Kaspersky Lab Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Kaspersky Lab

Overview: Kaspersky Lab is the world's largest privately-held Internet Security company, providing comprehensive protection against all forms of IT threats such as viruses, spyware, hackers and spam.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Kaspersky Lab.
Research offered by Kaspersky Lab

Cutting Complexity – Simplifying Security by Kaspersky Lab. January 17, 2013 - Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.

  View Cutting Complexity – Simplifying Security research abstract

Drive-by Downloads--The Web Under Siege by Kaspersky Lab. August 19, 2009 - In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.

  View Drive-by Downloads--The Web Under Siege research abstract

Driving Down the Total Cost of Protection by Kaspersky Lab. November 11, 2010 - In recent years there has been an exponential growth in malware proliferation around the world. Over 30,000 new threats hit the wire each day, requiring more than 3,500 new malware signatures being released daily by anti-malware companies. Read this white paper to learn about Kaspersky's world class, yet affordable anti-malware protection systems.

  View Driving Down the Total Cost of Protection research abstract

Driving Down the Total Cost of Protection by Kaspersky Lab. May 11, 2011 - This white paper touches on a new malware protection system that was designed for today and tomorrow. It provides the best overall protection for all businesses and does this with the best total cost of protection available today.

  View Driving Down the Total Cost of Protection research abstract

Emerging Threats: The Changing Face of Email by Kaspersky Lab. August 19, 2009 - More than three years after the infamous declaration from Microsoft's Bill Gates that "spam will be solved" in 2009, unsolicited junk mail continues to bombard email servers, dumping malicious attachments, phishing lures and spam advertising for fake pharmaceuticals.

  View Emerging Threats: The Changing Face of Email research abstract

Hyper-Mobility meets Security in the corporate environment by Kaspersky Lab. November 04, 2011 - The use of mobile devices in the enterprise is on the rise as it enables employees to be more productive. But this new trend does not come without risk. View this paper now to explore the key threats of mobile device usage and discover how to ensure complete protection with Kaspersky Endpoint Security for Smartphone.

  View Hyper-Mobility meets Security in the corporate environment research abstract

IT Security. Fighting the Silent Threat by Kaspersky Lab. October 09, 2013 - Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

  View IT Security. Fighting the Silent Threat research abstract

Kaspersky Endpoint Security 8 for Windows by Kaspersky Lab. October 03, 2011 - Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.

  View Kaspersky Endpoint Security 8 for Windows research abstract

Malicious Code Detection Technologies by Kaspersky Lab. February 2008 - This white paper provides an overview of the evolving combat tactics used in the antivirus battle, giving both simplified explanations of technological approaches as well as a broad chronological perspective.

  View Malicious Code Detection Technologies research abstract

Overcoming virtualization security risks: Best practices by Kaspersky Lab. April 18, 2012 - Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.

  View Overcoming virtualization security risks: Best practices research abstract

Security For Virtualization: Finding the Right Balance by Kaspersky Lab. February 20, 2012 - While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.

  View Security For Virtualization: Finding the Right Balance research abstract

Take Back the Endpoint by Kaspersky Lab. February 08, 2011 - During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.

  View Take Back the Endpoint research abstract

Ten Ways the IT Department Enables Cybercrime by Kaspersky Lab. February 08, 2011 - In this paper to discover 10 ways IT departments are unknowingly supporting cybercrime. View now to explore these common pitfalls and gain key guidelines on how to prevent them.

  View Ten Ways the IT Department Enables Cybercrime research abstract

The Cybercrime Arms Race by Kaspersky Lab. February 18, 2008 - Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.

  View The Cybercrime Arms Race research abstract

The Hidden Security Threat -- When Ex-Employees Represent a Security Risk by Kaspersky Lab. August 19, 2009 - From the laid-off to the disgruntled, ex-employees with an axe to grind can make companies vulnerable to data theft. Kaspersky Lab security evangelist Ryan Naraine discusses the threat and offers practical advice to prevent data loss.

  View The Hidden Security Threat -- When Ex-Employees Represent a Security Risk research abstract

The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget by Kaspersky Lab. November 04, 2011 - This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.

  View The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget research abstract

Webmail Forensics: Investigating Issues with Email Forwarding Security by Kaspersky Lab. April 22, 2013 - This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.

  View Webmail Forensics: Investigating Issues with Email Forwarding Security research abstract

When Legitimate Sites Threaten Your Network by Kaspersky Lab. August 19, 2009 - Did you know that legitimate sites like BusinessWeek.com and MLB.com have been victimized by drive-by malware? This security brief discusses specific measures you can take to protect your business and defend against these attacks.

  View When Legitimate Sites Threaten Your Network research abstract

When Web 2.0 Becomes Security Risk 2.0 by Kaspersky Lab. August 19, 2009 - Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.

  View When Web 2.0 Becomes Security Risk 2.0 research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts