Move's competence center

Move Solutions-1-1
 

Here you will find e-books and webinar recordings.

Guide to

6 signs that your client management is not secure enough

Client management is a critical part of a secure and stable IT environment - but many organizations overlook the biggest security risks associated with managing and operating clients.

In this e-book, you'll gain insight into:

  • Common warning signs of weak security

  • Concrete examples of what can go wrong

  • Actions you should take to protect your business

  • How poor endpoint management can lead to GDPR and NIS2 breaches

Access the guide here

mock-00991-2c35e
On-demand webinar:

5 tips - get started easily with Copilot for M365

Watch the recording where you will get 5 great tips on how you and your organization can easily get started with Copilot for M365. We share our experiences in introducing and using Copilot so that you can benefit from these in your own organization.

Get access to the recording
CB-security as a service-1
Webinar Series:

Long-term IT security: Optimizing resources and technologies

As we all know, IT security work is not a sprint, but a marathon. New techniques are constantly emerging from attackers that we need to counter. Through this webinar series, Fortinet wants to shed light on 3 current issues.

Get access to the recordings
Marathon
Webinar recording:

Security in the cloud

Watch the recording of this webinar to gain insight into how to build a secure and compliant Microsoft 365 platform, from governance documents to practical configuration of security services.

Watch the recording
Webinar-24--september-2025-1
On-demand webinar:

Are you ready for the AI revolution?

Watch our recordings from the AI webinar and learn about the way forward for artificial intelligence, relevant applications, and how you can build your own AI infrastructure

Get access to the recording
artiphoria-Robot walking on mic-1-1
On-Demand Webinar:

The Digital Security Act (NIS2) and digitizing your technical infrastructure

Watch the webinar recording where we focus on what NIS and NIS2 mean for your business and how you should work with security related to your technical IOT and OT environments

Get access to the recording
Cloud computing - Move Azure
Webinar recording:

A deep dive into the enchanting possibilities of automation

Watch the recording where we explore the capabilities of the RedHat Ansible Automation Platform and IBM Fusion to optimally manage your OpenShift environment

Get access to the recording
Hand holding smartphone with hand drawn media icons and symbols concept-1
On-Demand Webinar:

Detect enemies early: Honeypot technology with FortiDeceptor

Watch the recording where we look at implementing Honeypots with FortiDeceptor to detect hostile activity in IT and OT/IoT infrastructures.You'll get valuable tips and live demosfor your technical IOT and OT environments.

Get access to the recording
honeypot

E-book

Digital control

- Move methodology, framework and services

Both large and small businesses need digital control

Increased digitization, integration with and demands from customers and suppliers, security threats and regulatory requirements all add up to a rapidly growing need to gain and document digital control.

Read more and download

2024-digital control e-book-1-1