Kudelski Security
A radical approach to managed security
Overview
HQ Location
Switzerland
|
Year Founded
1951
|
Company Type
Public
|
Revenue
$100m-1b
|
Employees
201 - 1,000
|
Website
|
Stock Ticker
SWX: KUD
|
Twitter Handle
|
Company Description
Our European-based labs have been providing specialist expertise in digital device and chip technology for over 20 years. This experience enables us to support our clients’ embedded security assessment needs and protect their bottom line before, during and after product launch.
We provide a tailored, specialized range of services from security evaluations and Penetration Testing to digital forensic investigations and patent infringement analysis.
We provide a tailored, specialized range of services from security evaluations and Penetration Testing to digital forensic investigations and patent infringement analysis.
IoT Solutions
IOT SECURITY CENTER OF EXCELLENCE
The Internet of Things is exploding, with an anticipated 25 billion devices connected by 2020. While IoT has changed the way businesses, governments and consumers interact with the world, concerns are mounting over security issues. IoT devices are increasingly used as a vector for large-scale attacks as well as being targeted for the valuable data they contain. Kudelski Security partners with IoT manufacturers and integrators through the IoT Security Center of Excellence, to help them answer their security challenges. We take an end-to-end approach to the security of IoT devices and their ecosystems, covering security at all stages of the lifecycle, from design to post launch.
SECURITY EVALUATIONS AND CERTIFICATIONS
Our in-depth security evaluations help identify core weaknesses in your products at both silicon and Firmware level, assessing their impact to ensure that your solution reaches its required security level. Such a pro-active approach helps to prolong the lifecycle of your product once it is released to market and can increase your confidence in successful accreditation by certification bodies.
INTELLECTUAL PROPERTY ANALYSIS
Our service helps ensure that at each stage of your product lifecycle, your investments are protected. We use proprietary technology in addition to industry-standards tools to investigate illegal use of your IP on other electronic devices and systems, by localizing and analyzing the implementation of patented mechanisms.
DIGITAL FORENSIC INVESTIGATION
We can conduct forensic investigation and analysis on almost all digital devices, including non-standard, obsolete, tampered and broken systems, enabling you to recover data that is lost by accident or deliberately destroyed. Our teams are capable of supporting clients through the whole forensics chain – from evidence collection to providing expert witness in a court of law.
The Internet of Things is exploding, with an anticipated 25 billion devices connected by 2020. While IoT has changed the way businesses, governments and consumers interact with the world, concerns are mounting over security issues. IoT devices are increasingly used as a vector for large-scale attacks as well as being targeted for the valuable data they contain. Kudelski Security partners with IoT manufacturers and integrators through the IoT Security Center of Excellence, to help them answer their security challenges. We take an end-to-end approach to the security of IoT devices and their ecosystems, covering security at all stages of the lifecycle, from design to post launch.
SECURITY EVALUATIONS AND CERTIFICATIONS
Our in-depth security evaluations help identify core weaknesses in your products at both silicon and Firmware level, assessing their impact to ensure that your solution reaches its required security level. Such a pro-active approach helps to prolong the lifecycle of your product once it is released to market and can increase your confidence in successful accreditation by certification bodies.
INTELLECTUAL PROPERTY ANALYSIS
Our service helps ensure that at each stage of your product lifecycle, your investments are protected. We use proprietary technology in addition to industry-standards tools to investigate illegal use of your IP on other electronic devices and systems, by localizing and analyzing the implementation of patented mechanisms.
DIGITAL FORENSIC INVESTIGATION
We can conduct forensic investigation and analysis on almost all digital devices, including non-standard, obsolete, tampered and broken systems, enabling you to recover data that is lost by accident or deliberately destroyed. Our teams are capable of supporting clients through the whole forensics chain – from evidence collection to providing expert witness in a court of law.
Key Customers
Texas government
IoT Snapshot
Kudelski Security is a provider of Industrial IoT platform as a service (paas), and cybersecurity and privacy technologies.
Technology Stack
Kudelski Security’s Technology Stack maps Kudelski Security’s participation in the platform as a service (paas), and cybersecurity and privacy IoT Technology stack.
