White Papers

Read more about the latest IT security technologies and solutions from Kaspersky.

    <h3 xmlns="http://www.w3.org/1999/xhtml">Gartner, How to Prepare for Ransomware Attacks</h3>

    Gartner, How to Prepare for Ransomware Attacks

    Download Report
    <h3 xmlns="http://www.w3.org/1999/xhtml">Enterprise Solutions Catalogue</h3>

    Enterprise Solutions Catalogue

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Securing the Enterprise with Kaspersky Cybersecurity Services</h3>

    Securing the Enterprise with Kaspersky Cybersecurity Services

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Network: Big Data-powered Security</h3>

    Kaspersky Security Network: Big Data-powered Security

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Can Endpoint Detection and Response be more accessible?</h3>

    Can Endpoint Detection and Response be more accessible?

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">The road to making our products secure</h3>

    The road to making our products secure

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Protection for Logistics and Manufacturing</h3>

    Protection for Logistics and Manufacturing

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">How machine learning and human expertise can best work together</h3>

    How machine learning and human expertise can best work together

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning and its application to malware detection</h3>

    Machine Learning and its application to malware detection

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Fileless attacks against enterprise networks</h3>

    Fileless attacks against enterprise networks

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">The protection technologies in Kaspersky Endpoint Security for Business</h3>

    The protection technologies in Kaspersky Endpoint Security for Business

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Get protected from exploits</h3>

    Get protected from exploits

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Advanced protection and threat intelligence - mitigating the risk of targeted attacks</h3>

    Advanced protection and threat intelligence - mitigating the risk of targeted attacks

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Managed Detection and Response brochure</h3>

    Kaspersky Managed Detection and Response brochure

    View now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky for Security Operations Centers</h3>

    Kaspersky for Security Operations Centers

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Security for Your Private Data Center: Getting It Right</h3>

    Security for Your Private Data Center: Getting It Right

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Secure your Amazon cloud with Kaspersky Cloud Security solution</h3>

    Secure your Amazon cloud with Kaspersky Cloud Security solution

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Virtualization Integrated with VMware NSX platform</h3>

    Kaspersky Security for Virtualization Integrated with VMware NSX platform

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Secure the NUTANIX Enterprise Cloud Platform with Kaspersky Security for Virtualization</h3>

    Secure the NUTANIX Enterprise Cloud Platform with Kaspersky Security for Virtualization

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Virtual machine RAM Control: what you should know For effective cybersecurity</h3>

    Virtual machine RAM Control: what you should know For effective cybersecurity

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">SWIFT Security Controls Mapping</h3>

    SWIFT Security Controls Mapping

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Endpoint security and PCI DSS v3.2</h3>

    Endpoint security and PCI DSS v3.2

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Embedded systems and PCI DSS v3.2</h3>

    Embedded systems and PCI DSS v3.2

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">ATM and POS security guide</h3>

    ATM and POS security guide

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Challenges facing embedded systems security</h3>

    Challenges facing embedded systems security

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Protection for medical equipment</h3>

    Protection for medical equipment

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">In detail - our single integrated solution designed to secure organizations with finite IT security resources against advanced and targeted attacks</h3>

    In detail - our single integrated solution designed to secure organizations with finite IT security resources against advanced and...

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Protection for Vending Machines</h3>

    Protection for Vending Machines

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Embedded Systems Security – Safeguarding ATMs</h3>

    Kaspersky Embedded Systems Security – Safeguarding ATMs

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Point of Threat or Point of Sale: Threats Targeting PoS Terminals</h3>

    Point of Threat or Point of Sale: Threats Targeting PoS Terminals

    VIEW NOW
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Interactive Protection Simulation VR</h3>

    Kaspersky Interactive Protection Simulation VR

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">[Dis]connected: a casual educational game</h3>

    [Dis]connected: a casual educational game

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security Awareness Training Programs</h3>

