Research Library

Powered by

All Research Sponsored By:Kaspersky

  • Remediate Threats With Intelligence

    The number of security alerts analyzed each day in most cases exceeds the existing capacity of security teams. You need accurate and relevant threat intelligence prevent attacks. This data sheet discusses Kaspersky’s partnership with Microsoft Sentinel, which aims to help users extend their cyberthreat detection capabilities. Read on to learn more.

  • Threat hunting – what, why and how

    Take a look through this e-book for an introduction to modern threat hunting tools, and learn how a proactive, pre-emptive approach to threat management can help minimize harm and strengthen future security controls.

  • Kaspersky Endpoint Detection And Response Optimum

    Traditional anti-malware and anti-virus offerings can no longer handle the frequency and effectiveness of today’s attacks. Kaspersky’s endpoint detection and response (EDR) solution is designed to keep your endpoints safe with proactive monitoring that stops threats before they become attacks. Read this product overview to learn more.

  • 5 Aspects Of Data Protection You May Not Be Aware Of

    While many know that it is important, there are still many misconceptions surrounding data protection. This list provides 5 key aspects of data protection to expand your understanding and allow you to develop better data security within your organization. Unlock the 5 key aspects of data protection now by downloading the full paper.

  • Checklist: Ransomware Protection In The Age Of Flexible Working

    Endpoints are often the easiest attack surfaces available to hackers, and remote working practices have moved those endpoints outside the network perimeter--making it even harder to manage and mitigate threats. Explore this 6-point checklist for improving businesses’ defenses against ransomware at the network edge.

  • Top 15 Vulnerabilities, Ttps, Ransomware And How To Counter Them

    Every year, the tactics, techniques, and procedures (TTPs) used by cybercriminals continue to evolve. This infographic gives an overview of the 15 most prevalent vulnerabilities, as well as techniques for overcoming them. Download the full infographic to discover the full array of vulnerabilities and techniques threatening your security.

  • Edr Vs Mdr – What And When

    People learning about cybersecurity often struggle to differentiate EDR and MDR. This brief guide provides a comparison between EDR and MDR, explaining how both work, what the key differences are, and why cybersecurity professionals elect one over the other in any given situation. Download the full PDF to see how EDR and MDR compare.

  • How Can You Protect Against Threats You Can’t Detect?

    With security visibility at an all time low, cybercriminals are taking advantage and launching attacks that your systems can’t see. Kaspersky aims to overcome these difficulties with their Optimum Security offering, which further monitors your environments so you can stop the cyberthreats you can’t see. Read on to learn more.

  • Evaluating threat intelligence

    As complexity rises and the availability and sophistication of cyberthreats grows, cyberthreat intelligence allows for a more proactive approach. Read this white paper to find out what really matters when you’re searching for threat intelligence services.

  • Kaspersky Threat Intelligence

    Enterprises across all sectors are facing a shortage of the up to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. Open this datasheet to meet the tools and services made to help anticipate and protect against cyberthreats.

  • Building a Safer Future in Finance

    Tap into this paper to examine 8 key trends in the Financial Services landscape in 2021 and how cyber risks connected with these new trends can potentially damage customer trust.

  • SMB Cybersecurity: The Need for Better Protection

    Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.

  • Remote Work Cybersecurity: Best Practices & Trends

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

  • Kaspersky Lab’s COVID-19 Relief Initiatives

    Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.

  • Advanced Attacks are Catching On - Here's What you can Do

    In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.

  • Malware Analysis: How Some Strains 'Adapt' to Virtual Machines

    Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.

  • Cutting Complexity – Simplifying Security

    Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.

  • IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.

  • Kaspersky Endpoint Security 8 for Windows

    Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.

  • Overcoming virtualization security risks: Best practices

    Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.

  • Security For Virtualization: Finding the Right Balance

    While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.

  • The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget

    This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.

  • Take Back the Endpoint

    During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.

  • When Web 2.0 Becomes Security Risk 2.0

    Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.