All Research Sponsored By:Kaspersky

Kaspersky Threat Intelligence
DATA SHEET: Enterprises across all sectors are facing a shortage of the up to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. Open this datasheet to meet the tools and services made to help anticipate and protect against cyberthreats.
Posted: 25 Mar 2022 | Published: 25 Mar 2022

TOPICS:  .NET

Checklist: Ransomware protection in the age of flexible working
WHITE PAPER: Remote work—and the lack of proper oversite that goes with it—has led to an increase in ransomware. If you’re ready to take proactive steps to prevent ransomware, read this practical checklist to assess how well-protected you are against ransomware—and where you might need to improve your defenses.
Posted: 21 Mar 2022 | Published: 21 Mar 2022

TOPICS:  .NET

SMB Cybersecurity: The Need for Better Protection
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020


Remote Work Cybersecurity: Best Practices & Trends
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020


Kaspersky Lab’s COVID-19 Relief Initiatives
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020


Advanced Attacks are Catching On - Here's What you can Do
EGUIDE: In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.
Posted: 02 Nov 2016 | Published: 27 Oct 2016


Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
EGUIDE: Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
Posted: 01 Nov 2016 | Published: 27 Oct 2016


Cutting Complexity – Simplifying Security
WHITE PAPER: Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.
Posted: 10 Oct 2013 | Published: 17 Jan 2013


IT Security. Fighting the Silent Threat
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013


Webmail Forensics: Investigating Issues with Email Forwarding Security
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


Kaspersky Endpoint Security 8 for Windows
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011


Overcoming virtualization security risks: Best practices
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


Security For Virtualization: Finding the Right Balance
WHITE PAPER: While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.
Posted: 20 Feb 2012 | Published: 20 Feb 2012


The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget
WHITE PAPER: This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011


Take Back the Endpoint
WHITE PAPER: During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
Posted: 08 Feb 2011 | Published: 08 Feb 2011


When Web 2.0 Becomes Security Risk 2.0
WHITE PAPER: Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.
Posted: 19 Aug 2009 | Published: 19 Aug 2009


Drive-by Downloads--The Web Under Siege
WHITE PAPER: In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.
Posted: 19 Aug 2009 | Published: 19 Aug 2009


The Cybercrime Arms Race
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008


Kaspersky Internet Security 7.0
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007


Kaspersky Anti-Virus for Lotus Notes/Domino
PRODUCT LITERATURE: Kaspersky Anti-Virus integrates with the Lotus Notes/Domino server as an additional module, and scans in real-time mode all messages transmitted by the system.
Posted: 16 Sep 2004 | Published: 01 Sep 2004