www.orangecyberdefense.com
Open in
urlscan Pro
2.23.7.17
Public Scan
Submitted URL: https://www4.orangecyberdefense.com/e/865272/m-email-utm-campaign-microsoft/brfcxz/2650384391?h=QlTe8N-gyprKiOEF0fWWuJ7vvwh3ahR2Lcz_...
Effective URL: https://www.orangecyberdefense.com/global/insights/events/webcast-microsoft?utm_source=pardot&utm_medium=email&utm_campaign=microsoft
Submission: On June 20 via manual from GB — Scanned from GB
Effective URL: https://www.orangecyberdefense.com/global/insights/events/webcast-microsoft?utm_source=pardot&utm_medium=email&utm_campaign=microsoft
Submission: On June 20 via manual from GB — Scanned from GB
Form analysis
2 forms found in the DOMhttps://www.orangecyberdefense.com/global/search
<form class="search-form-desktop search-form" id="search-form-desktop" itemprop="potentialAction" itemscope="" itemtype="https://schema.org/SearchAction" action="https://www.orangecyberdefense.com/global/search">
<meta itemprop="target" content="https://www.orangecyberdefense.com/global/search?tx_solr[q]={search_term_string}">
<input hidden="" itemprop="query-input" name="search_term_string">
<input id="search-desktop" type="search" name="tx_solr[q]" value="" placeholder="Search">
<button type="submit" class="submit-button">
<span class="icon-search-form-button icon-search"></span>
</button>
</form>
/global/search
<form class="search-form-mobile search-form" id="search-form-mobile" action="/global/search">
<div class="top-bar">
<p class="label--large"> Search </p>
<button type="button" id="close-search-button" class="icon-close icon-close-white">
<span class="sr-only"> Close </span>
</button>
</div>
<div class="bottom-bar">
<label class="label--large"> Search </label>
<div class="input--wrapper">
<input id="search-mobile" type="search" name="tx_solr[q]" value="">
<button type="submit" class="submit-button">
<span class="icon-search-form-button icon-search"></span>
</button>
</div>
</div>
</form>
Text Content
* Services * Services * Training * Assess & Advise * Design & Implement * Operate & Support * Detect & Respond * Solutions * Solutions * SASE: Secure Access Service Edge * Security for Microsoft * Vulnerability Management * Industrial System Cybersecurity * Cloud Security * Endpoint Security * Application Security * Data-centric Security * Identity & Access Management * Secure Infrastructure * Security Intelligence * Industries * Industries * Security for Retail and E-commerce * Security for Manufacturing * Security for Energy & Power * Security for Financial Services & Insurance * Security for Healthcare * Insights * Insights * Videos * Hot Topics * Research & Intelligence * Datasheets * Whitepapers & reports * Blog * Events * News & Press room * Case studies * About us * About us * Market recognition * News & Press room * Research & Intelligence * Certifications * Careers * Contact * Search * Incident Response Hotline Incident Response Hotline Facing cyber incidents right now? Contact our 24/7/365 world wide service incident response hotline. CSIRT * Menu Menu * Services * Solutions * Industries * Insights * About us * Careers * Contact * Back to menu * Services * Training * Assess & Advise * Design & Implement * Operate & Support * Detect & Respond * Back to menu * Solutions * SASE: Secure Access Service Edge * Security for Microsoft * Vulnerability Management * Industrial System Cybersecurity * Cloud Security * Endpoint Security * Application Security * Data-centric Security * Identity & Access Management * Secure Infrastructure * Security Intelligence * Back to menu * Industries * Security for Retail and E-commerce * Security for Manufacturing * Security for Energy & Power * Security for Financial Services & Insurance * Security for Healthcare * Back to menu * Insights * Videos * Hot Topics * Research & Intelligence * Datasheets * Whitepapers & reports * Blog * Events * News & Press room * Case studies * Back to menu * About us * Market recognition * News & Press room * Research & Intelligence * Certifications * Back to menu * Careers * Back to menu * Contact * Back to services * Training * Back to services * Assess & Advise * Security Maturity Assessment * Cloud Security Maturity Assessment * Mobile Assessments * Compromise Assessment * Security Consulting * Secure Architecture Consulting * Goal oriented penetration testing * Security Compliance * GDPR compliance assessments * Advanced Footprint * Red Team Services * Spot Check Penetration Testing * Infrastructure Security Assessments * Internal Infrastructure Assessments * Back to services * Design & Implement * Project Management * Engineering Services * Back to services * Operate & Support * Malware Cleaner * Managed Threat Detection [Network] for Microsoft 365 * Managed Threat Detection [xdr] for Microsoft 365 Defender * Managed Workspace Protection for Microsoft 365 Defender * Managed SOAR * CISO as a Service * Managed Cloud Security [Infrastructure] * Active Prevention (IDS&IPS) * Managed firewall * Managed access and authentication * Managed application delivery * Managed web content filtering * Managed Compliance Monitoring * Managed Application Security * Helpdesk * Managed Two Factor Authentication * Managed DDoS Protection * Managed next generation endpoint security * Managed web application firewall * Back to services * Detect & Respond * Malicious File Detection * Managed Threat Detection [log] – Standard * Managed Threat Detection [log] – Premium * Managed Threat Detection [log] for Microsoft Sentinel * Managed Threat Detection [network] for O365 * Managed Threat Detection [xdr] * Cyber Security Incident Response * Managed Detection and Response for the cloud * Managed Cybercrime Monitoring * Managed Threat Response [isolation] * 24/7 aid with cyber incidents * Back to solutions * SASE: Secure Access Service Edge * Back to solutions * Security for Microsoft * Defend Against Threats