Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Optimize your digital experience with ThousandEyes
By mastering ThousandEyes, a cutting-edge network management platform, you will learn how to effectively diagnose…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
4 Cisco Instructor Excellence Awards for NIL Learning’s CCSIs
We are proud to announce that 4 NIL Learning’s instructors are among the recipients of…
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Search for:
Search
NIL Learning
NIL Learning
Contact
Success stories
Home
»
Security Operations
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
Show Filters
Industries
All
Energy / Utilities
Healthcare / Life Science
Information Technology
Local Government / Municipalities
Manufacturing
Professional Services
Transportation
Solutions & Services
Automation
Cloud
Collaboration
Conscia Services
Cybersecurity
Datacenter
Education
Internet of Things (IoT)
Learning & Content Development
Managed Services
Networking
Service Provider
Software
Wireless
Business outcome
Cost Predictability
Digital Transformation
Managed Detection & Response
Operational Efficiency
Security Operations
Case
Reliable energy in time of evolving cyber threats
Conscia SOC helps keep your family warm during wintertime Centrica Energy Trading A/S, a leading gas, power and LNG energy trader provides their clients with the best route-to-market services available...
Read more
Whitepaper
What is AIOps?
Today, it is impossible for the human brain to have an overview of all systems interconnected in our...
Read more
Page
Support and Operations
We Support Our Customers’ IT Environments in Some of the Most Complex and Demanding Environments Our projects are...
Read more
Page
Consulting
Helping You Ask the Right Questions and Find the Answers Are you making your competitors nervous? Do you...
Read more
Page
Services
Consulting We help you ask the right questions and find the answers to tackle technology-related decisions. We understand...
Read more
Page
Security Operations Center (SOC) Building Services
Effective, automated, and economical threat detection and response Many large organizations have learned the hard way that efficient...
Read more
Page
Securing the EUC Environment with VMware NSX
Prevent security breaches that can devastate your business Frank Abagnale (who was portrayed in the famous movie Catch...
Read more
Page
Secure Mobility
Get the job done anywhere, anytime, with minimal risk Mobile working, be it from company or personal devices,...
Read more
Page
Secure and Compliant Collaboration
Great user experience and high security Irrespective of technology, industry, workflow, tools, or procedures, we at NIL believe...
Read more
Page
Cisco ISE Health Check
Don’t Let Somebody Into Your Network Because of a Cisco ISE Misconfiguration or Poor Integration Cisco Identity Service...
Read more
Page
Risk and Security Assessment
Risks need to be a smart choice Being risk-free is terribly expensive and usually practically impossible to achieve,...
Read more
Page
Cloud Security Assessment
Clouds are not secure by default Cost-efficiency, flexibility, and agility drive many organizations to migrate parts of their...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
Data Abundance
26. Mar 2021
Summary By using new technologies in our everyday lives, enormous amounts of data are produced. 59 Zettabytes of data...
Read more
Page
Network Infrastructure and Security Audit
Network, don’t let me down! For service providers, governments, and enterprises that run heavily distributed business platforms reliant...
Read more
Page
Cloud Security
Execute your cloud migration without compromising security Moving to the cloud entails knowing what the provider does for...
Read more
Page
Building Security Baselines and Infrastructure Hardening
Secure by default Modern IT systems are built as a complex web of software and hardware interdependencies, where...
Read more
Page
Industrial Cyber Defense and Protection
Minimizing cyber-security risks in industry 4.0 and IoT environments The security of industrial control systems (ICS) like SCADA...
Read more
Page
Advanced Malware Protection (AMP)
Do you still think you are not a target? While the most serious malware attacks are targeted against...
Read more
Page
IT Security
Harden the defenses of your IT environment We believe that it is not the evolution of threats that...
Read more
Arjan Kievits
Wireless Technical Consultant at Conscia Netherlands
Video
Wi-Fi 6E: Velik korak naprej v Wi-Fi komunikaciji
Kaj je Wi-Fi 6E in kaj omogoča? Kaj je Wi-Fi 6E in kako je povezan z drugimi frekvencami?...
Read more
Page
Building and Deploying NetDevOps Environments and Processes
The need for speed As service providers search for new revenue streams, higher ARPU, and lower overhead costs,...
Read more
Page
IT Automation and Orchestration
How to fulfill the automation/orchestration promises? The automation and orchestration of your IT infrastructure and/or services should move...
Read more
Page
Build and Migrate to VMware NSX Multi-tenancy
It’s straightforward, they’ve said. VMware NSX is an SDN solution for mostly virtualized environments that addresses the intrinsic...
Read more
Page
Private Cloud Design and Data Center Transformation
The Full Power of the Cloud, Dedicated Only to You Business demands are forcing IT leaders to shift...
Read more
Page
Data Center and Cloud
Increase Flexibility With Data Center And Cloud Transformation is the new imperative in today’s challenging economic times. If...
Read more
Page
Solutions
Secure Industry Solutions for complex IT Infrastructures Deployed correctly, IT becomes a strategic tool leading to that decisive...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Cybersecurity Diagnostics: Machine versus Human
29. Jan 2021
Nowadays, machines form an everyday part of our lives. They were invented to ease the daily tasks. Machines...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
(Un)Secure Microsoft Windows for Free
23. Nov 2020
Protect your Microsoft environment using free built-in features Nowadays, programs and applications that are used contain more and...
Read more
Tom Kern
Cyber Security Analyst
Blog
What Is a Threat Detection Framework?
19. Oct 2020
In today’s world of increasing complexity and lucrative cybercrime industry, you can only be certain of one thing:...
Read more
Whitepaper
White Paper: Secure Email Means Secure Business
This white paper describes threats concerning email, the monitoring and protection functionality necessary to neutralize those threats, and...
Read more
«
1
2
3
4
»