Cyber Security Data Sheets

Find out more detail on our Enterprise Security Solutions Portfolio.

    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Reduce the risk of targeted attacks and advanced threats</h3>

    Reduce the risk of targeted attacks and advanced threats

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">The leading multi-layered endpoint protection platform, based on true cybersecurity technologies</h3>

    The leading multi-layered endpoint protection platform, based on true cybersecurity technologies

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">All-in-one security designed for ATMs, Kiosks, Point of Sale systems</h3>

    All-in-one security designed for ATMs, Kiosks, Point of Sale systems

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Embedded Systems Security 2.0 Features list</h3>

    Kaspersky Embedded Systems Security 2.0 Features list

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Embedded Systems Security 2.0 What’s new</h3>

    Kaspersky Embedded Systems Security 2.0 What’s new

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Anti Targeted Attack Platform 2.0 What’s New</h3>

    Kaspersky Anti Targeted Attack Platform 2.0 What’s New

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">All-in-one security designed for Automated control (ICS) systems</h3>

    All-in-one security designed for Automated control (ICS) systems

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">All-in-one security designed for Medical Equipment</h3>

    All-in-one security designed for Medical Equipment

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">All-in-one security designed for Vending Machines</h3>

    All-in-one security designed for Vending Machines

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Real-time, cloud-assisted cybersecurity for privacy and compliance-restricted networks</h3>

    Real-time, cloud-assisted cybersecurity for privacy and compliance-restricted networks

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Superior, flexible and efficient protection for your virtual datacentre</h3>

    KASPERSKY SECURITY FOR VIRTUALIZATION

    Superior, flexible and efficient protection for your virtual datacentre

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Virtualization 4.0 New features</h3>

    Kaspersky Security for Virtualization 4.0 New features

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">High-performance protection integrated with the latest network-attached storage systems</h3>

    High-performance protection integrated with the latest network-attached storage systems

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Multilayered security, management and control for all mobile endpoints</h3>

    Multilayered security, management and control for all mobile endpoints

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Threat Intelligence Services gives you access to the intelligence you need to mitigate these threats, provided by our world-leading team of researchers and analysts.</h3>

    Kaspersky Threat Intelligence Services gives you access to the intelligence you need to mitigate these threats, provided by our world-leading team of researchers and analysts.

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Threat Hunting Services help to uncover advanced threats hiding within the organisation, using proactive threat hunting techniques carried out by highly qualified and experienced security professionals.</h3>

    Kaspersky Threat Hunting Services

    Kaspersky Threat Hunting Services help to uncover advanced threats hiding within the organisation, using proactive threat hunting techniques carried out by highly qualified and experienced security professionals.

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Trainings offer a broad curriculum in cybersecurity topics and techniques and assessment ranging from basic to expert</h3>

    Kaspersky Security Trainings offer a broad curriculum in cybersecurity topics and techniques and assessment ranging from basic to expert

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Incident Response Services cover the entire incident investigation cycle, from the onsite acquisition of evidence to the identification of additional indications of compromise, preparing a remediation plan and completely eliminating the threat to your organization</h3>

    Kaspersky Incident Response Services cover the entire incident investigation cycle, from the onsite acquisition of evidence to the identification of additional indications of compromise, preparing a remediation plan and completely eliminating the threat to your organization

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Assessment Services are the services of our in-house experts, many of them global authorities in their own right, whose knowledge and experience is fundamental to our reputation as world leaders in security intelligence</h3>

    Kaspersky Security Assessment Services are the services of our in-house experts, many of them global authorities in their own right, whose knowledge and experience is fundamental to our reputation as world leaders in security intelligence

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Total defense against all forms of DDoS attack to your infrastructure</h3>

    Total defense against all forms of DDoS attack to your infrastructure

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Training programs for all organisational levels</h3>

    Kaspersky Security Awareness

    Training programs for all organisational levels

    Download PDF

    We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

    Accept and close