Cyber Security White Papers

Read more about the latest IT security technologies and solutions from Kaspersky Lab.

    <h3 xmlns="http://www.w3.org/1999/xhtml">Enterprise Solutions Catalogue</h3>

    Cybersecurity Solutions

    Enterprise Solutions Catalogue

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Securing the Enterprise with Kaspersky Cybersecurity Services</h3>

    Cybersecurity Services

    Securing the Enterprise with Kaspersky Cybersecurity Services

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Reality vs Delusion: A Guide to the Modern Threat Landscape</h3>

    Cybersecurity Solutions

    Reality vs Delusion: A Guide to the Modern Threat Landscape

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning and Human Expertise</h3>

    Cybersecurity Solutions

    Machine Learning and Human Expertise

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning for Malware Detection</h3>

    Machine Learning for Malware Detection

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Advanced Threat Defense and Targeted Attack Risk Mitigation</h3>

    Anti Targeted Attack

    Advanced Threat Defense and Targeted Attack Risk Mitigation

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Security for Your Private Data Center - Getting It Right</h3>

    Data Center Security

    Security for Your Private Data Center - Getting It Right

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Secure your Amazon Cloud with Kaspersky Cloud Security</h3>

    Cloud Security

    Secure your Amazon Cloud with Kaspersky Cloud Security

    View Now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Virtualization Integrated with VMware NSX</h3>

    Cloud Security

    Kaspersky Security for Virtualization Integrated with VMware NSX

    View Now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Network: Big Data-powered Security</h3>

    Cybersecurity Solutions

    Kaspersky Security Network: Big Data-powered Security

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">SOC powered by Kaspersky Lab</h3>

    Cybersecurity Services

    SOC powered by Kaspersky Lab

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Attacks with Exploits: From Everyday Threats to Targeted Campaigns</h3>

    Cybersecurity Solutions

    Attacks with Exploits: From Everyday Threats to Targeted Campaigns

    DOWNLOAD PDF
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Fileless attacks against enterprise networks</h3>

    Cybersecurity Solutions

    Fileless attacks against enterprise networks

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">The Protection Technologies of Kaspersky Endpoint Security</h3>

    Endpoint Security

    The Protection Technologies of Kaspersky Endpoint Security

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Corking the Bottleneck: How To Block an Exploit</h3>

    Corking the Bottleneck: How To Block an Exploit

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">SWIFT Security Controls Mapping</h3>

    Financial Services Cybersecurity

    SWIFT Security Controls Mapping

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Endpoints and Servers</h3>

    Financial Services Cybersecurity

    PCI DSS v3.2 Mapping: Endpoints and Servers

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Embedded Systems</h3>

    Financial Services Cybersecurity

    PCI DSS v3.2 Mapping: Embedded Systems

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">ATM and POS security guide</h3>

    Endpoint Security

    ATM and POS security guide

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Embedded Systems Security – Safeguarding ATMs</h3>

    Endpoint Security

    Kaspersky Embedded Systems Security – Safeguarding ATMs

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Point of Threat or Point of Sale: Threats Targeting PoS Terminals</h3>

    Endpoint Security

    Point of Threat or Point of Sale: Threats Targeting PoS Terminals

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Protecting your business against financial and reputational losses with Kaspersky DDoS Protection</h3>

    Telecom Cybersecurity

    Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">7 reasons to choose KICS Assessment</h3>

    Industrial Cybersecurity

    7 reasons to choose KICS Assessment

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Cybersecurity for Electric Power Infrastructure</h3>

    Industrial Cybersecurity

    Cybersecurity for Electric Power Infrastructure

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">KICS Training and Awareness Programs</h3>

    Industrial Cybersecurity

    KICS Training and Awareness Programs

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Industrial Cybersecurity: solution overview 2018</h3>

    Industrial Cybersecurity

    Kaspersky Industrial Cybersecurity: solution overview 2018

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection</h3>

    Fraud Prevention

    Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention for Mobile</h3>

    Fraud Prevention

    Kaspersky Fraud Prevention for Mobile

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Proactive Account-based Fraud Protection for Web and Mobile Channels</h3>

    Fraud Prevention

    Proactive Account-based Fraud Protection for Web and Mobile Channels

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Interactive Protection Simulation (KIPS)</h3>

    Kaspersky Security Awareness

    Kaspersky Interactive Protection Simulation (KIPS)

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Cybersafety Management Games</h3>

    Kaspersky Security Awareness

    Cybersafety Management Games

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Employee Skills Training Platform</h3>

    Kaspersky Security Awareness

    Employee Skills Training Platform

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity</h3>

    Data Center Security

    Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity

    DOWNLOAD PDF

    We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

    Accept and close