Move's competence center
Here you will find e-books and webinar recordings.
Guide to
6 signs that your client management is not secure enough
Client management is a critical part of a secure and stable IT environment - but many organizations overlook the biggest security risks associated with managing and operating clients.
In this e-book, you'll gain insight into:
-
Common warning signs of weak security
-
Concrete examples of what can go wrong
-
Actions you should take to protect your business
-
How poor endpoint management can lead to GDPR and NIS2 breaches
On-demand webinar:
5 tips - get started easily with Copilot for M365
Watch the recording where you will get 5 great tips on how you and your organization can easily get started with Copilot for M365. We share our experiences in introducing and using Copilot so that you can benefit from these in your own organization.
Get access to the recording
Webinar Series:
Long-term IT security: Optimizing resources and technologies
As we all know, IT security work is not a sprint, but a marathon. New techniques are constantly emerging from attackers that we need to counter. Through this webinar series, Fortinet wants to shed light on 3 current issues.
Get access to the recordings
Webinar recording:
Security in the cloud
Watch the recording of this webinar to gain insight into how to build a secure and compliant Microsoft 365 platform, from governance documents to practical configuration of security services.
On-demand webinar:
Are you ready for the AI revolution?
Watch our recordings from the AI webinar and learn about the way forward for artificial intelligence, relevant applications, and how you can build your own AI infrastructure
Get access to the recording
On-Demand Webinar:
The Digital Security Act (NIS2) and digitizing your technical infrastructure
Watch the webinar recording where we focus on what NIS and NIS2 mean for your business and how you should work with security related to your technical IOT and OT environments
Get access to the recording
Webinar recording:
A deep dive into the enchanting possibilities of automation
Watch the recording where we explore the capabilities of the RedHat Ansible Automation Platform and IBM Fusion to optimally manage your OpenShift environment
Get access to the recordingOn-Demand Webinar:
Detect enemies early: Honeypot technology with FortiDeceptor
Watch the recording where we look at implementing Honeypots with FortiDeceptor to detect hostile activity in IT and OT/IoT infrastructures.You'll get valuable tips and live demosfor your technical IOT and OT environments.
Get access to the recording
E-book
Digital control
- Move methodology, framework and services
Both large and small businesses need digital control
Increased digitization, integration with and demands from customers and suppliers, security threats and regulatory requirements all add up to a rapidly growing need to gain and document digital control.
