Analytics
11/21/2012
11:39 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Kudelski Group Launches Kudelski Security

Offering consists of a set of services initially focusing on assisting companies to assess risk and vulnerabilities

Cheseaux, Switzerland, November 21st, 2012 -The Kudelski Group (SIX:KUD.S), the world's leading independent provider of media content protection and value-added service technology, announces today the launch of Kudelski Security, its new Cyber Security division.

"Having dealt with security for a few decades and having fought piracy on behalf of our customers for the last 20 years, we have developed an unmatched talent pool with a unique skillset that we want to leverage by offering a new protection paradigm to anyone exposed on the internet," said André Kudelski, CEO of the Kudelski Group. "In an increasingly connected world, companies, families, individuals are all targeted by the new cyber threats and action is needed now," he added.

Going beyond a pure technology security offering

"The purpose of Kudelski Security is to deliver tailored cyber security solutions and services to enterprises, financial institutions, government administrations and our media customers. Initial focus will be Europe, before expanding the offering worldwide, such as for our existing media customers," said Christophe Nicolas, SVP & Head of Kudelski Security.

The Kudelski Security offering consists of a set of services initially focusing on assisting companies to assess risk and vulnerabilities in order to ensure privacy and confidentiality of their data and analytics as they move their business processes and applications in a cloud dependent ecosystem. The offer will include monitoring the evolution of the threats and keeping consumer data secured, while access to data becomes more dynamic and mobile, through new consumer devices like smartphones and tablets.

Kudelski Security goes beyond a pure technology security offering by combining technological know-how and legal expertise, compliance, field investigation & crisis communication into a new type of global Cyber Alert Response Squad.

Kudelski Security's global reach and multi-disciplinary incident response is reinforced by strategic international partnerships.

The Kudelski Security core team is now counting 80 dedicated security experts with field-proven electronic defense and response capabilities and we plan to expand this team progressively. The Kudelski Security team has access to 1000+ security experts in other Kudelski Group divisions.

About Kudelski Security

Kudelski Security, a division of the Kudelski Group, is an innovative independent Swiss provider of tailored cyber security solutions and services to enterprises, financial institutions, government administrations and the media industry. Its team of cyber security professionals boasts extensive expertise in the delivery of end-to-end digital security solutions built upon real-life experiences in advanced threat detection, security assessments, asset and reputation protection, as well as piracy risk mitigation. Kudelski Security's global reach and multi-disciplinary incident response is reinforced by strategic international partnerships. Kudelski Security is headquartered in Cheseaux-sur-Lausanne, Switzerland. For more information visit: www.kudelskisecurity.com

About the Kudelski Group

The Kudelski Group (SIX: KUD.S) is a world leader in digital security and convergent media solutions for the delivery of digital and interactive content. Its technologies are used in a wide range of services and applications requiring access control and rights management to secure the revenue of content owners and service providers for digital television and interactive applications across broadcast, broadband and mobile delivery networks. The Kudelski Group is also a world technology leader in the area of access control and management of people or vehicles to sites and events. The Kudelski Group is headquartered in Cheseaux-sur-Lausanne, Switzerland. For more information, please visit www.nagra.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.