ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Kaspersky Lab

  • SMB Cybersecurity: The Need for Better Protection

    Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.

  • Remote Work Cybersecurity: Best Practices & Trends

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

  • Kaspersky Lab’s COVID-19 Relief Initiatives

    Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.

  • Light Agent or Agentless

    Virtual environments require a cybersecurity approach that goes beyond the scope of traditional systems. Download this features guide for an in-depth look at Kaspersky Security for Virtualization, an advanced network protection offering designed to improve threat detection speeds while offering the scalability needed for modern environments.

  • Cloud Security: The Optimal Response to Multi-Site Challenges

    In this case study, follow AMISEP, a community development association, as they partner with Kaspersky to implement Endpoint Security Cloud in order to unify, monitor and protect their growing number of distributed endpoints.

  • The Evolving Role of SaaS and IT Outsourcing in SMB IT Security

    For SMBs, getting the maximum use out of every resource is critical to long term success and profitability. However, SMBs are not immune to the security risks that come from embracing evolving IT capabilities. Download this white paper to learn more about the security challenges, threats and opportunities as they relate to SMBs.

  • Kaspersky Security Network: Big Data-powered Security

    The need for immediate protection against cyber threats is obvious, even to people who are not directly involved with information security. In this data sheet, learn about Kaspersky Security Network, cloud-based protection that combats even the most complex threats and how it can protect your business.

  • Is There A Revolution in IT Security ...Or Is It Just Wishful Thinking?

    In a recent survey of 5,500 companies across 26 countries, 90% admitted to suffering a security incident, and 46% had lost sensitive data due to a threat. Selecting the right security tool that fits your business needs is a critical process. Download this guide to learn how assess security solutions and separate fact from hype.

  • Cyber Security for Business – Counting the Costs, Finding the Value

    “Do more with less” is something of a mantra for IT and security professionals, who are tasked with maximizing the efficiency of their resources at the lowest possible cost. So, how can this mentality be applied without sacrificing the performance of a cybersecurity tool? Read this white paper to find out.

  • Cloud Workload Security, Q4 2019

    The increasingly adoption of cloud technologies emphasizes the corresponding need for cloud security. In this Forrester Wave report, discover what to look for in a cloud workload security provider by evaluating and comparing 13 providers in order to equip potential customers with a comprehensive guide of what to look for in a partner.

  • Advanced Attacks are Catching On - Here's What you can Do

    In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.

  • Malware Analysis: How Some Strains 'Adapt' to Virtual Machines

    Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.

  • Cutting Complexity – Simplifying Security

    Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.

  • IT Security. Fighting the Silent Threat

    Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.

  • Kaspersky Endpoint Security 8 for Windows

    Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.

  • Overcoming virtualization security risks: Best practices

    Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.

  • Security For Virtualization: Finding the Right Balance

    While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.

  • The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget

    This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.

  • Take Back the Endpoint

    During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.

  • When Web 2.0 Becomes Security Risk 2.0

    Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.

  • Drive-by Downloads--The Web Under Siege

    In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.

  • The Cybercrime Arms Race

    Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.

  • Kaspersky Internet Security 7.0

    Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.

  • Kaspersky Anti-Virus for Lotus Notes/Domino

    Kaspersky Anti-Virus integrates with the Lotus Notes/Domino server as an additional module, and scans in real-time mode all messages transmitted by the system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.