with SIEM Plus XDR usage Workshop * Back to solutions * Vulnerability Management * Back to solutions * Industrial System Cybersecurity * Industrial Network Surveilance * Industrial Remote Access * Industrial Endpoint Protection * ICS Malware Cleaner * ICS Asset Inventory * IT/OT Segmentation * Industrial Information & Event Management * ICS Mock-up * Back to solutions * Cloud Security * Back to solutions * Endpoint Security * Back to solutions * Application Security * Back to solutions * Data-centric Security * Back to solutions * Identity & Access Management * Flexible Applications Access * Flexible Identity Authentification * Back to solutions * Secure Infrastructure * SIEM & Log Management * Network Security * Intrusion Detection * Advanced WAF * User Behavior Analytics * Security Automation and Orchestration (SAO) * Email Web Security * Network Access Control * Next Generation Firewalling * Back to solutions * Security Intelligence * Threat Intelligence * World Watch * Back to industries * Security for Retail and E-commerce * Back to industries * Security for Manufacturing * Back to industries * Security for Energy & Power * Back to industries * Security for Financial Services & Insurance * Back to industries * Security for Healthcare * Back to insights * Videos * Back to insights * Hot Topics * International Women's Day * Zero Trust * Want to take some cyber self-defense classes? * Cybersecurity with Palo Alto Networks * Security Navigator * Kaseya ransomware attack * Cyber Crisis Management * Connecting the dots * Intelligence-led security * RSA 2021: The router of all evil * Covid-19 and Cyberdefense * MDR buyer's guide * World Webcast * Back to insights * Research & Intelligence * Fresh from the research labs * Cybercrime Infrastructure * Back to insights * Datasheets * Back to insights * Whitepapers & reports * Back to insights * Blog * Research News * Video Games * Innovation * Back to insights * Events * Cybersecurity Leadership Summit: Bringing together global decision makers * Cybersecurity Leadership Summit: Bringing together global decision makers * Cybersecurity Leadership Summit: Bringing together global decision makers * Cybersecurity Leadership Summit: FAQs * Past * Back to insights * News & Press room * Download: Images * Download: PR-kit * Download: Logos * Orange Cyberdefense News * Research * Partners * Back to insights * Case studies * Back to about us * Market recognition * ISG * MSSP Alert * Omdia * IDC * GlobalData * Gartner * Forrester * Everest Group * Back to about us * News & Press room * Back to about us * Research & Intelligence * Back to about us * Certifications Search Close Search 1. Orange Cyberdefense 2. Insights 3. Events 4. Webcast: Optimize the value of your security investment with Orange Cyberdefense & Microsoft OPTIMIZE THE VALUE OF YOUR SECURITY INVESTMENT WITH ORANGE CYBERDEFENSE & MICROSOFT EMBRACE WORLD-CLASS HOLISTIC SECURITY YOU CAN COUNT ON REIMAGINE WHAT’S POSSIBLE FOR CYBERSECURITY IN THE CLOUD WITH ORANGE CYBERDEFENSE AND MICROSOFT. Microsoft offers robust cybersecurity solutions designed to integrate seamlessly into your organization’s broader Microsoft environment and build cybersecurity into the very core of your digital landscape. Orange Cyberdefense helps you capitalize on the power of these cybersecurity solutions and integrate them with a broader cybersecurity strategy, by offering intelligence-led expertise and enterprise-level capacity – the kind of expertise and capacity that are costly to maintain in-house. KEY TOPICS: * Current state of cybersecurity * Better together: Orange Cyberdefense and Microsoft * Outsource and redefine your SOC for continuous protection * Use intelligence-led approaches to enhance security posture * Implement a broader cybersecurity strategy and roadma * Open Q&A with Orange Cyberdefense and Microsoft experts SPEAKERS/PRESENTERS: 1. Sebastiaan Drinkenburg, Senior Technical Security Specialist, Microsoft 2. Sarah Armstrong-Smith, Chief Security Advisor, Microsoft 3. Anna Barkvall, Director of Strategic Programs, Orange Cyberdefense Let’s start a conversation about how you can make cybersecurity work for you to start protecting your organization and your bottom line. DETAILS Date: June 22nd Time: 16:00 - 17:00 CET U.S - 10:00 am - 11:00 am EDT JOIN THE CYBERSECURITY CONVERSATION! MORE ON MICROSOFT Ebook: Optimizing your Microsoft Security * Microsoft * Microsoft Security for Microsoft Orange Cyberdefense collaborates with Microsoft to enhance security with two new managed services 15 March 2023 * Press Release * Partners * Press Release Contact our experts Country SelectEnglish -------------------------------------------------------------------------------- Contact info@orangecyberdefense.com -------------------------------------------------------------------------------- Incident response hotline Contact our 24/7/365 world wide service incident response hotline. Follow us on social * * * -------------------------------------------------------------------------------- Quick links * Intelligence-led security * MDR buyer's guide * Research & Intelligence * Blog © 2023 Orange Cyberdefense * Privacy policy * Contact * Cookie policy * Disclaimer * Legal Notice Incident Response Hotline Facing cyber incidents right now? Contact our 24/7/365 world wide service incident response hotline. CSIRT Incident Response Hotline By clicking “Accept Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookies Settings Reject All Accept All Cookies COOKIE PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * FUNCTIONAL COOKIES * PERFORMANCE COOKIES * TARGETING COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button BACK Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label * View Third Party Cookies * Name cookie name Clear checkbox label label Apply Cancel Confirm My Choices Allow All