Cyber Security White Papers

Read more about the latest IT security technologies and solutions from Kaspersky Lab.


		<h3 xmlns="http://www.w3.org/1999/xhtml">Securing the Enterprise with Kaspersky Cybersecurity Solutions portfolio</h3>

Cybersecurity Solutions

Securing the Enterprise with Kaspersky Cybersecurity Solutions portfolio

View Now
<h3 xmlns="http://www.w3.org/1999/xhtml">Securing the Enterprise with Kaspersky Cybersecurity Services</h3>

Cybersecurity Services

Securing the Enterprise with Kaspersky Cybersecurity Services

View Now

		<h3 xmlns="http://www.w3.org/1999/xhtml">Reality vs Delusion: A Guide to the Modern Threat Landscape</h3>

Cybersecurity Solutions

Reality vs Delusion: A Guide to the Modern Threat Landscape

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning and Human Expertise</h3>

Cybersecurity Solutions

Machine Learning and Human Expertise

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning for Malware Detection</h3>

Machine Learning for Malware Detection

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Advanced Threat Defence and Targeted Attack Risk Mitigation</h3>

ANTI TARGETED ATTACK

Advanced Threat Defence and Targeted Attack Risk Mitigation

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Security for Your Private Data Center: Getting It Right</h3>

Data Center Security

Security for Your Private Data Center: Getting It Right

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Secure your Amazon Cloud with Kaspersky Cloud Security</h3>

Cloud Security

Secure your Amazon Cloud with Kaspersky Cloud Security

Download PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Virtualization Integrated with VMware NSX</h3>

Cloud Security

Kaspersky Security for Virtualization Integrated with VMware NSX

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Network: Big Data-powered Security</h3>

Cybersecurity Solutions

Kaspersky Security Network: Big Data-powered Security

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">SOC powered by Kaspersky Lab</h3>

Cybersecurity Services

SOC powered by Kaspersky Lab

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Attacks with Exploits: From Everyday Threats to Targeted Campaigns</h3>

Cybersecurity Solutions

Attacks with Exploits: From Everyday Threats to Targeted Campaigns

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Fileless attacks against enterprise networks</h3>

Cybersecurity Solutions

Fileless attacks against enterprise networks

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">The Protection Technologies of Kaspersky Endpoint Security</h3>

Endpoint Security

The Protection Technologies of Kaspersky Endpoint Security

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">Corking the Bottleneck: How To Block an Exploit</h3>

Corking the Bottleneck: How To Block an Exploit

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">SWIFT Security Controls Mapping</h3>

Financial Services Cybersecurity

SWIFT Security Controls Mapping

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Endpoints and Servers</h3>

Financial Services Cybersecurity

PCI DSS v3.2 Mapping: Endpoints and Servers

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Embedded Systems</h3>

Financial Services Cybersecurity

PCI DSS v3.2 Mapping: Embedded Systems

DOWNLOAD PDF

		<h3 xmlns="http://www.w3.org/1999/xhtml">ATM and POS security guide</h3>

Endpoint Security

ATM and POS security guide

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Embedded Systems Security – Safeguarding ATMs</h3>

Endpoint Security

Kaspersky Embedded Systems Security – Safeguarding ATMs

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Point of Threat or Point of Sale: Threats Targeting PoS Terminals</h3>

Endpoint Security

Point of Threat or Point of Sale: Threats Targeting PoS Terminals

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Protecting your business against financial and reputational losses with Kaspersky DDoS Protection</h3>

Telecom Cybersecurity

Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">7 reasons to choose KICS Assessment</h3>

Industrial Cybersecurity

7 reasons to choose KICS Assessment

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Cybersecurity for Electric Power Infrastructure</h3>

Industrial Cybersecurity

Cybersecurity for Electric Power Infrastructure

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">KICS Training and Awareness Programs</h3>

Industrial Cybersecurity

KICS Training and Awareness Programs

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Industrial CyberSecurity: solution overview 2017</h3>

Industrial Cybersecurity

Kaspersky Industrial CyberSecurity: solution overview 2017

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection</h3>

Fraud Prevention

Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention for Mobile</h3>

Fraud Prevention

Kaspersky Fraud Prevention for Mobile

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Proactive Account-based Fraud Protection for Web and Mobile Channels</h3>

Fraud Prevention

Proactive Account-based Fraud Protection for Web and Mobile Channels

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Interactive Protection Simulation (KIPS)</h3>

Kaspersky Security Awareness

Kaspersky Interactive Protection Simulation (KIPS)

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Cybersafety Management Games</h3>

Kaspersky Security Awareness

Cybersafety Management Games

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Employee Skills Training Platform</h3>

Kaspersky Security Awareness

Employee Skills Training Platform

DOWNLOAD PDF
<h3 xmlns="http://www.w3.org/1999/xhtml">Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity</h3>

Data Center Security

Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity

DOWNLOAD PDF

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

Accept and close