Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Software-Defined Data Center (SDDC)
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
OT, IT, and IoT – How to Protect Your Production Units and Improve the Interaction between OT, IoT, and IT
Today, many companies use either fully or partially automated production processes. Robots, CNC machines, and…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
Conscia delivers historically strong performance in 2022/23
Conscia demonstrates record-breaking results in its financial year 2022/23, with revenue growing 32% to EUR…
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
Go to
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
Search for:
Search
NIL Learning
NIL Learning
Contact
Videos
Home
»
Videos
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
Show Filters
Industries
All
Education
Solutions & Services
Analytics
Automation
Cloud
Collaboration
Cybersecurity
Datacenter
Education
Managed Services
Mobility
Networking
Security Operations Center (SOC)
Software
Business outcome
Digital Transformation
Governance, Risk & Compliance
Managed Detection & Response
Operational Efficiency
Security Operations
Video
Deploying VMware Solutions Using Zero Trust Architecture
VMware and Zero Trust Architecture The Zero Trust Architecture (ZTA) represents a modern IT environment design, intended to limit unauthorized network and data access by providing continuous endpoint authentication and...
Read more
Mitja Robas
Service Delivery Manager
Video
Pure Storage FlashArray: Business Continuity for Most Demanding Environments
Active-Active SDDC with Pure Storage FlashArray Business continuity and disaster recovery solutions are typically complex. This is especially the...
Read more
Jakob Premrn
Cybersecurity Analyst
Jan Češčut
Cybersecurity Analysts
Video
The advantages of cloud-based SIEM and Azure Sentinel
SIEM that adapts to your IT-environment and the contemporary business-security demands The standard SIEM working systems need a...
Read more
Robert Lesar
Network Consulting Engineer
Video
Cisco SD-Access Under the Hood
Cisco SD-Access and the new era in networking In an enterprise architecture, the network may span multiple domains,...
Read more
Danijel Grah
Cyber-Security Analyst
Video
How to secure ICS/OT/IoT environments with Cisco Cyber Vision?
Prevent cyber-attacks, industrial espionage, and sabotage on your ICS Stuxnet, black-outs in Ukraine in 2015/2016, and Trisis/Triton malware...
Read more
Robert Turnšek
Chief Technology Officer
Danijel Grah
Cyber-Security Analyst
Jan Češčut
Cybersecurity Analysts
Video
Microsoft Security Briefing
Key cybersecurity challenges in 2020 and how Microsoft technologies can help solve them Cyber-crime is a big, organized...
Read more
Stojan Rančić
IT Security Architect
Video
How does Cisco SecureX improve your security visibility at no additional cost?
Cisco SecureX introduction and its key benefits With SecureX, Cisco is proving its commitment to security integration and visibility....
Read more
Robert Lesar
Network Consulting Engineer
Video
Cisco DNA Center: Automation, Analytics, and Platform Overview
How does Cisco DNA Center solve your network management challenges? Enterprise network professionals know that the typical business...
Read more
Anže Marinčič
IT Architect
Video
Simplifying application and infrastructure management with VMware Tanzu
How to modernize and improve your enterprise application portfolio? Organizations run all kinds of applications across diverse infrastructures...
Read more
Jan Bervar
IT Architect
Video
Is your cyber defense strategy a waste of money?
Numbers don’t lie. In spite of all the investment and technological upgrades over the years, hackers remain a...
Read more
Video
Securing diverse IT environments with Cisco Tetration
How to protect your hybrid workloads? Modern business is inherently dynamic. Change is the new imperative and that...
Read more
Stojan Rančić
IT Security Architect
Video
Zero Trust eXtended framework (and how to establish it with Cisco’s solutions)
How to achieve perimeterless security without harming productivity? In today’s business, your workforce, workloads, and workplace are literally...
Read more
Video
Application performance and business optimization with Cisco AppDynamics
Real-Time Application Performance Monitoring with Cisco AppDynamics Cisco AppDynamics is a leading Application Performance Management (APM) solution that...
Read more
Video
Rise of Mobile Threats and MTD
How to protect your users against modern mobile threats? In this lecture Leszek Twardowski, Sr. System Engineer, MobileIron,...
Read more
Video
Introducing a Mobile-centric Approach to Zero Trust
Zero Trust in Mobile Environments In the video, Claus Nussbaum – Sales Director Austria & Eastern Europe, MobileIron...
Read more
Stojan Rančić
IT Security Architect
Video
Cisco Zero Trust Architecture
Cisco Zero Trust Architecture Overview The Zero Trust Architecture (ZTA) represents a modern IT environment design that is...
Read more
Mitja Robas
Service Delivery Manager
Video
SDN on steroids
On SDN myths, real-life challenges, and practical use cases The concept of software-defined networks (SDN) has matured. It...
Read more
Jan Bervar
IT Architect
Video
You better make good on your (security) debt
Security debtors You are probably familiar with the phrase “technical debt”, which describes the consequences of all the...
Read more
Jan Bervar
IT Architect
Video
Smart security investing: change your game!
Change your game! As the infosec – pardon me, the “cybersec” – vendor community is trying to hide...
Read more
«
1
2