I'm Under Attack
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group

MDR ONE Resolute

Technology
Integration Partners

mdr one resolute card 3d - Kudelski Security
Endpoint & EDRCloud Security InfrastructureIdentity & Asset ManagementEmail SecurityNetwork SecurityThreat IntelligenceWorkflow & ResponseOther

Endpoint & EDR

Endpoint & EDR
Cisco Secure Endpoint (AMP)
Endpoint & EDR
CrowdStrike
Endpoint & EDR
Cybereason
Endpoint & EDR
Jamf
Endpoint & EDR
Linux Auditd
Endpoint & EDR
Microsoft Defender for Endpoint
Endpoint & EDR
Microsoft InTune
Endpoint & EDR
OSQuery
Endpoint & EDR
SentinelOne
Endpoint & EDR
Sophos
Endpoint & EDR
Symantec
Endpoint & EDR
VMware Carbon Black
Endpoint & EDR
VMware Workspace ONE

Cloud security Infrastructure

Cloud security Infrastructure
AWS
Cloud security Infrastructure
Alibaba Cloud
Cloud security Infrastructure
Aqua
Cloud security Infrastructure
Aviatrix
Cloud security Infrastructure
Cyera
Cloud security Infrastructure
Google Cloud Platform
Cloud security Infrastructure
Lacework
Cloud security Infrastructure
McAfee MVISION Cloud
Cloud security Infrastructure
Microsoft Azure
Cloud security Infrastructure
Orca
Cloud security Infrastructure
Prisma Cloud
Cloud security Infrastructure
Qualys
Cloud security Infrastructure
Skyhigh Security
Cloud security Infrastructure
Solarwinds Orion
Cloud security Infrastructure
Sysdig
Cloud security Infrastructure
Wiz

Identity & Asset Management

Identity & Asset Management
1Password
Identity & Asset Management
Auth0
Identity & Asset Management
BeyondTrust
Identity & Asset Management
CyberArk
Identity & Asset Management
Duo
Identity & Asset Management
Jumpcloud
Identity & Asset Management
LastPass
Identity & Asset Management
Okta
Identity & Asset Management
OneLogin
Identity & Asset Management
PingID
Identity & Asset Management
SailPoint
Identity & Asset Management
Semperis
Identity & Asset Management
Silverfort
Identity & Asset Management
Teleport
Identity & Asset Management
Thycotic

Email Security

Email Security
Abnormal Security
Email Security
Agari Phishing Defense
Email Security
Area 1
Email Security
Armorblox
Email Security
Cyren
Email Security
FireEye EX
Email Security
Ironscales
Email Security
Mimecast
Email Security
PerceptionPoint
Email Security
ProofPoint

Network Security

Network Security
Alert Logic WSM
Network Security
Appgate
Network Security
Axis Security
Network Security
Bind DNS
Network Security
Bricata
Network Security
Broadcom Secure Access Cloud (Luminate)
Network Security
Cato Networks
Network Security
Check Point
Network Security
Cisco AnyConnect NVM
Network Security
Cisco Firewall
Network Security
Cisco Identity Services Engine
Network Security
Cisco Meraki
Network Security
Cisco Umbrella
Network Security
Citrix Netscaler
Network Security
Cloudflare
Network Security
Corelight Suricata Alerts
Network Security
DarkTrace
Network Security
F5 VPN
Network Security
FireEye NX
Network Security
Fortinet Firewall
Network Security
Illusive Active Defense Suite
Network Security
InfoBlox
Network Security
Juniper Firewall
Network Security
Lansweeper
Network Security
Mikrotik
Network Security
Netography
Network Security
Netskope
Network Security
OpenVPN
Network Security
Palo Alto Networks Firewall
Network Security
ProtectWise
Network Security
PulseSecure
Network Security
SilverPeak
Network Security
SonicWall
Network Security
Squid Proxy
Network Security
Thinkst Canary
Network Security
ThreatX
Network Security
Vectra
Network Security
Watchguard Firebox
Network Security
Windows Firewall Logs
Network Security
Zeek Logs
Network Security
Zscaler
Network Security
iboss
Network Security
pfSense

Threat Intelligence

Threat Intelligence
AlienVault OTX
Threat Intelligence
Anomali Intelligence
Threat Intelligence
STIX-TAXII
Threat Intelligence
Splunk Intelligence Management (TruStar)
Threat Intelligence
VirusTotal
Threat Intelligence
ZeroFox
Threat Intelligence
abuse.ch

Workflow & Response

Workflow & Response
Atlassian
Workflow & Response
Github
Workflow & Response
Jira
Workflow & Response
Microsoft Exchange
Workflow & Response
Office365
Workflow & Response
Slack
Workflow & Response
Tines
Workflow & Response
Zoom

Other

Other
Acalvio Technologies
Other
Apache2
Other
Armis
Other
Box
Other
Claroty
Other
Code42
Other
Edgescan
Other
Harness IO
Other
Island Technology
Other
Kiteworks
Other
Kubernetes
Other
MOVEit
Other
Malwarebytes
Other
ManageEngine ADAudit Plus
Other
Mulesoft
Other
NoName Security
Other
PerimeterX Bot Defender
Other
Salesforce
Other
Seraphic Security
Other
Tenable
Other
Trend Micro
Other
VMWare ESXi
Other
Very Good Security
Other
Vicarius
Other
Wazuh

Contact Us Today

General

Don’t wait for a breach to test your defenses. Discover your real-world vulnerabilities before attackers do — and prove your security posture with confidence.

Kudelski Security needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.
Thank you! Your submission has been received!
We'll be in touch soon.
Oops! Something went wrong while submitting the form.