Cybersecurity Resource Center

With the number of data breaches and cyberthreats on the rise, there is a significant demand for informative and useful cybersecurity resources that help you stay aware, educated, and prepared for any type of cyberattack. On Heimdal's cybersecurity resources page, you'll find dozens of completely free resources you may use for your company or consumers. eBooks, threat reports, industry guides, whitepapers, data sheets, and other resources are available. Check out our collection!

  • All
  • E-books
  • Reports
  • Whitepapers
  • Case studies

Cybersecurity e-books 7


e-books: Remote Desktop Procotol

This e-book provides a comprehensive overview of Remote Desktop Protocol (RDP), a popular technology that enables users to access a remote desktop environment from a local computer or device. Whether you are an IT professional looking to implement RDP in your organization or an individual looking to understand this technology, this material covers the various features of RDP, including its ability to access remote desktops, applications, and data, as well as its support for multiple users and multiple sessions. 

Read it...

e-books: Privileged Access Management in the Cloud

Cloud computing has revolutionized the way businesses manage their operations, offering them greater flexibility and scalability. However, with the use of cloud technology comes certain security challenges. One of these is Privileged Access Management (PAM). In this e-book, we explore how PAM can help you protect your cloud environment from malicious access and gain valuable insights on PAM in the Cloud.

Read it...

e-books: Ransomware Topography

This e-book cross-examines the anatomy of a ransomware attack from infil to exfil, charting along the milestones, risks, and countermeasures associated with each step. Read more to learn more about the innerworkings of ransomware and how to construct a robust anti-ransomware security strategy.

Read it...

e-books: DNS Security for Dummies

This eBook gives a comprehensive role-based security approach and addresses the numerous dangers to the Domain Name Systems (DNS) as cyberattacks increase globally. Read more about DNS systems operate, types of DNS attacks, and examine how DNS filtering can successfully increase network security.

Read it...

e-books: The Role of EDR in the Cybersecurity Universe

When Endpoint Detection and Response (EDR) entered the cybersecurity scene, it quickly rose to the status of industry standard, becoming a more effective security tool than conventional firewalls and antivirus programs. This eBook will describe the EDR Foundation, EDR Capabilities and Benefits, Endpoint Security Specifics, and Challenges with Standalone EDR Solutions.

Read it...

e-books: Privileged Access Management Guide

This e-book is a guide designed to better understand basic Privileged Access Management concepts that will further underline the necessity of a strong PAM solution in today’s corporate context.

Read it...

e-books: Patch Management Wireframing Guide

An eBook that examines industry-standard approaches to functional patch management and challenges thereof.

Read it...

Cybersecurity reports 2


report: Heimdal® Cyber Threat Report 2023

A review of the 2022 cyber-threat landscape and our predictions for 2023.

Download

report: CyberSecurity & Threat Intelligence Report 2022

A review of the cybersecurity landscape that will shed some light on what happened in 2021 and what 2022 might bring.

Download

Cybersecurity case studies 17


case studies: U.S. Independent School District

It’s no secret that the need to protect the sensitive information of students, teachers, and staff alike comes with the territory in the education sector. For this reason, the school district was looking to strengthen its cybersecurity posture through reliable solutions from a reputable vendor. This is where Heimdal came in.

Read it...

case studies: Össur

Staying true to their motto ‘Life Without Limitations’, the team at Össur prides itself on pushing the boundaries to create some of the most effective, non-invasive mobility solutions on the market today

Read it...

case studies: Kaufmann

A mission and a motorbike. That’s how it all started. The mission was clear – to supply quality clothing for men. And the motorbike? Well, what else could it be but a Harley Davidson? And the man riding the bike, the man who started the whole adventure?

Read it...

case studies: Osborne Clarke

Osborne Clarke was founded in 1748 in Bristol, England by Jeremiah Osborne. Today, Osborne Clarke has reached international fame. The firm has offices in 13 countries across Europe, Asia, and the US.

Read it...

case studies: Danish Wholesale Trading Company

Back in 2016, a collaboration started between this wholesale trader and Heimdal Security. Since then the collaboration has expanded quiet a bit and recently Heimdal had the chance to prove how it continues to deliver value with their security suite. Below you can read a bit more about the experiences of working with Heimdal, directly from the CIO.

Read it...

case studies: NRGi

NRGi has a longstanding history as an electricity supplier in Denmark, having been active in the industry for over one century. As a well-established company in its field, chances are you are already familiar with its services, especially if you reside or operate in the country.

Read it...

case studies: Techni Team ICT

Techni Team ICT is a computer hardware manufacturer and service provider based in Veenendaal, Netherlands. The company smartly structures, manages and maintains IT environment so clients don't have to worry about automation and system management. In addition, they have a clear vision on entrepreneurship and automation. On the one hand, they set up a stable network environment that guarantees continuity in business processes. On the other hand, they advise on how to improve processes using state-of-the-art technology.