-
Devices Layer
-
Edge Layer
-
Cloud Layer
-
Application Layer
-
Supporting Technologies
Technological Capability:
None
Minor
Moderate
Strong
Supplier missing?
Start adding your own!
Register with your work email and create a new supplier profile for your business.
Similar Suppliers.
Supplier
VMware (DELL) (Dell Technologies)
VMware is the global leader in virtualization solutions from the desktop to the data center—bringing Cloud Computing to businesses of all sizes. Customers rely on VMware to reduce capital and operating expenses, ensure business continuity, strengthen security, and "go green."
Supplier
Software AG
Software AG's products help companies combine existing systems On-Premise and in the cloud into a single platform to optimize and digitize their businesses. The combination of process management, data integration and real-time analytics in one Digital Business Platform enables customers to drive operational efficiency, modernize their systems and optimize processes for smarter decision-making. Software AG specializes in business process management software, including XML-based database applications and enterprise software, transactional databases, and applications development. The company's customers use its products to link and manage a wide variety of IT assets, including business software, servers, databases, mobile devices, and PCs. Services include consulting, maintenance, and training.
Supplier
Keyfactor
Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale.
Supplier
ST Engineering
ST Engineering (STE) is an integrated engineering group inthe aerospace, electronics, land systems and marine sectors.ST Engineering was formed in 1997 and we are today one of Asia's largest defence and engineering groups. We are among the largest companies listed on the Singapore Exchange, and a component stock of the FTSE Straits Times Index and MSCI Singapore. A leader in each of our sectors of business, they offer integrated and advanced solutions for customers across multiple industries.
Partners.
Supplier
Cisco
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the Internet. Over the last 30 plus years, they have been the world’s leader in connecting people, things, and technologies - to each other and to the Internet - realizing their vision of changing the way the world works, lives, plays, and learns.Today, Cisco has over 70,000 employees in over 400 offices worldwide who design, produce, sell, and deliver integrated products, services, and solutions. Over time, they have expanded to new markets that are a natural extension of their core networking business, as the network has become the platform for automating, orchestrating, integrating, and delivering an ever-increasing array of information technology (IT)–based products and services.Subsidiaries/ Business Units: - Jasper - OpenDNS - CloudLock
Supplier
VMware (DELL) (Dell Technologies)
VMware is the global leader in virtualization solutions from the desktop to the data center—bringing Cloud Computing to businesses of all sizes. Customers rely on VMware to reduce capital and operating expenses, ensure business continuity, strengthen security, and "go green."
Supplier
RSA (DELL) (Dell Technologies)
RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and Network Security company. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Len Adleman, after whom the RSA public key Cryptography algorithm was also named. Among its products include the RSA BSAFE Cryptography libraries and the SecurID Authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference. Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$2.1 billion and operates as a division within EMC. RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices. Year founded: 1982 Stock ticker: RSA
Supplier
Infoblox
Infoblox helps customers control their networks. Our solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.Our technology enables automatic discovery, real-time configuration and change management and compliance for network infrastructure, as well as critical network control functions such as DNS, DHCP and IP Address Management (IPAM) for applications and Endpoint devices. Leveraging our patented Grid™ technology, Infoblox delivers higher availability, and an authoritative network database for real-time and historical reporting. As the market leader in Automated Network Control, Infoblox provides services and solutions to over 6,700 enterprises and service providers in more than 25 countries. Our integrated hardware and software solutions help businesses control data flow on their networks by making them more automated, more available and more secure; giving customers the ability to see what's connected to the network, configure and change what's there, and prevent Malware from spreading across the enterprise.
Supplier
Juniper Networks
Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world.
Supplier
Aruba Networks (Hewlett Packard Enterprise (HPE))
Aruba, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise. The company designs and delivers Mobility-Defined Networks that empower IT departments and GenMobile, a new generation of tech-savvy users who rely on their mobile devices for every aspect of work and personal communication. To create a mobility experience that GenMobile and IT can rely upon, Aruba Mobility-Defined Networks automate infrastructure-wide performance optimization and trigger security actions that used to require manual IT intervention. The results are dramatically improved productivity and lower operational costs.