Ressourcen
Aktuelle Analysen und nützliche Erkenntnisse über die sich ständig verändernde Landschaft der IT-Sicherheit.
Demotermin vereinbarenIm Spotlight
Whitepaper
How to choose the right threat intelligence solution for you business.
Webinare
Was können Unternehmen tun, um Cyberangriffe rechtzeitig zu erkennen und abzuwehren? In diesem Webcast erfahren Sie, welche Rolle Threat Intelligence hierbei spielen kann.
Analysen
Understand the business model of credential-stealing traffer organizations.
Webinars
Alle Inhalte
Filter
Analysen (9)
[EN] State of Cybersecurity in the European Financial Industry – Focus: Germany
In this report, Outpost24’s analysts focus on cyber risks and issues that confront companies in the financial industry in europe and germany.
[EN] Electric Avenue: Overview of the Energy Sector’s Threat Landscape
Meaningful insights on cyber threat facing the energy industry.
[EN] In Good Health: Threat Intelligence for the Healthcare Sector
How cybercriminals profit from healthcare data – and how to reduce the risk.
[EN] Dark Commerce: Exploring the Cybercrime Industry
Analysis into the cybercrime underground and its shadow economy.
[EN] Cyber Threat Intelligence for Banking and Financial Services
How to tackle key cyber threats facing the financial services industry.
[EN] Everything You Need to Know about the New Taurus Stealer
Deep dive into the Taurus Stealer malware and how it operates.
[EN] Everything You Need to Know about Jester Stealer
Get in-depth analysis on the Jester Stealer malware flow.
[EN] Web Application Security for Chemical Manufacturing
Analysis of the application attack surface for chemical manufacturers.
[EN] The Rising Threat of Traffers
Understand the business model of credential-stealing traffer organizations.
Datenblätter (21)
[DE] Managed Services
Optimieren Sie Investitionen in Ihre IT-Sicherheit mit Managed Threat Exposure Management Services
[EN] External Attack Surface Management
Bolster security visibility and reduce risk exposure of unknown assets
[EN] Threat Intelligence Threat Context Module
Prepare your perimeter against attacks with contextual intelligence around threat actors, campaigns, IOCs and more with Threat Compass.
[EN] Penetration Testing and Professional Services
Go beyond vulnerability scanners with penetration testing services tailored to your business needs.
[EN] Web Application Security Testing
Test your apps in real-time for the latest vulnerabilities. SWAT delivers continuous monitoring of internet facing web applications.
[EN] MSSP Partner Program
MSSP partner program highlights and benefits. Become an approved Outpost24 MSSP and grow with us.
[EN] Reseller Partner Program
Reseller partner program highlights and benefits. Become an approved Outpost24 reseller and grow with us.
[EN] Pen Testing as a Service
Simplify web application security testing for business-critical apps with SWAT, our most comprehensive pen testing as a service (PTaaS) solution.
[EN] PCI DSS Compliance Scanning
Automate compliance checks for internal policies and external regulations with continuous PCI compliance scanning.
[EN] Managed Security Services
Outpost24's managed services team can secure your technology investment while reducing operational cost.
[DE] Vorausschauendes Cyber Risiko Management mit Threat Compass
Wir begleiten Sie durch die moderne
Bedrohungslandschaft
[EN] Threat Intelligence Social Media Module
Track your organization’s digital footprint, including unauthorized use of brands, logos, and assets with Threat Compass.
[EN] Threat Intelligence Mobile Apps Module
Discover false, infected, modified, and non-compliant use of your business apps with Threat Compass.
[EN] Threat Intelligence Hacktivism Module
Monitor global social borne hacktivism operations and protect your networks from potential attacks with Threat Compass.
[EN] Threat Intelligence Data Leakage Module
Detect leaked documents and information from employees & third parties with Threat Compass.
[EN] Threat Intelligence Dark Web Module
Track and monitor your organization’s footprint on the Dark Web with Threat Compass.
[EN] Threat Intelligence Credit Cards Module
Find stolen customer credit cards, bank information, and infected POS devices with Threat Compass.
