Operation Save the Easter Bunny Save the Easter Bunny. Find the eggs. Crack the questions. The Easter Bunny has a problem. Actually, he just wanted to distribute his eggs. But this year, his digital Easter basket was attacked. Access data compromised. Suspicious activity on the network. And somewhere, a system is still running that urgently needs an update. The rabbit needs help. To save his Easter celebrations, at least one security challenge must be solved. Six strong manufacturers are ready to help. Each covers a crucial area of modern IT security: protecting identities, identifying vulnerabilities, securing networks and keeping an eye on systems. Choose your favourite, find the hidden egg and answer the question correctly. You’re already in the running for a delicious Easter brunch for you and the whole team. Sometimes one right decision is enough to save the whole of Easter. Choose your mission. Save the nest. Six security areas. Six manufacturers. Choose your favourite, find the hidden egg and answer the question correctly. One correct answer is enough to put you in the running for an Easter brunch for your team. Thales – Protecting identities Who gets access and who stays out. Play Rapid7 – Identify vulnerabilities Identify vulnerabilities before they are exploited. Play HPE Aruba – Secure network Control in the network – not just connectivity. Play N-able – Monitoring and responding to systems Identify threats early and act immediately. Play Cloudflare – Defending the digital external border Stop threats early or penetrate the nest unhindered. Play Threema – Securing communication Is sensitive communication really protected end-to-end? Play Cloudflare – Defending the digital frontier The trail does not lead into the nest, but to its digital outer boundary. Suddenly, the Easter Bunny’s website is overwhelmed by an unusual amount of traffic. Requests from all over the world, some harmless, others clearly malicious. No eggs have disappeared yet. But once the first protective wall falls, the entire nest is exposed. Before an attack reaches systems or identities, it encounters the public interface: web applications, APIs, DNS and data traffic. This is where it is decided whether threats are stopped early on or allowed to penetrate the network unhindered. Find the Easter egg in the picture → × Why is protection at the digital perimeter strategically relevant for resellers? Because attacks often occur via web applications, APIs, and public traffic and should be blocked at the edge. Because edge security primarily improves internal Wi-Fi coverage. Because web protection is only necessary for e-commerce companies. Check answer Cloudflare PDF Download "*" indicates required fields EmailThis field is for validation purposes and should be left unchanged.E-Mail* × Why is SASE more than just another networking product for resellers? Because it combines networking and security, creating new consulting and service potential Because it exclusively sells new hardware Because it is only suitable for very large enterprise environments Check answer HPE Aruba – Secure network IThe hare’s network is bustling with activity. Mobile devices, external helpers, temporary access. But who is actually moving around in the network? And who shouldn’t be? If the network is not properly segmented and secured, an incident will spread faster than the Easter Bunny can run. This is about control in the network – not just connectivity. ←Find the Easter egg in the picture Introduction to the Single SASE. PDF Download "*" indicates required fields CommentsThis field is for validation purposes and should be left unchanged.E-Mail* Rapid7 – Identify vulnerabilities The hare has built its systems. New tools, new platforms, new interfaces. However, with each new service, the attack surface also grows. The real danger is not the attack itself – but what you cannot see. The aim here is to identify vulnerabilities before they are exploited. Find the Easter egg in the picture → × What concrete business advantage does the Command Platform offer for resellers? It automatically reduces all license costs for the customer It enables positioning security as a continuous service rather than a single project It replaces all existing security solutions without migration Check answer Threat Command. PDF Download "*" indicates required fields LinkedInThis field is for validation purposes and should be left unchanged.E-Mail* × On average, most cyberattacks on companies are only discovered after more than 200 days. How quickly do you detect attacks with N-able ITDR? After 31 days After one week Within a few hours Check answer N-able – Monitoring and responding to systems Threats continue to evolve, but so do defences. MSPs that employ identity-based security, educate users and implement multi-layered protections can not only survive in this environment, but thrive. In our guide, you will find a checklist and five practical steps for strong protection. ←Find the Easter egg in the picture Identity Protection Guide Download "*" indicates required fields X/TwitterThis field is for validation purposes and should be left unchanged.E-Mail* Thales – Protecting identities The Easter Bunny has discovered that someone has logged into his system using stolen access data. Not every login is genuine. Not every identity is trustworthy. If identities are not properly secured, the entire nest is exposed. This is about who really gets access and who is left out. Find the Easter egg in the picture → × What does Imperva AI Application Security primarily protect? A) The corporate network from DDoS attacks B) AI-powered applications from prompt injection and data leaks C) Endpoints from malware Check answer Securing your Gen AI Download "*" indicates required fields X/TwitterThis field is for validation purposes and should be left unchanged.E-Mail* × Why is secure, end-to-end encrypted communication strategically relevant for companies? Because sensitive information is only truly protected if it is exclusively readable by the sender and recipient – even the provider must not have access. Because encrypted messengers primarily increase internet speed. Because secure communication is only necessary for authorities and the military. Check answer Threema – Securing communication The external defences are holding. Identities are protected. But suddenly a new problem arises. Internal messages from the Easter Bunny have been intercepted. Agreements about delivery routes, schedules and hiding places are no longer confidential. A single compromised chat can jeopardise the entire Easter celebration. Not every attack comes through open ports or APIs. Some start with a simple message. This is where it is decided whether sensitive communication is truly protected end-to-end or whether eavesdroppers are lurking in the shadows. ←Find the Easter egg in the picture
Cloudflare – Defending the digital external border Stop threats early or penetrate the nest unhindered. Play