Analytics
8/10/2016
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Kudelski Security Expands Into U.S. Market to Address Demand for Advanced Cybersecurity Solutions

Swiss cybersecurity leader brings unmatched history of innovation, deep engineering expertise and a new solutions perspective to help defend against advanced threats, ongoing attacks

LAS VEGAS – August 2, 2016 – Kudelski Security, a Swiss-based company, today at Black Hat USA, announced the launch of its U.S. presence to meet growing market demand for cybersecurity solutions and managed services that can provide effective, ongoing protection against new and emerging threats. Building off its strong European reputation, the recent acquisition of Milestone Systems, a new U.S. headquarters in Phoenix, Arizona, and a leadership team drawn from the industry’s top cybersecurity firms, Kudelski Security enters the U.S. market with a strong Fortune 500 client base, unique combination of capabilities and a plan to change how clients work with solutions providers to design, deploy and manage cybersecurity solutions.  

Kudelski Security was established in Switzerland in 2012 as the cybersecurity division of the Kudelski Group (SIX:KUD.S), a world leader in digital security services and conditional access security solutions. Founded on a culture of innovation, a rigorous and deeply rooted engineering mindset, and decades of experience delivering security solutions to global enterprises, Kudelski Security now delivers comprehensive, end-to-end cybersecurity programs that include consulting, technology, managed services, training, technical support and custom innovation.  

"It's exciting to see Kudelski Security enter the U.S. market as a new type of cybersecurity solutions company,” said Mark Butler, enterprise information security officer at Fiserv. “A transformation is needed in how enterprise organizations partner with cyber solutions providers going forward, so a unique strategic approach to cyber is certainly welcomed."

Swiss heritage, global presence is the platform for cyber solutions, innovation and client trust

The high-quality engineering of Kudelski’s teams, proven R&D capabilities and a reputation as trusted advisors have established Kudelski Security as a cybersecurity leader in Europe. By combining these capabilities with its comprehensive portfolio of solutions, including advisory services, innovative threat intelligence technologies and managed security services, Kudelski Security is able to address the most complex client environments with a unique and unparalleled set of resources and expertise. 

“Building trust in a world of uncertainty is not easy. It requires a truly independent voice, deep expertise and a proven ability to deliver value over the long term,” said Rich Fennessy, chief executive officer of Kudelski Security. “Kudelski’s name is synonymous with these qualities as one of the world’s most security-conscious organizations.”

“Our approach leverages cybersecurity experts, great service and the world’s leading technologies, but our value is driven from an innovative model that helps create a customized security blueprint for clients to evaluate, improve and manage their security program. This modern maturity model approach, aligned with a company’s business context, has been missing in the industry,” added Fennessy.

The Kudelski Security strategy takes a programmatic approach with clients and incorporates the following key elements across its entire portfolio of cybersecurity solutions:

  • World-Class Advisory Services – Delivered through a comprehensive framework that maps, measures and prioritizes each client to a mature cybersecurity program, Kudelski Security not only evaluates the current threat and risk levels for each client, but provides the strategic and “how to” practical guidance clients need to effectively allocate resources and improve their overall security posture.
  • Best-of-Breed Technology Approach – With the support of an ecosystem of leading go-to-market technology partners and its consultative approach, Kudelski Security is in a unique position to impartially recommend best-of-breed technologies and solutions that best match a client’s technical and business requirements.
  • Next-Generation Managed Services / Cyber Fusion Center (CFC) – With centers in Switzerland and Phoenix, the CFC goes beyond 24/7 threat monitoring to contextualize specific threats and provide recommended next steps for clients to mitigate risk and block potential attacks. The managed service is unique in its ability to fuse intelligence gained from both internal and external sources, including the company’s community of partners, as well as the knowledge gained from the company’s in-house Advanced Labs and Innovation Center.
  • Innovation Center – Based in Switzerland, the Innovation Center explores solutions to complex new problems that will form the foundation for products and services that can be used to help clients stay ahead of the most advanced cybercriminals. A few of the recent innovations developed by Kudelski’s teams for clients include rapid stealth scanning tools and new threat analysis technologies.
  • Advanced Labs – Based in Switzerland, this state-of-the-art laboratory uses specialist and proprietary technology to respond to the most complex and unusual demands relating to patent protection, investigation, and hardware and software evaluation. Of particular interest is the company’s ability to provide silicon-level analysis of microchips and embedded devices to test for vulnerabilities and potential vectors of attack in increasingly connected IoT (internet of things) environments.

In addition to the acquisition of Milestone Systems (now renamed Kudelski Security), the company has assembled a rich and growing ecosystem of strategic technology partners, including F5 Networks, Palo Alto Networks, CrowdStrike, and others to help clients address their most complex security challenges with best-of-breed solutions.

The company is also focused on making investments in internally developing next-generation technologies and expanded service capabilities to support enterprise clients across key markets in the U.S. and abroad. This will include forging new strategic partnerships, additional acquisitions and the extensive recruiting of the industry’s best talent. 

The following industry executives commented on the Kudelski Security strategy for serving market needs:

F5 Networks
“Kudelski Security, through their international footprint, expansive cybersecurity expertise and exceptional reputation for innovation and customer commitment, will enhance the strong service excellence Milestone Systems established as an F5 Guardian Professional Services Partner. We look forward to working with Kudelski Security to expand opportunities for customers around the world to meet their enterprise IT security needs.”  

  • David Helfer, vice president, worldwide channel, F5 Networks

Palo Alto Networks
"There are powerful synergies between Palo Alto Networks and Kudelski Security, most notably a strong commitment to securing organizations against cyber threats and protecting against business risk. With Milestone Systems now integrated into Kudelski Security, the company offers greater capabilities to deliver highly relevant and innovative cybersecurity solutions.”

  • Mark Anderson, executive vice president, worldwide field operations, Palo Alto Networks

CrowdStrike
“CrowdStrike and Kudelski Security share a reputation for market leadership and innovative approaches to solving the dynamic security challenges organizations face today. Kudelski Security is an important addition to our Elevate Partner Program and ecosystem, as together we’re able to provide the comprehensive solutions and managed services that will not only help us meet market demand for next-generation endpoint protection and threat intelligence, but support client requirements as part of an integrated and fully scalable cybersecurity program.”

  • Scott Fuselier, vice president, worldwide sales and operations, CrowdStrike

BeyondTrust
“Something that is often missing in the solutions provider-client relationship is the development of a broad, long-term view of the client’s security posture. We are happy to hear about the security blueprint approach that Kudelski has developed. We welcome them to the U.S. cybersecurity market – and are happy to have their U.S. headquarters in our backyard of Phoenix as well.”

  • Kevin Hickey, chief executive officer, BeyondTrust

###

About Kudelski Security

Kudelski Security is the premier advisor and cybersecurity innovator for today’s most security-conscious organizations. Our long-term approach to client partnerships enables us to continuously evaluate their security posture to recommend solutions that reduce business risk, maintain compliance and increase overall security effectiveness. With clients that include Fortune 500 enterprises and government organizations in Europe and across the United States, we address the most complex environments through an unparalleled set of solution capabilities including advisory, technology, managed security services and custom innovation. For more information, visit www.kudelskisecurity.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.