www.orangecyberdefense.com Open in urlscan Pro
2.23.7.17  Public Scan

Submitted URL: https://www4.orangecyberdefense.com/e/865272/m-email-utm-campaign-microsoft/brfcxz/2650384391?h=QlTe8N-gyprKiOEF0fWWuJ7vvwh3ahR2Lcz_...
Effective URL: https://www.orangecyberdefense.com/global/insights/events/webcast-microsoft?utm_source=pardot&utm_medium=email&utm_campaign=microsoft
Submission: On June 20 via manual from GB — Scanned from GB

Form analysis 2 forms found in the DOM

https://www.orangecyberdefense.com/global/search

<form class="search-form-desktop search-form" id="search-form-desktop" itemprop="potentialAction" itemscope="" itemtype="https://schema.org/SearchAction" action="https://www.orangecyberdefense.com/global/search">
  <meta itemprop="target" content="https://www.orangecyberdefense.com/global/search?tx_solr[q]={search_term_string}">
  <input hidden="" itemprop="query-input" name="search_term_string">
  <input id="search-desktop" type="search" name="tx_solr[q]" value="" placeholder="Search">
  <button type="submit" class="submit-button">
    <span class="icon-search-form-button icon-search"></span>
  </button>
</form>

/global/search

<form class="search-form-mobile search-form" id="search-form-mobile" action="/global/search">
  <div class="top-bar">
    <p class="label--large"> Search </p>
    <button type="button" id="close-search-button" class="icon-close icon-close-white">
      <span class="sr-only"> Close </span>
    </button>
  </div>
  <div class="bottom-bar">
    <label class="label--large"> Search </label>
    <div class="input--wrapper">
      <input id="search-mobile" type="search" name="tx_solr[q]" value="">
      <button type="submit" class="submit-button">
        <span class="icon-search-form-button icon-search"></span>
      </button>
    </div>
  </div>
</form>

Text Content

 * Services
   * Services
   * Training
   * Assess & Advise
   * Design & Implement
   * Operate & Support
   * Detect & Respond
 * Solutions
   * Solutions
   * SASE: Secure Access Service Edge
   * Security for Microsoft
   * Vulnerability Management
   * Industrial System Cybersecurity
   * Cloud Security
   * Endpoint Security
   * Application Security
   * Data-centric Security
   * Identity & Access Management
   * Secure Infrastructure
   * Security Intelligence
 * Industries
   * Industries
   * Security for Retail and E-commerce
   * Security for Manufacturing
   * Security for Energy & Power
   * Security for Financial Services & Insurance
   * Security for Healthcare
 * Insights
   * Insights
   * Videos
   * Hot Topics
   * Research & Intelligence
   * Datasheets
   * Whitepapers & reports
   * Blog
   * Events
   * News & Press room
   * Case studies
 * About us
   * About us
   * Market recognition
   * News & Press room
   * Research & Intelligence
   * Certifications
 * Careers
 * Contact

 * Search
 * Incident Response Hotline
   
   Incident Response Hotline
   
   Facing cyber incidents right now?
   
   Contact our 24/7/365 world wide service incident response hotline.
   
   CSIRT
 * Menu

Menu
 * Services
 * Solutions
 * Industries
 * Insights
 * About us
 * Careers
 * Contact

 * Back to menu
 * Services
 * Training
 * Assess & Advise
 * Design & Implement
 * Operate & Support
 * Detect & Respond

 * Back to menu
 * Solutions
 * SASE: Secure Access Service Edge
 * Security for Microsoft
 * Vulnerability Management
 * Industrial System Cybersecurity
 * Cloud Security
 * Endpoint Security
 * Application Security
 * Data-centric Security
 * Identity & Access Management
 * Secure Infrastructure
 * Security Intelligence

 * Back to menu
 * Industries
 * Security for Retail and E-commerce
 * Security for Manufacturing
 * Security for Energy & Power
 * Security for Financial Services & Insurance
 * Security for Healthcare

 * Back to menu
 * Insights
 * Videos
 * Hot Topics
 * Research & Intelligence
 * Datasheets
 * Whitepapers & reports
 * Blog
 * Events
 * News & Press room
 * Case studies

 * Back to menu
 * About us
 * Market recognition
 * News & Press room
 * Research & Intelligence
 * Certifications

