Kudelski Security-Ressourcen-Center
Willkommen in unserem Ressourcen-Center. Hier finden Sie Broschüren, Datenblätter und Videos zu unseren Services und Lösungen für Cybersicherheit. Sie können die Bibliothek nach Kategorie und Thema durchsuchen.

160 Results

Factsheets
MSS: Security Device Management
Extend the capabilities of your security team and realize the full value of your technology investments with expert device management by our Cyber Fusion Center.

Factsheets
MSS: Endpoint Detection and Response
The modern threat landscape continues to evolve and threat actors are no longer concentrating their efforts on an organization’s perimeter.

Referenzarchitektur, Research Reports
Endpoint Reference Architecture
As end users and their endpoints are the growing focus of advanced attacks, more than ever before, organizations need to get endpoint security right. This Endpoint Reference Architecture is based on years of experience in delivering endpoint protection solutions. The paper outlines a wide range of endpoint security activity and related technologies.

Webinare
Getting to Yes- C-Suite Strategies for the CISO
Join a conversation with security veteran Don Kleoppel and security and risk expert John Hellickson, about what helps and what hinders powerful executive presence.

Factsheets
Advisory Services: Threat, Vulnerability and Risk Management
Implement programs to build resilience against cyber attacks and receive emergency support in detecting, containing, and mitigating attacks.

Factsheets
Advisory Services: Incident Response and Cyber Resilience
Implement programs to build resilience against cyber attacks and receive emergency support in detecting, containing, and mitigating attacks.

Videos
Introducing Kudelski Security’s Cyber Fusion Center
Our award-winning Cyber Fusion Center (CFC) operates 24x7x365, powering our Managed Security Services (MSS), delivering what organizations need most: an ability to reduce the time it takes to detect threats.

Factsheets
R&D: Secure Communications – White Noise
Most organizations equip their workforce with mobile devices, enabling them to access information wherever they are and whenever they need it. Mobile computing has transformed the way we work, but the ever-increasing attack surface of mobile devices has also left organizations exposed to increased risk.