Centre de ressources Kudelski Security
Bienvenue dans notre centre de ressources. Vous y trouverez des brochures, des fiches techniques et des vidéos sur nos services et solutions de cybersécurité. Recherchez dans la bibliothèque par sujet ou par catégorie.
19 Results
Webinars
Office 365 Threat Landscape & Kill Chain
85% of Kudelski Security incident response engagements in 2019 involved Office 365 compromises. Download the webcast to learn about current Microsoft Office 365 compromise tactics across the attack kill chain.
Webinars
NGINX On-Demand Technical Training Webcast
Kudelski Security and F5 Networks present an on-demand NGINX workshop consisting of presentation and live demo.
Webinars
Strategies for Visibility into Operational Technology (OT) Cybersecurity Webcast
Download the webcast to learn about cybersecurity strategies to improve visibility into your OT environments.
Webinars
Fortinet SD-WAN Recorded Workshop
As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies.
Webinars
Why Are the World’s Largest Networks Moving to Juniper + MIST?
With all the uncertainty in today’s world, it’s more important than ever to leverage AI to help simplify IT operations, lower costs and deliver a better wireless and wired experience.
Vidéos, Webinars
Critical Insights on Managed Security (Featuring Forrester)
In a climate where attacks are becoming more prevalent and sophisticated, insight and lessons learned from our guest Forrester will provide valuable and actionable advice.
Vidéos, Webinars
Secure Blueprint Webcast
Dave Woodward, Kudelski Security VP of US sales, walks us through our brand new cyber business management platform. At the end of this webcast, you'll have a better understanding of how Secure Blueprint can help you and your organization.
Webinars
Phish Proof Your People – Stop Credential Theft and Impostors
It’s easy for an attacker to steal a password, impersonate a valid user, and move undetected and uninterrupted – ultimately trying to get privileged network access. Let's stop that.