Read it...

case studies: Ken Hygiene Systems A/S

Ken Hygiene Systems A/S is an innovative company with over 75 years of experience within the development, production, sales and servicing of disinfecting washers, bedpan washers and laboratory washers as well as dishwashers for industrial kitchens.

Read it...

case studies: Waterstones

Founded in 1982 by British businessman and author Tim Waterstone, Waterstones has become a cultural landmark in the United Kingdom over its four decades of existence. It is considered the country’s last surviving national bookshop chain thanks to its successful business strategy that has kept up with the digitalization of the written word.

Read it...

case studies: Welnet B.V.

Welnet B.V. is a Dutch regional Managed Service Provider (MSP) who services a wide clientele within the SMB domain. Ever since its inception in 2001, they have been loyal to their core values and translated those into pragmatic and tangible solutions for their customers.

Read it...

case studies: JYSK

JYSK is the largest Danish retailer operating internationally, delivering a great Scandinavian offer for everyone within sleeping and living. Although today JYSK is a global business, the company is managed based on its Scandinavian roots. This is reflected in the company culture and in the way they choose to do business.

Read it...

case studies: Lyf og Heilsa

A widely recognized name in the industry, Lyf og Heilsa provides personal, safe and professional services. Health and wellness are a specialty of the company and its goal is to increase the quality of life of its customers by offering medicines and other health-related products. The product range takes this into account and meets the strictest requirements of customers.

Read it...

case studies: Efla

While exploring various options to make their IT network more secure and easier to manage for admins as well, Efla evaluated multiple solutions and finally settled on products from Heimdal™ Security’s Thor suite.

Read it...

case studies: Orbital Technology

Orbital Technology supports emerging companies with highly experienced IT specialists, helping solve the continuous changing landscape and challenges in the technology world. They constantly seek cutting edge, proactive software solutions for organisations with the future in mind.

Read it...

case studies: The Salvation Army

The Salvation Army is a global charitable organization that hardly requires an introduction. With the first branch being founded in 1865 and Denmark & Greenland division following suit a little over a decade later, the help the non-governmental organization has offered and continues to offer those in need speaks for itself.

Read it...

case studies: Heard County

Heard County was founded in 1830 and named after Stephen Heard, a prominent loyalist of the American Revolution. Located in west-central Georgia and bordering Alabama, in the United States, it currently has a population of over 11,000 people.

Read it...

case studies: DPD Group

DPD is one of those enterprises that hardly needs an introduction. The parcel transport service has been active since the 1980s, operating under different names before rebranding itself as Dynamic Parcel Distribution (DPD) in 2008.

Read it...

Cybersecurity whitepapers 5


whitepapers: Solution Brief - Heimdal Threat-hunting & Action Center

Real-time threat hunting without the alert-fatigue and complexity is now a reality

Read it...

whitepapers: Mobile Device Security for Companies with BYOD Policy

A whitepaper aiming to cast some light on the intricacies and cybersecurity challenges posed by Bring-Your-Own-Device (BYOD) policies in companies.

Read it...

whitepapers: Cybersecurity in Remote Learning: Considerations for Educational Institutions

A thorough exploration of the specific cybersecurity threats that universities and educational institutions are facing and tips on how to effectively combat them.

Read it...

whitepapers: Cybersecurity Advice for Small and Medium Businesses (SMBs)

An essential guide for all small and medium business owners and employees, detailing obligatory security measures, tips and methods for ensuring digital safety.

Read it...

whitepapers: Polymorphic Malware Spawning Pseudo-Operating System Processes

A technical case study focusing on multi-process malware (MPM), what it is and how it circumvents usual cyber-defense detection methods.

Read it...

More Cybersecurity Resources


Cybersecurity Course for Beginners

Turn your inbox into a classroom with this self-paced free course designed for everyone and anyone.

Read it...

Cybersecurity Course for Small Businesses

Master the basics of cyber security to protect your small business and your client's data. All in 24 step-by-step free lessons!

Read it...

The Heimdal Security blog

Our award-winning cyber security blog keeps you up to date on breakthrough security alerts and paves the way to safer digital lives with actionable how-to guides and articles.

Read it...

The Daily Security Tip

From our inbox to yours: 365-security to last you for an entire year, dropped at a rate of 1 tip/day!

Read it...

The Ultimate Windows 10 Security Guide

All the pointers you need to adjust and tweak your Windows 10 settings in order to boost your cyber security and privacy.

Read it...

The Cybersecurity Glossary

Decode all that tech talk in cybersecurity articles so that it makes sense to you. Includes links to in-depth resources!

Read it...

Cybersecurity Webinars

Your cybersecurity webinars resource. Free expert advice on how to better secure your organization. Join us live or watch the recordings.

Read it...