Overslaan naar hoofdinhoud

Whitepapers

Lees meer over de nieuwste IT-beveiligingstechnologieën en -oplossingen van Kaspersky.

Whitepapers

Lees meer over de nieuwste IT-beveiligingstechnologieën en -oplossingen van Kaspersky Lab.

Enterprise oplossingen
Enterprise oplossingen
Het bedrijf beveiligen met Kaspersky Cybersecurity Services
Het bedrijf beveiligen met Kaspersky Cybersecurity Services
Cybersecurity Solutions
Machine learning en menselijke expertise
EDR - de zaak voor automatisering en vereenvoudiging
Kunnen endpointdetectie en -respons toegankelijker zijn?
Threat Management and Defense
Bescherming tegen geavanceerde dreigingen en beperking van de risico's van...
Data Center Security
Beveiliging voor uw private datacenter: de juiste aanpak
Cloud Security
Secure your Amazon Cloud with Kaspersky Cloud Security
Cloud Security
Kaspersky Security for Virtualization Integrated with VMware NSX
Cybersecurity Solutions
Kaspersky Security Network: Big Data-powered Security
Cybersecurity Services
SOC ondersteund door Kaspersky Lab
Cybersecurity Solutions
Aanvallen met exploits: van alledaagse dreigingen tot gerichte...
Endpoint Security
De beschermingstechnologieën van Kaspersky...
Endpoint Security
Het oplossen van knelpunten: beveiligingslekken dichten
GROTE BEDRIJVEN
CYBERBEVEILIGING VOOR DE FINANCIËLE DIENSTVERLENING:...
Financial Services Cybersecurity
PCI DSS 3.2 Mapping: endpoints en servers
Cyberbeveiliging voor de financiële dienstensector
PCI DSS v3.2-mapping: embedded systemen
BEVEILIGINGSGIDS PIN- EN POS-SYSTEMEN
Kaspersky Embedded Systems Security - Beveiligingsgids pin- en...
EMBEDDED SYSTEMS SECURITY
Kaspersky Embedded Systems Security: beveiliging van pinautomaten
EMBEDDED SYSTEMS SECURITY
Point of Threat or Point of Sale: Threats Targeting PoS Terminals
GROTE BEDRIJVEN
CYBERBEVEILIGING VOOR TELECOM: Bescherm uw bedrijf tegen financiële schade...
Industrial Cybersecurity
7 redenen om te kiezen voor KICS Assessment
Cloud Security
Cyberbeveiliging voor elektriciteitsinfrastructuur
Industrial Cybersecurity
KICS-training en bewustwording-sprogramma's
Industrial Cybersecurity
Kaspersky Industrial CyberSecurity: oplossingsoverzicht 2019
Fraud Prevention
Advanced technologies empowered by Machine Learning for real-time...
Fraud Prevention
Kaspersky Fraud Prevention for Mobile
Fraud Prevention
Proactive Account-based Fraud Protection for Web and Mobile Channels
SECURITY AWARENESS
Kaspersky Interactive Protection Simulation (KIPS)
Kaspersky Security Awareness
Cybersafety Management Games
Data Center Security
RAM-controle voor virtuele machines: wat u moet weten voor een effectieve cyberveiligheid
SECURITY FOR MICROSOFT OFFICE 365
Infographic over de geschiedenis van spam
SECURITY FOR MICROSOFT OFFICE 365
Kaspersky Security for Microsoft Office 365: infographic over de werking
SECURITY FOR MICROSOFT OFFICE 365
Brochure voor Kaspersky Security for Microsoft Office 365
APT Intelligence Reporting
Empowering National Cybersecurity Projects
Kaspersky Managed Detection and Response
Kaspersky Managed Detection and Response brochure
Endpoint Security
Geïntegreerde oplossingen voor endpointbeveiliging
Endpoint Security
Hoe machine learning en menselijke expertise optimaal samengaan
Endpoint Security
Machine learning en de toepassing ervan op malwaredetectie
Endpoint Security
De beschermingstechnologieën in Kaspersky Endpoint Security for...
Endpoint Security
Bescherm uzelf tegen exploits
ANTI TARGETED ATTACK
Geavanceerde beveiliging en dreigingsinformatie om het risico op doelgerichte...
CLOUDBEVEILIGING
Beveilig het NUTANIX-bedrijfsplatform in de cloud met Kaspersky...
CLOUDBEVEILIGING
RAM-controle voor virtuele machines: wat u moet weten voor effectieve cyberveiligheid
Compliance
Endpointbeveiliging en PCI DSS v3.2
COMPLIANCE
Embedded systemen en PCI DSS v3.2
Embedded Systems Security
Beveiliging van medische apparatuur
KASPERSKY SECURITY AWARENESS
Platform voor het trainen van medewerkersvaardigheden
CRYPTO EXCHANGE SECURITY
Manieren om cryptobeurzen te beveiligen met Kaspersky Crypto Exchange Security
Cybersecurity Services
Kaspersky for Security Operations Center
Embedded Systems Security
Challenges facing embedded systems security
Embedded Systems Security
Protection for Vending Machines
EMBEDDED SYSTEMS SECURITY
Kaspersky Embedded Systems Security: beveiliging van pinautomaten
EMBEDDED SYSTEMS SECURITY
Point of Threat or Point of Sale: Threats Targeting PoS Terminals
Cybersecurity Solutions
The road to making our products secure

Sources: Gartner Critical Capabilities for Endpoint Protection Platforms, Eric Ouellet & Ian McShane, 30 April 2018 | Forrester (2018): The Forrester Wave™: Endpoint Security Suites, Q2 2018, Chris Sherman & Salvatore Schiano, June 2018 | Forrester (2018): The Forrester Wave™: External Threat Intelligence Services, Q3 2018, Josh Zelonis, Sep 2018 | IDC MarketScape: Worldwide Mobile Threat Management Security Software 2017 Vendor Assessment, Doc #US42373417, Sep 2017 | Ovum Decision Matrix: Selecting an Endpoint Protection Solution, 2017–18, Dec 2017 | Radicati Endpoint Security - Market Quadrant 2017, Sara Radicati, Oct 2017 | KuppingerCole Leadership Compass Enterprise Endpoint Security: Anti-Malware Solutions, John Tolbert, Nov 2017 | Gartner Competitive Landscape: Operational Technology Security, Ruggero Contu, 29 October 2018. | IDC, Worldwide Endpoint Security Market Shares, 2017: A New Market Narrative Emerges, doc #US43791618, May 2018. | IDC MarketScape: Worldwide Mobile Threat Management Software 2018–2019 Vendor Assessment, Doc # US44521018, December 2018. | Forrester (2019): Forrester Now Tech: Security Awareness And Training Solutions, Q1 2019, Jinan Budge et al, Jan 2019

Disclaimers: GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.