 * Back to menu
 * Careers

 * Back to menu
 * Contact

 * Back to services
 * Training

 * Back to services
 * Assess & Advise
 * Security Maturity Assessment
 * Cloud Security Maturity Assessment
 * Mobile Assessments
 * Compromise Assessment
 * Security Consulting
 * Secure Architecture Consulting
 * Goal oriented penetration testing
 * Security Compliance
 * GDPR compliance assessments
 * Advanced Footprint
 * Red Team Services
 * Spot Check Penetration Testing
 * Infrastructure Security Assessments
 * Internal Infrastructure Assessments

 * Back to services
 * Design & Implement
 * Project Management
 * Engineering Services

 * Back to services
 * Operate & Support
 * Malware Cleaner
 * Managed Threat Detection [Network] for Microsoft 365
 * Managed Threat Detection [xdr] for Microsoft 365 Defender
 * Managed Workspace Protection for Microsoft 365 Defender
 * Managed SOAR
 * CISO as a Service
 * Managed Cloud Security [Infrastructure]
 * Active Prevention (IDS&IPS)
 * Managed firewall
 * Managed access and authentication
 * Managed application delivery
 * Managed web content filtering
 * Managed Compliance Monitoring
 * Managed Application Security
 * Helpdesk
 * Managed Two Factor Authentication
 * Managed DDoS Protection
 * Managed next generation endpoint security
 * Managed web application firewall

 * Back to services
 * Detect & Respond
 * Malicious File Detection
 * Managed Threat Detection [log] – Standard
 * Managed Threat Detection [log] – Premium
 * Managed Threat Detection [log] for Microsoft Sentinel
 * Managed Threat Detection [network] for O365
 * Managed Threat Detection [xdr]
 * Cyber Security Incident Response
 * Managed Detection and Response for the cloud
 * Managed Cybercrime Monitoring
 * Managed Threat Response [isolation]
 * 24/7 aid with cyber incidents

 * Back to solutions
 * SASE: Secure Access Service Edge

 * Back to solutions
 * Security for Microsoft
 * Defend Against Threats with SIEM Plus XDR usage Workshop

 * Back to solutions
 * Vulnerability Management

 * Back to solutions
 * Industrial System Cybersecurity
 * Industrial Network Surveilance
 * Industrial Remote Access
 * Industrial Endpoint Protection
 * ICS Malware Cleaner
 * ICS Asset Inventory
 * IT/OT Segmentation
 * Industrial Information & Event Management
 * ICS Mock-up

 * Back to solutions
 * Cloud Security

 * Back to solutions
 * Endpoint Security

 * Back to solutions
 * Application Security

 * Back to solutions
 * Data-centric Security

 * Back to solutions
 * Identity & Access Management
 * Flexible Applications Access
 * Flexible Identity Authentification

 * Back to solutions
 * Secure Infrastructure
 * SIEM & Log Management
 * Network Security
 * Intrusion Detection
 * Advanced WAF
 * User Behavior Analytics
 * Security Automation and Orchestration (SAO)
 * Email Web Security
 * Network Access Control
 * Next Generation Firewalling

 * Back to solutions
 * Security Intelligence
 * Threat Intelligence
 * World Watch

 * Back to industries
 * Security for Retail and E-commerce

 * Back to industries
 * Security for Manufacturing

 * Back to industries
 * Security for Energy & Power

 * Back to industries
 * Security for Financial Services & Insurance

 * Back to industries
 * Security for Healthcare

 * Back to insights
 * Videos

 * Back to insights
 * Hot Topics
 * International Women's Day
 * Zero Trust
 * Want to take some cyber self-defense classes?
 * Cybersecurity with Palo Alto Networks
 * Security Navigator
 * Kaseya ransomware attack
 * Cyber Crisis Management
 * Connecting the dots
 * Intelligence-led security
 * RSA 2021: The router of all evil
 * Covid-19 and Cyberdefense
 * MDR buyer's guide
 * World Webcast

 * Back to insights
 * Research & Intelligence
 * Fresh from the research labs
 * Cybercrime Infrastructure

