Resources

An overview of security and networking definitions, cybersecurity concepts explained and more resources.

Placeholder for Cybersecurity engineer female desktop computerCybersecurity engineer female desktop computer

What is Managed Detection and Response (MDR)?

MDR services provide an advanced, proactive cybersecurity approach, integrating real-time monitoring, analytics, and expert response to combat digital threats.

Placeholder for Wireless payment retail smartphoneWireless payment retail smartphone

What is API security?

Explore the integral role of APIs in our digital interactions, the risks posed by API security oversights, and how Nomios's advanced solutions ensure seamless and secure API communication.

Placeholder for Water dam forrestWater dam forrest

What is SSE?

SSE is a network security framework that combines edge computing and security functions to protect and optimise access to cloud-based services and applications.

Placeholder for Commercial buildings logisticsCommercial buildings logistics

What is PKI and why is it important?

Organisations connect more and more IoT devices to their networks. Find out how public key infrastructure (PKI) helps you do this in a safe and secure manner.

Placeholder for Remote browser isolationRemote browser isolation

What is Remote Browser Isolation (RBI)

Remote Browser Isolation (RBI) is a cybersecurity technology that enhances web browsing security by isolating the web browser from your local environment. The primary goal of RBI is to shield you and your devices from various web-based threats.

Placeholder for Office building by nightOffice building by night

What is the SOC visibility triad?

The SOC visibility triad provides a multi-layered and network-centric security approach with SIEM, NDR and EDR. Find out what it is and how it works.

Placeholder for Security engineer desktopSecurity engineer desktop

What is a SOC?

SOC is the abbreviation for Security Operations Center. The SOC security team uses a combination of technology solutions and a strong set of processes.

Placeholder for Futuristic microchipFuturistic microchip

What is Quantum Security?

Quantum security is a developing field with the potential to transform cybersecurity, but it's not yet fully available. However, the threat to current cryptographic systems by quantum computers is already a reality.

Placeholder for Female engineer behind screenFemale engineer behind screen

What is phishing?

Phishing works by using websites that resemble the website of the organisation they are impersonating. The cybercriminals recreate these websites as closely as possible. The URL of the phishing site often resembles the real URL as well.

Placeholder for Engineer focused on taskEngineer focused on task

What is business email compromise (BEC)?

Business email compromise (BEC) is een variant van phishing waarbij de inloggegevens van een zakelijk emailaccount worden gestolen.

Placeholder for Shadow ITShadow IT

What is shadow IT and how can you protect yourself from it?

Shadow IT stands for systems, apps/applications or cloud services that employees of a company use without the knowledge or consent of the IT department.

Placeholder for Microsoft Teams image 14Microsoft Teams image 14

The Four Horsemen of Automation

The last few years have seen an acceleration in digital transformation; in part because of the pandemic and the necessity to provide remote access to corporate systems, data and applications, but also driven by demand from employees and customers for digital solutions.

Placeholder for Waterways aquaductWaterways aquaduct

What is NIS2 and what does it mean for your organisation?

To improve cybersecurity in Europe, the EU is coming up with a new directive: the NIS2. Read what this directive entails and what it means for your organisation.

Placeholder for Disaggregated networkDisaggregated network

What is a disaggregated network?

Network disaggregation allows for a completely different way of networking. At its most basic, disaggregation is the separation of hardware and software.

Placeholder for Cybersecurity network security engineerCybersecurity network security engineer

What is vulnerability management?

Vulnerability Management is a proactive strategy to identify, prioritise and correct security weaknesses and vulnerabilities in an organisation.

Placeholder for Cloud architect developer implementing ddos protectionCloud architect developer implementing ddos protection

What is Zero Touch Provisioning (ZTP)?

Zero Touch Provisioning (ZTP) installs or updates the software on your new devices without you having to do anything.

Placeholder for Security experts for MDR servicesSecurity experts for MDR services

What is a NOC?

A Network Operations Centre (NOC) is a centralised place where information technology teams can monitor the performance and health of a network on a continuous basis. The NOC is the very first line of protection against network disturbances and outages.

Placeholder for Passive optical LANPassive optical LAN

What is passive optical LAN?

Passive Optical LAN speeds up your local network and simultaneously brings down maintenance and hardware costs.