The Easter Bunny has a problem.

Actually, he just wanted to distribute his eggs. But this year, his digital Easter basket was attacked. Access data compromised. Suspicious activity on the network. And somewhere, a system is still running that urgently needs an update.

The rabbit needs help.

To save his Easter celebrations, at least one security challenge must be solved. Six strong manufacturers are ready to help. Each covers a crucial area of modern IT security: protecting identities, identifying vulnerabilities, securing networks and keeping an eye on systems.

Choose your favourite, find the hidden egg and answer the question correctly.

You’re already in the running for a delicious Easter brunch for you and the whole team.

Sometimes one right decision is enough to save the whole of Easter.

Choose your mission. Save the nest.

Six security areas. Six manufacturers.
Choose your favourite, find the hidden egg and answer the question correctly.

One correct answer is enough to put you in the running for an Easter brunch for your team.

Cloudflare – Defending the digital frontier

The trail does not lead into the nest, but to its digital outer boundary.

Suddenly, the Easter Bunny’s website is overwhelmed by an unusual amount of traffic. Requests from all over the world, some harmless, others clearly malicious. No eggs have disappeared yet. But once the first protective wall falls, the entire nest is exposed.

Before an attack reaches systems or identities, it encounters the public interface: web applications, APIs, DNS and data traffic. This is where it is decided whether threats are stopped early on or allowed to penetrate the network unhindered.

HPE Aruba – Secure network

IThe hare’s network is bustling with activity. Mobile devices, external helpers, temporary access.

But who is actually moving around in the network? And who shouldn’t be?

If the network is not properly segmented and secured, an incident will spread faster than the Easter Bunny can run.

This is about control in the network – not just connectivity.

Rapid7 – Identify vulnerabilities

The hare has built its systems. New tools, new platforms, new interfaces.

However, with each new service, the attack surface also grows.

The real danger is not the attack itself – but what you cannot see.

The aim here is to identify vulnerabilities before they are exploited.

N-able – Monitoring and responding to systems

Threats continue to evolve, but so do defences.

MSPs that employ identity-based security, educate users and implement multi-layered protections can not only survive in this environment, but thrive.

In our guide, you will find a checklist and five practical steps for strong protection. 

Thales – Protecting identities

The Easter Bunny has discovered that someone has logged into his system using stolen access data.

Not every login is genuine. Not every identity is trustworthy.

If identities are not properly secured, the entire nest is exposed.

This is about who really gets access and who is left out.


Threema – Securing communication

The external defences are holding. Identities are protected. But suddenly a new problem arises.

Internal messages from the Easter Bunny have been intercepted. Agreements about delivery routes, schedules and hiding places are no longer confidential. A single compromised chat can jeopardise the entire Easter celebration.

Not every attack comes through open ports or APIs. Some start with a simple message.

This is where it is decided whether sensitive communication is truly protected end-to-end or whether eavesdroppers are lurking in the shadows.