Centre de ressources Kudelski Security
Bienvenue dans notre centre de ressources. Vous y trouverez des brochures, des fiches techniques et des vidéos sur nos services et solutions de cybersécurité. Recherchez dans la bibliothèque par sujet ou par catégorie.
170 Results
Factsheets
MSS: Endpoint Detection and Response
The modern threat landscape continues to evolve and threat actors are no longer concentrating their efforts on an organization’s perimeter.
Factsheets
MSS: Cyber Fusion Center
Improve your threat detection and response capabilities with contextual threat intelligence and predictive security.
Architecture de référence, Research Reports
Endpoint Reference Architecture
As end users and their endpoints are the growing focus of advanced attacks, more than ever before, organizations need to get endpoint security right. This Endpoint Reference Architecture is based on years of experience in delivering endpoint protection solutions. The paper outlines a wide range of endpoint security activity and related technologies.
Webinar, Webinars
Getting to Yes- C-Suite Strategies for the CISO
Join a conversation with security veteran Don Kleoppel and security and risk expert John Hellickson, about what helps and what hinders powerful executive presence.
Factsheets
Advisory Services: Threat, Vulnerability and Risk Management
Implement programs to build resilience against cyber attacks and receive emergency support in detecting, containing, and mitigating attacks.
Factsheets
Advisory Services: Incident Response and Cyber Resilience
Implement programs to build resilience against cyber attacks and receive emergency support in detecting, containing, and mitigating attacks.
Vidéos
Introducing Kudelski Security’s Cyber Fusion Center
Our award-winning Cyber Fusion Center (CFC) operates 24x7x365, powering our Managed Security Services (MSS), delivering what organizations need most: an ability to reduce the time it takes to detect threats.
Factsheets
R&D: Secure Communications – White Noise
Most organizations equip their workforce with mobile devices, enabling them to access information wherever they are and whenever they need it. Mobile computing has transformed the way we work, but the ever-increasing attack surface of mobile devices has also left organizations exposed to increased risk.