Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
NIS-2 Overview and Recommendations
Read more
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Unleash the Power of AI and Automation with Cisco Hypershield
Hypershield combines unmatched integration, AI-driven insights, and cutting-edge automation to deliver faster threat detection, seamless…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
NIL Achieves Microsoft Solutions Partner Designation for Private Cloud
This recognition highlights our expertise in delivering innovative and secure private cloud solutions, demonstrating our…
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Search for:
Search
NIL Learning
NIL Learning
Contact
Videos
Home
»
All
»
Page 2
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
Show Filters
Industries
All
Construction
Education
Energy / Utilities
Healthcare / Life Science
Local Government / Municipalities
Manufacturing
Retail
Sports / Entertainment
Transportation
Solutions & Services
Analytics
Automation
Cloud
Collaboration
Conscia Services
Cybersecurity
Datacenter
Education
Learning & Content Development
Managed Services
Mobility
Networking
Security Operations Center (SOC)
Software
Business outcome
Digital Transformation
Governance, Risk & Compliance
Managed Detection & Response
Operational Efficiency
Security Operations
Johan Camps
Video
Securely to the clouds and beyond: Secure SD-WAN as a Service
Secure access anywhere Many related factors and processes compete for attention when migrating to the cloud or establishing a hybrid workforce model. Not everything gets its fair share. Deadlines must...
Read more
Martin Holm
Senior Network Engineer, Conscia Sweden
Whitepaper
SD-WAN and SASE – The journey to a more secure network
Today, as an IT professional, you must be able to offer a high-performance, scalable and secure network to...
Read more
Video
Cyberwarfare and its Impact on Your Business
Destructive malware’s capabilities against your organization Cybersecurity analysts have already identified malware that was specifically developed to attack...
Read more
Katarina Primožič Ramoveš
People and culture officer
Blog
Sustainable Business Strategies: Responsibility and Opportunity of the HR
20. Mar 2022
One of the bigger COVID-19 consequences is definitely the change in business and management standards. The awareness that...
Read more
Page
Cookies Information
By using cookies at nil.com, we provide you with contents like videos and contact forms. We also improve...
Read more
Matevž Mesojednik
Security Operations Center (SOC) Manager
Blog
How to evaluate the credibility and quality of a SOC
24. Jan 2022
Choosing a Managed Detection and Response (MDR) service provider is very important, yet tricky task. Matevž Mesojednik, SOC Lead at...
Read more
Kent Heide
Technical Solutions Architect
Video
Secure End-to-end visibility across your infrastructure
Secure End-to-end visibility across your infrastructure with Cisco AppDynamics and Thousand Eyes platforms By leveraging modern application and...
Read more
Video
Log4j – one week in
Log4j vulnerability – what you need to know now and how to be better prepared for the similar...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
What to do and what not to do when you are under a cyber attack?
20. Oct 2021
Tackling cyber-attacks “ad-hoc” with no adequate knowledge of how to respond to an incident is never a good...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
Understanding the Importance of First Steps After a Ransomware Attack
19. Oct 2021
What to do and what not to do when you are under a ransomware attack? Despite a lot...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Basic Principles of OT Security
13. Oct 2021
The Challenge of Securing Windows 95-Based Devices Industrial environments with their Industrial Control Systems (ICSs) are a special...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
Industrial Cybersecurity and how to protect OT environments?
11. Oct 2021
The basics of OT security Industrial environments are a special challenge for IT security. What we have noticed...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
How to be secure from Ransomware?
6. Oct 2021
Ransomware 101 Jakob Premrn, cybersecurity expert at NIL, part of Conscia Group, explains what is Ransomware, why is...
Read more
Page
Microsoft
For more than two decades, we have worked hand in hand with Microsoft to bring cutting-edge security, modern...
Read more
Page
Cisco Partner
Cisco Partner NIL’s professional approach and ongoing commitment to being at the forefront of IT technologies is accentuated...
Read more
Kent Heide
Technical Solutions Architect
Blog
Troubleshoot less, innovate more!
7. Jun 2021
How to get correlated, real-time visibility into application and network performance As a networking guy, I have already...
Read more
Whitepaper
What is AIOps?
Today, it is impossible for the human brain to have an overview of all systems interconnected in our...
Read more
Page
Press
Contact Would you like to talk to Conscia's experts, management or do you need any press materials? +386...
Read more
Page
Content Development
Learning Content For Your Success Knowledge and experience. Content and its presentation. Everything counts, especially when it is...
Read more
Page
Security Operations Center (SOC) Building Services
Effective, automated, and economical threat detection and response Many large organizations have learned the hard way that efficient...
Read more
Page
Secure Mobility
Get the job done anywhere, anytime, with minimal risk Mobile working, be it from company or personal devices,...
Read more
Event
Deep Space Networking – Your Wireless Technology (Well) Beyond Earth
11. Sep 2021
Today, we all use wireless networks, and quite a few of us also work with how to make...
Read more
Whitepaper
Pure as-a-Service
Data storage is the engine of digitization Few Business & IT needs are as evident as the need...
Read more
Suzana Kužnik
Security Operations Center Analyst
Blog
Data Abundance
26. Mar 2021
Summary By using new technologies in our everyday lives, enormous amounts of data are produced. 59 Zettabytes of data...
Read more
Page
IT Security
Harden the defenses of your IT environment We believe that it is not the evolution of threats that...
Read more
Arjan Kievits
Wireless Technical Consultant at Conscia Netherlands
Video
Wi-Fi 6E: Velik korak naprej v Wi-Fi komunikaciji
Kaj je Wi-Fi 6E in kaj omogoča? Kaj je Wi-Fi 6E in kako je povezan z drugimi frekvencami?...
Read more
Arjan Kievits
Wireless Technical Consultant at Conscia Netherlands
Video
Wi-Fi 6E: A Big Step Forward in Wi-Fi Communication
What is Wi-Fi 6E and what more, if at all, will it offer? Ever since Wi-Fi became available,...
Read more
Page
Network Function Virtualization
Optimize your network for speed and agility Network Function Virtualization (NFV) is the critical building block for developing...
Read more
Whitepaper
White Paper: Secure Email Means Secure Business
This white paper describes threats concerning email, the monitoring and protection functionality necessary to neutralize those threats, and...
Read more
Danijel Grah
Offensive Security Technical Lead
Video
How to secure ICS/OT/IoT environments with Cisco Cyber Vision?
Prevent cyber-attacks, industrial espionage, and sabotage on your ICS Stuxnet, black-outs in Ukraine in 2015/2016, and Trisis/Triton malware...
Read more
«
1
…
3
4
5
6
7
»