Logo
05.02.2019

PDF

Fidelis Collector - Datasheet (English)

Metadata enables fast and accurate detection of advanced threats and data theft/loss – in real-time and retrospectively. Read Datasheet

Logo
12.12.2018

Link

Fidelis: Cobalt Group ThreadKit Update - Download report

Fidelis Threat Research analysts have discovered a new version of ThreadKit, malware notorious for its use by the cybercrime organization known as Cobalt Group. This report will provide analysis of a campaign, seen October 30th, utilizing the Cobalt Group malware frameworks....

Logo
04.12.2018

PDF

Nutzen und Grenzen einer NGFW - Reicht aber nicht!

NGFWs (Next Generation Firewalls) ersetzen zunehmen alte legacy Firewalls. Wie UTM (Unified Threat Management) Firewalls konsolidieren sie unterschiedliche Sicherheitsfunktionalitäten auf einer Plattform und erlauben damit ein einfacheres und konsistenteres Management des ...

Logo
27.11.2018

Link

It's Awfully Noisy Out There: Results of the 2018 SANS IR Survey (Report Download)

The past year has seen data breaches impact millions of citizens from both political and financial perspectives. Combined with enforcement of privacy rules and regulations, incident responders have been dealing with an incredible amount of noise. This report provides ...

Logo
27.11.2018

Link

Fidelis Network® Appliance Specifications

Learn about the different options for Fidelis Network and Collector for Revision I generation hardware.

Logo
02.11.2018

Link

10 Deployment Considerations for your Deception Strategy (White Paper)

Stay one step ahead- Read this e-book to learn about different deception deployment strategies. Download here: https://www.fidelissecurity.com/resources/whitepaper/10-deployment-considerations-your-deception-strategy

Logo
01.11.2018

Link

Network DLP Buyer's Guide (Whitepaper)

Mapping out data security features across an entire environment is no simple task. This guide explains what to look for in a Network DLP solution.

Logo
31.10.2018

Link

Fidelis Endpoint®: A Technical Deep Dive (Whitepaper)

Security teams lack complete, unified and automated endpoint detection and response technology. Fidelis Endpoint is designed to help solve this issue. Download here: https://www.fidelissecurity.com/resources/whitepaper/endpoint-technical-dive

Logo
25.10.2018

Link

The State of Threat Detection Report 2018 (Report)

New report from Fidelis Cybersecurity identifies that organizations want to threat hunt, but can’t due to lack of time, skills and visibility. Read the full report here: http://go.fidelissecurity.com/E0I0Z05BRqs0808Z3006w0c

Logo
24.10.2018

Link

4 Keys to Automating Threat Detection, Threat Hunting and Response (Whitepaper)

Automating elements of threat detection, threat hunting and response can speed up detection and response, reducing the impact of a threat. Read the White Paper

Logo
26.09.2018

Link

EXTEND YOUR NETWORK SECURITY TO MICROSOFT AZURE (Datasheet)

Organizations are increasingly embracing the benefits of the Cloud, but up until now native security monitoring for threats, compromise or data theft within cloud-based applications, workloads and databases has been difficult to achieve without the use of performance limiting ...

Logo
26.09.2018

Link

About the State of the SOC - About the State of the SOC (Download Report)

If your security operations team is overburdened and overwhelmed, you are not alone. Fidelis Cybersecurity recently commissioned former Forrester Research analyst, Dr. Chenxi Wang, to look into security operations challenges as well as opportunities for efficiency and (more here)

Logo
24.09.2018

PDF

Networks Threat Evaluation - Die kostenlose Bedrohungsanalyse (Datenblatt Deutsch)

Rote Gummibärchen finden ist leicht ;-) Wir zeigen Ihnen wie Sie schnell und effektiv Bedrohungen im Unternehmensnetzwerk erkennen und automatisiert abwehren können

Logo
24.09.2018

PDF

Fidelis Deception: Angreifer ködern, locken, binden und abwehren (Datenblatt Deutsch)

Fidelis Deception™ Die Chance, Angreifer zu erkennen, ohne nach ihnen zu suchen Prävention alleine reicht nicht mehr aus, Angreifer werden irgendwann in jedes Netz eindringen. Die Aufgabe lautet also, diese zu erkennen, bevor sie Schaden anrichten können. Cyberkriminelle sind....