Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Converted from version 'v7.1.0'.

We have a variety of applications integrated with Devo that cover additional needs in a more specific wayways. Find information about them in this section.

SecOps - Phishing use case

Learn how to deal with a phishing attack and identify the potential consequences.

Sectioninfo
Column
Widget Connector
width400
urlhttp://youtube.com/watch?v=ydMZ-1QM9ek
height200

Expand
titleRelated articles (click to expand)
Column

SecOps - Command & Control use case

Learn how to deal with a C&C attack and identify the potential consequences.

Widget Connector
width400
urlhttp://youtube.com/watch?v=Jkl4bholkOY
height200

Expand
titleRelated articles (click to expand)
  • Devo Security Operations
  • Command & Control
    titleNavigating videos

    Click on the bullets below to show the corresponding video and place the cursor over a video to pause the loop.