Centre de ressources Kudelski Security
Bienvenue dans notre centre de ressources. Vous y trouverez des brochures, des fiches techniques et des vidéos sur nos services et solutions de cybersécurité. Recherchez dans la bibliothèque par sujet ou par catégorie.
![](/wp-content/uploads/chevron-right-1-1.png)
167 Results
![](https://kudelskisecurity.com/wp-content/uploads/00-Webinar-scaled.jpeg)
Webinar, Webinars
Phish Proof Your People – Stop Credential Theft and Impostors
It’s easy for an attacker to steal a password, impersonate a valid user, and move undetected and uninterrupted – ultimately trying to get privileged network access. Let's stop that.
![](https://kudelskisecurity.com/wp-content/uploads/33-WannaCry-Webcast.png)
Webinar, Webinars
WannaCry Webcast
The number of individuals, organizations and countries affected by the current malware attack is growing at an alarming rate. After the initial infection is executed, no user intervention at all is required for the malware to spread.
![Kudelski Security and LogRhythm - Complete Security Protection](https://kudelskisecurity.com/wp-content/uploads/00-Fact-Sheet.jpeg)
Factsheets
MSS: Threat Monitoring
Detect security incidents faster with 24x7x365, intelligence-infused threat monitoring and analysis from our Cyber Fusion Center.
![Kudelski Security and LogRhythm - Complete Security Protection](https://kudelskisecurity.com/wp-content/uploads/00-Fact-Sheet.jpeg)
Factsheets
MSS: Security Device Support
Leverage Kudelski Security’s experts to resolve device issues quickly and more efficiently in order to ensure optimal device health and performance.
![Kudelski Security and LogRhythm - Complete Security Protection](https://kudelskisecurity.com/wp-content/uploads/00-Fact-Sheet.jpeg)
Factsheets
MSS: Security Device Management
Extend the capabilities of your security team and realize the full value of your technology investments with expert device management by our Cyber Fusion Center.
![Kudelski Security and LogRhythm - Complete Security Protection](https://kudelskisecurity.com/wp-content/uploads/00-Fact-Sheet.jpeg)
Factsheets
MSS: Endpoint Detection and Response
The modern threat landscape continues to evolve and threat actors are no longer concentrating their efforts on an organization’s perimeter.
![Kudelski Security and LogRhythm - Complete Security Protection](https://kudelskisecurity.com/wp-content/uploads/00-Fact-Sheet.jpeg)
Factsheets
MSS: Cyber Fusion Center
Improve your threat detection and response capabilities with contextual threat intelligence and predictive security.
![](https://kudelskisecurity.com/wp-content/uploads/34-Endpoint-Reference-Architecture.png)
Architecture de référence, Research Reports
Endpoint Reference Architecture
As end users and their endpoints are the growing focus of advanced attacks, more than ever before, organizations need to get endpoint security right. This Endpoint Reference Architecture is based on years of experience in delivering endpoint protection solutions. The paper outlines a wide range of endpoint security activity and related technologies.