Orange Cyberdefense Datasheets
Download our datasheets

Managed Next Generation Endpoint Security
Attackers are not only attacking vulnerabilities in endpoints but are exploiting features within well-known applications

Managed Next Generation Firewalls
Additional layers of inspection and detection required to increase an organisation’s resilience to an attack

Cyber Defense Training
Defense against attacks under real conditions is the best way to acquire the qualifications and expert knowledge that really helps in an emergency

CSIRT
Incident management and technical advice to help handle a security incident from detection to closure and full recovery

Malware Cleaner
The right protection against viral infections tailored to your business needs. USB keys, external drives, smartphones...

Managed Compliance Monitoring
Provides monitoring, management and reporting designed to address the compliance challenge

Managed Content Filtering
Web browser and email reader are the frequent target of hackers, the rise of malicious web sites and emails has been exponential

Cybersecurity Consultancy
Designed for those whose cybersecurity strategy incorporates regular infrastructure, personnel or application assessments

Managed Application Delivery
Web and discreet applications are the life blood of most organisations, serving customers, third parties, partners, internal users

Threat Advisories
Modern Cyber Security operations involve ingesting and processing a huge amount of information

SecureInsight Awareness Services
Increasing awareness and improving the behavior of employees is a continuous process

Security Maturity Assessment
The perfect entry point for establishing a strategic cyberdefense environment for your business

Managed Detection & Response
A majority of organizations are unclear about whether they are successfully identifying breaches and incidents

Managed Threat Detection SIEM
Only a good threat hunter can recognize and stop attacks that bypass automatic systems. No protection is infallible

Managed Threat Detection Network
By applying supervised Machine Learning techniques, the service can detect threats that have never been seen before

Managed Threat Detection Intelligence
Identify potential cyber threats and monitor customer owned digital assets for brand, data and infrastructure exposure

Managed Vulnerability Scanning
Identify, prioritise and mitigate against important vulnerabilities before cybercriminals can exploit them

Managed Threat Detection Endpoint
The challenge with detection is that today’s threats are not using old malware that is easy to detect and remediate

Industrial Security
Learn more about how we help organizations analyze, plan, integrate and operate OT-specific security systems

Professional Services
Getting security right - our Professional Services provides seasoned security experts, technology specialists, and experienced project managers
Training Courses Datasheets

Hands-on Hacking Fundamentals
Our introductory course for those starting the journey into hacking

Web Application Hacking
Understand the fundamentals of how web applications are built and controlled

Infrastructure Hacking
Aimed at beginner penetration testers wanting to understand infrastructure

Unplugged: Modern WI-FI Hacking
If you want to learn how to understand and compromise Wi-Fi networks, this is your course.