Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Current »

We have a variety of applications integrated with Devo that cover additional needs in a more specific way. Find information about them in this section.

SecOps - Phishing use case

Learn how to deal with a phishing attack and identify the potential consequences.

SecOps - Command & Control use case

Learn how to deal with a C&C attack and identify the potential consequences.

  • No labels