 * Back to insights
 * Datasheets

 * Back to insights
 * Whitepapers & reports

 * Back to insights
 * Blog
 * Research News
 * Video Games
 * Innovation

 * Back to insights
 * Events
 * Cybersecurity Leadership Summit: Bringing together global decision makers
 * Cybersecurity Leadership Summit: Bringing together global decision makers
 * Cybersecurity Leadership Summit: Bringing together global decision makers
 * Cybersecurity Leadership Summit: FAQs
 * Past

 * Back to insights
 * News & Press room
 * Download: Images
 * Download: PR-kit
 * Download: Logos
 * Orange Cyberdefense News
 * Research
 * Partners

 * Back to insights
 * Case studies

 * Back to about us
 * Market recognition
 * ISG
 * MSSP Alert
 * Omdia
 * IDC
 * GlobalData
 * Gartner
 * Forrester
 * Everest Group

 * Back to about us
 * News & Press room

 * Back to about us
 * Research & Intelligence

 * Back to about us
 * Certifications




Search

Close
Search

 1. Orange Cyberdefense
 2. Insights
 3. Events
 4. Webcast: Optimize the value of your security investment with Orange
    Cyberdefense & Microsoft


OPTIMIZE THE VALUE OF YOUR SECURITY INVESTMENT WITH ORANGE CYBERDEFENSE &
MICROSOFT


EMBRACE WORLD-CLASS HOLISTIC SECURITY YOU CAN COUNT ON

REIMAGINE WHAT’S POSSIBLE FOR CYBERSECURITY IN THE CLOUD WITH ORANGE
CYBERDEFENSE AND MICROSOFT.

Microsoft offers robust cybersecurity solutions designed to integrate seamlessly
into your organization’s broader Microsoft environment and build cybersecurity
into the very core of your digital landscape.

Orange Cyberdefense helps you capitalize on the power of these cybersecurity
solutions and integrate them with a broader cybersecurity strategy, by offering
intelligence-led expertise and enterprise-level capacity – the kind of expertise
and capacity that are costly to maintain in-house.

KEY TOPICS: 

 * Current state of cybersecurity
 * Better together: Orange Cyberdefense and Microsoft
 * Outsource and redefine your SOC for continuous protection
 * Use intelligence-led approaches to enhance security posture
 * Implement a broader cybersecurity strategy and roadma
 * Open Q&A with Orange Cyberdefense and Microsoft experts

SPEAKERS/PRESENTERS:

 1. Sebastiaan Drinkenburg, Senior Technical Security Specialist, Microsoft
 2. Sarah Armstrong-Smith, Chief Security Advisor, Microsoft
 3. Anna Barkvall, Director of Strategic Programs, Orange Cyberdefense

Let’s start a conversation about how you can make cybersecurity work for you to
start protecting your organization and your bottom line.


DETAILS

Date: June 22nd

Time: 16:00 - 17:00 CET 

U.S - 10:00 am - 11:00 am EDT


JOIN THE CYBERSECURITY CONVERSATION!


MORE ON MICROSOFT

Ebook: Optimizing your Microsoft Security
 * Microsoft
 * Microsoft

Security for Microsoft
Orange Cyberdefense collaborates with Microsoft to enhance security with two new
managed services

15 March 2023

 * Press Release
 * Partners
 * Press Release

Contact our experts

Country SelectEnglish

--------------------------------------------------------------------------------

Contact

info@orangecyberdefense.com

--------------------------------------------------------------------------------

Incident response hotline

Contact our 24/7/365 world wide service incident response hotline.

Follow us on social

 * 
 * 
 * 

--------------------------------------------------------------------------------

Quick links

 * Intelligence-led security
 * MDR buyer's guide
 * Research & Intelligence
 * Blog

© 2023 Orange Cyberdefense
 * Privacy policy
 * Contact
 * Cookie policy
 * Disclaimer
 * Legal Notice

Incident Response Hotline

Facing cyber incidents right now?

Contact our 24/7/365 world wide service incident response hotline.

CSIRT
Incident Response Hotline


By clicking “Accept Cookies”, you agree to the storing of cookies on your device
to enhance site navigation, analyze site usage, and assist in our marketing
efforts.

Cookies Settings Reject All Accept All Cookies



COOKIE PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * FUNCTIONAL COOKIES


 * PERFORMANCE COOKIES


 * TARGETING COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


BACK

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * View Third Party Cookies
    * Name
      cookie name


Clear
checkbox label label
Apply Cancel
Confirm My Choices
Allow All