

Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem.
As a result, organizations are now faced with securing a multitude of applications, users, devices and infrastructures – all hosting sensitive data that is critical to business operations, reputation,...
Published: May 25, 2017


In this report, Kaspersky Lab’s cybersecurity experts give you an insight into:
• How businesses can suffer from direct – and indirect – cyber-espionage attacks
• What you can do to protect your business… and its hard-won reputation
• How specific technologies can...
Published: Feb 20, 2014


Virtualization is the simulation of software and/or a hardware platform that other software runs on. This simulated environment is a virtual machine (VM).
In full virtualization, one or more operating systems (OS) and their applications are run on top of the virtual hardware – each running as a “guest”...
Published: Apr 03, 2014


As companies embrace cloud services and encourage employee mobility, digital interactions with company resources have become more distributed and virtualized, blurring the traditional concept of the endpoint. Forrester Research surveyed 1000+ IT professionals to better understand how endpoint security challenges are changing...
Published: Aug 07, 2018


In today’s day of persistent and ongoing targeted attacks, the need to prevent and prepare for the eventuality of a security breach is of paramount importance.
More sophisticated threats, including targeted attacks, zero-day attacks and advanced persistent threats (APTs) are more commonplace and becoming harder...
Published: May 30, 2014


Within any business, there are a number of applications that are critical to its success. As a result, these applications and the systems they run on require a higher level of availability.
One of the most common methods used to increase the availability of a business-critical application in a physical environment...
Published: Jul 24, 2014


Despite attempts to pivot from outdated security methodologies, legacy antivirus continues to fail in preventing security breaches on the endpoint. Although AV satisfies many regulatory, governance and compliance requirements by layering on multiple products, it saddles organizations with hidden costs while providing questionable...
Published: May 03, 2017


Log management is an organizational requirement that extends beyond simple data collection. Today's compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Published: Jun 12, 2014


The 2018 cybersecurity reality is not favorable. The sophistication of cybermiscreants is growing rapidly.
A proliferation of security toolsets to combat the sophisticated cybermiscreants has resulted. The attack surface is larger; there are a growing number of environments and devices to protect as we witness...
Published: Feb 21, 2018


96% of all records breached are stolen from databases, according to a 2014 Verizon Data Breach Report. Why do databases have the highest rate of breaches among all business assets? The answer is simple: they house the sensitive business data that malicious insiders and hackers want most.
Published: Feb 01, 2015


Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit.
These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced...
Published: Sep 18, 2014


The attacks can and do hit organizations of all sizes and are only becoming more widespread and difficult to detect. The consumerization of IT and Bring Your Own Device (BYOD) only exacerbates the issue since companies now have many more endpoints to protect—many of which they don’t own.
In a survey of...
Published: Jul 18, 2013


At Kaspersky Lab, we know that businesses are under pressure and they all face the same key challenges to stay afloat: they need greater agility, better efficiency and improved productivity.
To help meet these challenges, companies are turning to IT to improve processes, deploy and support new systems and technology...
Published: Apr 03, 2014


Know your enemy! Establishing an effective defensive strategy and understanding cyber criminals attack techniques are crucial with today’s rapidly evolving cyberthreats.
The “2014 Cyberthreat Defense Report” looks to understand those techniques and how IT professionals can defend against them....
Published: Feb 19, 2014