getting It Right</h3>

Data Center Security

Security for Your Private Data Center - Getting It Right

View Now
<h3 xmlns="http://www.w3.org/1999/xhtml">Secure your Amazon Cloud with Kaspersky Cloud Security</h3>

Cloud Security

Secure your Amazon Cloud with Kaspersky Cloud Security

Download PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Virtualization Integrated with VMware NSX</h3>

Cloud Security

Kaspersky Security for Virtualization Integrated with VMware NSX

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Network: Big Data-powered Security</h3>

Cybersecurity Solutions

Kaspersky Security Network: Big Data-powered Security

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">SOC powered by Kaspersky Lab</h3>

Cybersecurity Services

SOC powered by Kaspersky Lab

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Attacks with Exploits: From Everyday Threats to Targeted Campaigns</h3>

Cybersecurity Solutions

Attacks with Exploits: From Everyday Threats to Targeted Campaigns

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Fileless attacks against enterprise networks</h3>

Cybersecurity Solutions

Fileless attacks against enterprise networks

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">The Protection Technologies of Kaspersky Endpoint Security</h3>

Endpoint Security

The Protection Technologies of Kaspersky Endpoint Security

view now

		<h3 xmlns="http://www.w3.org/1999/xhtml">Corking the Bottleneck: How To Block an Exploit</h3>

Corking the Bottleneck: How To Block an Exploit

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">SWIFT Security Controls Mapping</h3>

Financial Services Cybersecurity

SWIFT Security Controls Mapping

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Endpoints and Servers</h3>

Financial Services Cybersecurity

PCI DSS v3.2 Mapping: Endpoints and Servers

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Embedded Systems</h3>

Financial Services Cybersecurity

PCI DSS v3.2 Mapping: Embedded Systems

view now

		<h3 xmlns="http://www.w3.org/1999/xhtml">ATM and POS security guide</h3>

Endpoint Security

ATM and POS security guide

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Embedded Systems Security – Safeguarding ATMs</h3>

Endpoint Security

Kaspersky Embedded Systems Security – Safeguarding ATMs

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Point of Threat or Point of Sale: Threats Targeting PoS Terminals</h3>

Endpoint Security

Point of Threat or Point of Sale: Threats Targeting PoS Terminals

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Protecting your business against financial and reputational losses with Kaspersky DDoS Protection</h3>

Telecom Cybersecurity

Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">7 reasons to choose KICS Assessment</h3>

Industrial Cybersecurity

7 reasons to choose KICS Assessment

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Cybersecurity for Electric Power Infrastructure</h3>

Industrial Cybersecurity

Cybersecurity for Electric Power Infrastructure

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">KICS Training and Awareness Programs</h3>

Industrial Cybersecurity

KICS Training and Awareness Programs

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Industrial Cybersecurity: solution overview 2018</h3>

Industrial Cybersecurity

Kaspersky Industrial Cybersecurity: solution overview 2018

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection</h3>

Fraud Prevention

Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention for Mobile</h3>

Fraud Prevention

Kaspersky Fraud Prevention for Mobile

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Proactive Account-based Fraud Protection for Web and Mobile Channels</h3>

Fraud Prevention

Proactive Account-based Fraud Protection for Web and Mobile Channels

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Interactive Protection Simulation (KIPS)</h3>

Kaspersky Security Awareness

Kaspersky Interactive Protection Simulation (KIPS)

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Cybersafety Management Games</h3>

Kaspersky Security Awareness

Cybersafety Management Games

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Employee Skills Training Platform</h3>

Kaspersky Security Awareness

Employee Skills Training Platform

view now
<h3 xmlns="http://www.w3.org/1999/xhtml">Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity</h3>

Data Center Security

Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity

DOWNLOAD PDF