[EN] Threat Intelligence Credentials Module
Detect and retrieve stolen and compromised credentials in real-time with Threat Compass.
[EN] Domain Protection Module Datasheet
Combat phishing and cybersquatting attacks by automating detection of malicious sites with Threat Compass.
[DE] RBVM / Outscan NX Datenblatt
Outscan NX diagnostiziert kontinuierlich Netzwerk- und Cloud-Schwachstellen.
Webinare (15)
Was steckt hinter Cyber Threat Intelligence und Bedrohungsinformationen und wie können Organisationen Erkenntnisse daraus ziehen, um ihre Sicherheitsmaßnahmen gezielt zu verbessern?
Die eigene externe Angriffsfläche zu kennen ist schon längst Bestandteil Ihrer täglichen Aufgaben, wo steckt also der Vorteil von EASM für Ihre Organisation? In diesem Webinar gibt Stephan Halbmeier Denkanstöße, ob sich hinter EASM nur ein aktueller Hype verbirgt oder ob sich daraus ein entscheidender Mehrwert für Ihre Cybersecurity-Strategie ableiten lässt.
Schwache & kompromittierte Passwörter sind ein Einfallstor für Cyberkriminelle. Doch passwortlose Alternativen sind nicht immer umsetzbar. Wir zeigen, wie Passwörter dennoch sicher und geheim bleiben.
Product Specialist Stephan Halbmeier gibt Einblicke in die Vorgehensweisen von Angreifern anhand aktueller Beispiele und zeigt Ihnen, wie Sie Ihre Organisation zukünftig gegen solche Angriffsversuche schützen können.
Wissen Sie welche Informationen zu Ihrer Organisation von Cyberkriminellen gehandelt werden? Wir zeigen Ihnen, wie Sie einen Überblick über den Schatten Ihrer Organisation im Web erlangen können.
January 1, 1970
Treffen Sie Outpost24 in Halle 7A als Mitaussteller bei Computacenter (Stand 214) und Sweepatic (Stand 426)
We discuss how you can map CVE records with the MITRE ATT&CK framework.
We will turn penetration testing on its head and explain the economics of security testing
We provide insights on some of the most relevant underground card shops, which types of products are offered, their prices, and related threat actors and business models.
We explain how to increase your security testing efficiency and reduce risk with pentesting as a service (PTaaS) in Gartner’s latest Hype Circle for Security Operations.
API Management is a critical component of modern application development. As organizations increasingly rely on APIs to exchange data between systems, they must also consider the potential security risks that come with API usage.
Our expert will discuss why CISOs must embrace unified cyber risk management for greater consolidation and simplification of business risk to build trust and maximize business resilience.
This webinar is ideal for security professionals, and anyone interested in learning more about how to protect their organisation from similar threats.
July 6, 2023
Was können Unternehmen tun, um Cyberangriffe rechtzeitig zu erkennen und abzuwehren? In diesem Webcast erfahren Sie, welche Rolle Threat Intelligence hierbei spielen kann.
We identify the benefits of a risk-based approach, highlighting how this can make vulnerabilities more manageable and streamlining remediation through automation and orchestration
Whitepaper (6)
In diesem Whitepaper erfahren Sie, wie Sie mit Risikobasiertem Vulnerability Management (RBVM) die Effektivität Ihrer Schwachstellenanalyse steigern und gleichzeitig sicherstellen, dass Ihre Ressourcen wirkungsvoll eingesetzt werden.
Webanwendungen sind eines der wichtigsten Einfallstore für Cyberkriminelle. Jede Webseite weist durchschnittlich 15 Schwachstellen auf, zwei davon schwerwiegend.
Der Schutz und die Absicherung des Web-Frontends haben deshalb für Sicherheitsverantwortliche eine hohe Priorität
Understand the critical role (and true cost) of penetration testing.
Credentials are the keys to your organization – learn how to keep them secure.
How to choose the right threat intelligence solution for you business.
Get clarity on what External Attack Surface Management is, as well as its importance in ensuring your organization’s cyber resilience