Smartphones have many uses, from accessing phone and email systems, to gaining comprehensive access to contact databases. Kaspersky Endpoint Security for Smartphones is a new application from a product family based on a uniform set of world-class anti-malware and other core technologies.
The definitive report looking at business attitudes and opinions into IT securityThe 2012 Global IT Risk Report – Coping in the chaos? explores the attitudes and opinions of 3,300 IT leaders and looks at how the global IT community is reacting to today’s changing threat landscape and gives their predictions for the future
Tolly engineers evaluated Kaspersky’s Endpoint Security 8 for Windows and compared it to endpoint security suites from leading vendors like ESET, McAfee, Sophos, Symantec and Trend Micro. The research found that Kaspersky offers superior Web, device and application control compared to competitors.
Kaspersky Lab, a leading developer of secure content and threat management solutions, has officially been named a "Leader" in the Gartner Magic Quadrant for Endpoint Protection Platforms. In this report, Gartner analysts note that,
"Leaders demonstrate balanced progress and effort in all execution and vision categories. Their capabilities in advanced malware protection, data protection and/or management features raise the competitive bar for all products in the market, and they can change the course of the industry. A leading vendor isn't a default choice for every buyer, and clients should not assume that they must buy only from vendors in the Leaders quadrant. Some clients believe that Leaders are spreading their efforts too thinly and aren't pursuing clients' special needs."
It’s increasingly convenient to use credit and debit cards for online shopping, making hotel reservations, renting cars, and buying airline tickets online. This paper will discuss consumer safety and best practices when conducting online transactions. What you should do to protect yourself and avoid the pitfalls of online scams? What rules should you follow when shopping online or conducting other business with bank cards on the Internet?
Security considerations for the retailer involve the data center as well as the endpoint. From a security perspective the common theme is access to rich data. The endpoint, including the POS terminal, is often the easiest path to gain entry into a retailer’s network and data, and that’s where Payment Card Industry Data Security Standard (PCI DSS) requirements could fail. This paper focuses on endpoint security and why a comprehensive security solution is required.
The mobility of employees and company data present a growing challenge for most organizations. Keeping up with the resultant growth in corporate cybercrime is becoming more and more challenging with each passing day. As the number of mobile devices, social media sites and sheer volume of cybercriminals grows exponentially, so does the threat to organizations.
What’s worse, as a result, many IT departments have become accomplices to corporate cybercrime. This webinar discusses 10 ways that IT departments are enabling cybercriminals today, and offers ways to stop them, based on third-party research and analysis from Kaspersky Lab experts. How does your organization measure up to these all-too-common pitfalls?
It’s a war out there, a war against cybercriminals who have one goal in mind – making money by targeting a company’s endpoints. Today’s cybercriminals are perpetually after data that can be easily converted into profit or credentials that will allow them to transfer money directly from the company coffers.
In this interactive Webinar we’ll discuss the growing malware threat, how cybercriminals are targeting the endpoint, and how you can protect your endpoints from the ravages of cybercrime.