All Research Sponsored By:Kaspersky

XDR or a Rift in the Multiverse? You Choose
PRODUCT OVERVIEW: Kaspersky's XDR provides a unified view to address advanced cyberthreats, speeding up detection and response. It boosts protection with automation and integration. Explore how XDR's consoles, playbooks, and threat intelligence enable quick investigations and lessen business impact in the Product Overview.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET

Kaspersky Extended Detection and Response
PRODUCT OVERVIEW: Kaspersky's XDR Expert offers complete visibility, correlation, and automation across endpoints, networks, and cloud against complex cyberthreats. The on-premises solution guarantees data sovereignty and provides open architecture for easy integration. Discover more in Kaspersky's full overview.
Posted: 18 Apr 2024 | Published: 18 Apr 2024

TOPICS:  .NET

Kaspersky Next EDR Optimum
PRODUCT OVERVIEW: Today’s hackers can buy cheap ready-built tools and attack anyone - stealing data, damaging infrastructure and demanding ever-growing level of ransom. In this paper, discover how Kaspersky Next EDR Optimum helps you identify, analyze and neutralize evasive threats with easy-to-use advanced detection.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  .NET

EDR isn’t a destination - it’s a journey
WHITE PAPER: EDR is essential for SMBs as threats evolve. It complements EPP by detecting and responding to sophisticated malware. Discover how EDR capabilities enhance protection against advanced threats. Kaspersky Next EDR Optimum provides improved visibility, swift response, and guided remediation. Delve into EDR options in the full paper.
Posted: 16 Apr 2024 | Published: 16 Apr 2024

TOPICS:  .NET

How сan threat intelligence be tailored to your organization?
WHITE PAPER: Threat intelligence (TI) that isn’t tailored to your organization isn’t real intelligence. So, how can you get TI that’s right for you? Find out in this e-book, which outlines the differences between intelligence and data, when and where to use TI, how to maximize the benefits of TI for your organization, and more.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET

How Is This Happening To Us?
PRODUCT OVERVIEW: You may not be aware of it, but your organization’s constantly evolving digital footprint can lead to a variety of security risks and vulnerabilities. So, take a moment to get a clearer picture of the potential threats resulting from your digital footprint – and what you can do to tackle them.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET

How is this happening to us?
INFOGRAPHIC: Dealing with phishing and scam URLs requires a thorough understanding of your footprint, through a combination of network reconnaissance, continuous dark web monitoring, and data leakages discovery. You can get all these capabilities and more with the Digital Footprint Intelligence service. Take a look now to learn more.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET

Threat hunting – what, why and how
EBOOK: While many organizations utilize cybersecurity solutions like endpoint protection platforms (EPPs), around 10% of cyberthreats are capable of bypassing these defenses. Read this e-book to understand how threat hunting can level up your business’s security posture in the face of these threats.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET

Threat Intelligence: Maximizing The Benefits
WHITE PAPER: While the uses and benefits of TI are many and varied, so are its sources, to the extent that trying to identify what will work best for your particular organization can be a challenge in itself. So, how can you ensure TI delivers the maximum benefits to your enterprise? Download this whitepaper to learn more.
Posted: 07 Dec 2023 | Published: 07 Dec 2023

TOPICS:  .NET

Is Your Use Of Threat Intelligence Up To Scratch?
RESOURCE: In under 10 minutes, Kaspersky’s easy online tool lets you assess your team’s capabilities against 15 key metrics like time to detect, triage and prioritizing incident response, and dealing with false positives - and get customized recommendations based on your responses. Check out this resource to learn more.
Posted: 06 Dec 2023 | Published: 06 Dec 2023

TOPICS:  .NET

Kaspersky Digital Footprint Intelligence
PRODUCT OVERVIEW: Dealing with phishing and scam URLs requires a thorough understanding of your footprint, through a combination of network reconnaissance, continuous dark web monitoring, and data leakages discovery. You can get all these capabilities and more with the Digital Footprint Intelligence service. Take a look now to learn more.
Posted: 06 Dec 2023 | Published: 06 Dec 2023

TOPICS:  .NET

People, Processes, Technology: Building A Successful Security Operations Center
WHITE PAPER: Security Operations Centers (SOCs) are an increasingly popular way for organizations to secure themselves by centralizing personnel, tools and expertise. However, building or expanding an existing SOC involves overcoming many complex challenges. Download this white paper to learn how to solve these problems on your way to building the future SOC.
Posted: 06 Dec 2023 | Published: 06 Dec 2023

TOPICS:  .NET

SMB Cybersecurity: The Need for Better Protection
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020


Remote Work Cybersecurity: Best Practices & Trends
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020


Kaspersky Lab’s COVID-19 Relief Initiatives
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020


Advanced Attacks are Catching On - Here's What you can Do
EGUIDE: In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.
Posted: 02 Nov 2016 | Published: 27 Oct 2016


Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
EGUIDE: Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
Posted: 01 Nov 2016 | Published: 27 Oct 2016


Cutting Complexity – Simplifying Security
WHITE PAPER: Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.
Posted: 10 Oct 2013 | Published: 17 Jan 2013


IT Security. Fighting the Silent Threat
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013


Webmail Forensics: Investigating Issues with Email Forwarding Security
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


Kaspersky Endpoint Security 8 for Windows
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011


Overcoming virtualization security risks: Best practices
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


Security For Virtualization: Finding the Right Balance
WHITE PAPER: While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.
Posted: 20 Feb 2012 | Published: 20 Feb 2012


The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget
WHITE PAPER: This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011


Take Back the Endpoint
WHITE PAPER: During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
Posted: 08 Feb 2011 | Published: 08 Feb 2011