    Kaspersky Security Awareness Training Programs

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Interactive Protection Simulation (KIPS)</h3>

    Kaspersky Interactive Protection Simulation (KIPS)

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Cybersafety Management Games</h3>

    Cybersafety Management Games

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Adaptive Online Training</h3>

    Kaspersky Adaptive Online Training

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Gamified Assessment Tool (GAT)</h3>

    Kaspersky Gamified Assessment Tool (GAT)

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Microsoft Office 365 how it works infographic</h3>

    Kaspersky Security for Microsoft Office 365 how it works infographic

    View now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Security for Microsoft Office 365 brochure</h3>

    Kaspersky Security for Microsoft Office 365 brochure

    View now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Protecting your business against financial and reputational losses with Kaspersky DDoS Protection</h3>

    Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">7 reasons to choose KICS Assessment</h3>

    7 reasons to choose KICS Assessment

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Cybersecurity for Electric Power Infrastructure</h3>

    Cybersecurity for Electric Power Infrastructure

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">KICS Training and Awareness Programs</h3>

    KICS Training and Awareness Programs

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Industrial Cybersecurity: solution overview 2019</h3>

    Kaspersky Industrial Cybersecurity: solution overview 2019

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection</h3>

    Advanced technologies empowered by Machine Learning for real-time cross-channel fraud detection

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Fraud Prevention for Mobile</h3>

    Kaspersky Fraud Prevention for Mobile

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Proactive Account-based Fraud Protection for Web and Mobile Channels</h3>

    Proactive Account-based Fraud Protection for Web and Mobile Channels

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Empowering National Cybersecurity Projects</h3>

    Empowering National Cybersecurity Projects

    View now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Token Offering Security</h3>

    KASPERSKY TOKEN OFFERING SECURITY

    Kaspersky Token Offering Security

    VIEW NOW
    <h3 xmlns="http://www.w3.org/1999/xhtml">Ways to tackle crypto-exchange security with Kaspersky</h3>

    Ways to tackle crypto-exchange security with Kaspersky

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning and Human Expertise</h3>

    Machine Learning and Human Expertise

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Machine Learning for Malware Detection</h3>

    Machine Learning for Malware Detection

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Advanced Protection and Threat Intelligence to Mitigate the Risk of Targeted Attacks</h3>

    Advanced Protection and Threat Intelligence to Mitigate the Risk of Targeted Attacks

    View Now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Secure NUTANIX Enterprise Cloud Platform with Kaspersky Security for Virtualization</h3>

    Secure NUTANIX Enterprise Cloud Platform with Kaspersky Security for Virtualization

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">The Protection Technologies of Kaspersky Endpoint Security for Business</h3>

    The Protection Technologies of Kaspersky Endpoint Security for Business

    view now
    
		<h3 xmlns="http://www.w3.org/1999/xhtml">Corking the Bottleneck: How To Block an Exploit</h3>

    Corking the Bottleneck: How To Block an Exploit

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Endpoints and Servers</h3>

    PCI DSS v3.2 Mapping: Endpoints and Servers

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">PCI DSS v3.2 Mapping: Embedded Systems</h3>

    PCI DSS v3.2 Mapping: Embedded Systems

    view now
    <h3 xmlns="http://www.w3.org/1999/xhtml">Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity</h3>

    Virtual Machines RAM Control: What You Better to Know For Effective Cybersecurity

    DOWNLOAD PDF
    <h3 xmlns="http://www.w3.org/1999/xhtml">Kaspersky Crypto Exchange Security</h3>

    KASPERSKY CRYPTO EXCHANGE SECURITY

    Kaspersky Crypto Exchange Security

    VIEW NOW
    <h3 xmlns="http://www.w3.org/1999/xhtml">AI under attack. How to Secure Machine Learning in Security Systems</h3>

    Cybersecurity solution

    AI under attack. How to Secure Machine Learning in Security Systems

    view now