All Research Sponsored By:Kaspersky

The Innovative Potential of XDR
EBOOK: XDR solutions offer vital benefits in threat detection, automated response, security visibility and streamlined operations. This research content provides an overview of XDR use cases, capabilities and challenges it can address. Read on to learn key considerations for comparing XDR vendors and solutions.
Posted: 20 Apr 2024 | Published: 20 Apr 2024

TOPICS:  .NET

XDR or a Rift in the Multiverse? You Choose
PRODUCT OVERVIEW: Kaspersky's XDR provides a unified view to address advanced cyberthreats, speeding up detection and response. It boosts protection with automation and integration. Explore how XDR's consoles, playbooks, and threat intelligence enable quick investigations and lessen business impact in the Product Overview.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET

Kaspersky Extended Detection and Response
PRODUCT OVERVIEW: Kaspersky's XDR Expert offers complete visibility, correlation, and automation across endpoints, networks, and cloud against complex cyberthreats. The on-premises solution guarantees data sovereignty and provides open architecture for easy integration. Discover more in Kaspersky's full overview.
Posted: 18 Apr 2024 | Published: 18 Apr 2024

TOPICS:  .NET

Kaspersky Next EDR Optimum
PRODUCT OVERVIEW: Today’s hackers can buy cheap ready-built tools and attack anyone - stealing data, damaging infrastructure and demanding ever-growing level of ransom. In this paper, discover how Kaspersky Next EDR Optimum helps you identify, analyze and neutralize evasive threats with easy-to-use advanced detection.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  .NET

EDR isn’t a destination - it’s a journey
WHITE PAPER: EDR is essential for SMBs as threats evolve. It complements EPP by detecting and responding to sophisticated malware. Discover how EDR capabilities enhance protection against advanced threats. Kaspersky Next EDR Optimum provides improved visibility, swift response, and guided remediation. Delve into EDR options in the full paper.
Posted: 16 Apr 2024 | Published: 16 Apr 2024

TOPICS:  .NET

Kaspersky Threat Data Feeds
PRODUCT OVERVIEW: Kaspersky Threat Data Feeds provide real-time intelligence against cyberthreats such as malware and phishing. They offer indicators like URLs, hashes, IPs, and YARA rules. Easily integrate with SIEM and NGFW for threat blocking and incident investigation. Discover how these Feeds boost detection in our Product Overview.
Posted: 27 Mar 2024 | Published: 27 Mar 2024

TOPICS:  .NET

Kaspersky Digital Footprint Intelligence
PRODUCT OVERVIEW: Kaspersky's Digital Footprint Intelligence monitors brand assets online and detects unauthorized use or fraud, protecting brand reputation and revenue. It detects fake websites, social media, apps, and more. Get full product overview from Kaspersky's threat intelligence experts.
Posted: 26 Mar 2024 | Published: 26 Mar 2024

TOPICS:  .NET

Threat Intelligence: what, when and how
EBOOK: Kaspersky white paper explores threat intelligence - what it is, why it matters, and how their solutions help implement it. Learn key concepts and see how TI transforms security operations. Read now to enhance prevention, detection, response and reporting.
Posted: 23 Mar 2024 | Published: 23 Mar 2024

TOPICS:  .NET

Kaspersky Expert Security Marketing TI DFI Video
VIDEO: As your business grows, it can get trickier to keep track of your digital presence across different IT environments, leaving you vulnerable to attack. In this video, get a sneak peek of how Kaspersky Threat Intelligence can help.
Posted: 22 Mar 2024 | Premiered: 22 Mar 2024

TOPICS:  .NET

Kaspersky Expert Security Marketing TI Video
VIDEO: In today’s complex, ever-changing cyberthreat environment, effective threat intelligence is becoming essential to get the first-move advantage on your adversaries. Watch this video to learn how Kaspersky Threat Intelligence can help you protect your business.
Posted: 21 Mar 2024 | Premiered: 21 Mar 2024

TOPICS:  .NET

Kaspersky Expert Security Marketing TI Threat Analysis Video
VIDEO: Effective investigation and timely response are key ingredients to effectively securing against complex cyber-incidents. Discover how Kaspersky’s Threat Analysis solution can instantly analyze incoming threats can quickly attribute them to known adversaries in this video.
Posted: 20 Mar 2024 | Premiered: 20 Mar 2024

TOPICS:  .NET

SMB Cybersecurity: The Need for Better Protection
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020


Remote Work Cybersecurity: Best Practices & Trends
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020


Kaspersky Lab’s COVID-19 Relief Initiatives
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020


Advanced Attacks are Catching On - Here's What you can Do
EGUIDE: In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.
Posted: 02 Nov 2016 | Published: 27 Oct 2016


Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
EGUIDE: Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
Posted: 01 Nov 2016 | Published: 27 Oct 2016


Cutting Complexity – Simplifying Security
WHITE PAPER: Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.
Posted: 10 Oct 2013 | Published: 17 Jan 2013


IT Security. Fighting the Silent Threat
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013


Webmail Forensics: Investigating Issues with Email Forwarding Security
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


Kaspersky Endpoint Security 8 for Windows
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011


Overcoming virtualization security risks: Best practices
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


Security For Virtualization: Finding the Right Balance
WHITE PAPER: While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.
Posted: 20 Feb 2012 | Published: 20 Feb 2012


The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget
WHITE PAPER: This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011


Take Back the Endpoint
WHITE PAPER: During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
Posted: 08 Feb 2011 | Published: 08 Feb 2011


When Web 2.0 Becomes Security Risk 2.0
WHITE PAPER: Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.
Posted: 19 Aug 2009 | Published: 19 Aug 2009