Kudelski Security-Ressourcen-Center
Willkommen in unserem Ressourcen-Center. Hier finden Sie Broschüren, Datenblätter und Videos zu unseren Services und Lösungen für Cybersicherheit. Sie können die Bibliothek nach Kategorie und Thema durchsuchen.
166 Results
Research Reports
Kudelski Security Recognized as Leader in The Forrester Wave™: Midsize MSSPs, Q3 2020
The Forrester Wave evaluated and ranked 12 top midsize MSSPs based on current offerings, strategy and market presence. They identified Kudelski Security as a Wave Leader, awarding us the highest possible score in 12 of the 26 evaluation criteria.
Factsheets
Quantum Security Factsheet
Within the next few years, scalable quantum computing will likely disrupt information processing as we know it. New powerful algorithmic tools will be made possible by large quantum computers, facilitating quantum attacks on the basic cryptographic schemes that underpin all digital infrastructures and systems.
Videos, Webinare
Juniper MIST AI Contact Tracking Webcast
Download the webcast to learn how Mist's AI technology is helping businesses and campuses reopen safely.
Research Reports, Videos, Webinare
Are you ready for the era of quantum computing?
Quantum computing and security in a nutshell - what you need to know to be better prepared.
Videos, Webinare
Cloud Migration: A CISO’s Perspective Panel Discussion on How to Nail the Cloud
What's your cloud journey looking like? Get ideas for an even better approach to cloud migration and management.
Research Reports, Videos
Building the Future of Security Leadership
Read the report to understand the changing CISO roles and responsibilities and the strategic areas you should focus on to address the talent gap.
Videos, Webinare
How CISOs Gain Trust in the Boardroom – Webcast
Read the report to understand the changing CISO roles and responsibilities and the strategic areas you should focus on to address the talent gap.
Webinare
Office 365 Threat Landscape & Kill Chain
85% of Kudelski Security incident response engagements in 2019 involved Office 365 compromises. Download the webcast to learn about current Microsoft Office 365 compromise tactics across the attack kill chain.