Research Library

Powered by

.NET Research

  • The Ultimate Pia And Dpia Handbook For Privacy Professionals

    Sponsored by: OneTrust

    Privacy Impact Assessments (PIAs) and Data Protection Impact Assessment (DPIAs) are fundamental to evaluating an organization’s privacy activities, and to mitigating risks as efficiently as possible. This e-book serves as a guide to implementing PIA and DPIA protocols within your organization. Read on to learn more.

  • VMware Ransomware Recovery

    Sponsored by: VMware

    Download this white paper to learn everything you need to know about VMware Ransomware Recovery, a fully managed as-a-Service solution that enables safe recovery from modern ransomware.

  • The Data Center of Tomorrow Starts Today

    Sponsored by: Fortinet, Inc.

    As the modern network continues to emphasize a convergence of on-premises data centers and hybrid-cloud environments, there is an increasing need for flexible and adaptable security. This white paper looks at the security challenges facing modern hybrid data centers, providing you with 5 key elements to improve security. Read now to learn more.

  • A Short, Complete Guide to Intent Data for Sales and Marketing

    Sponsored by: TechTarget

    Dive into this TechTarget white paper to learn how you can accelerate your own journey with intent data – whatever stage you’re at.

  • 2022 DNS Discoveries

    Sponsored by: Cisco

    The domain name system (DNS) is pivotal in connecting websites and getting the most out of applications. But DNS was never meant to secure your web applications.This report looks at the state of DNS security, highlighting the 4 key threats facing DNS and providing strategies for preparing for and mitigating them. Read on to learn more.

  • Securing OT, Remote Access, and Converged SOC Operations

    Sponsored by: Fortinet, Inc.

    Previously air-gapped OT environments are now increasingly connected due to DX initiatives and the growing need for highly skilled technicians to support dispersed industrial assets remotely. Discover how to secure your converged IT/OT networks as an industrial CIO or CISO, and how Fortinet Security Fabric can help, in this e-book.

  • “We Are Very Serious About Cyber Security And Through Our Security Ambassadors’ Program We Continuously Educate Our People About Cyber Risk. Lastpass Is A Core Tenant In Mitigating That Risk.”

    Sponsored by: GoTo

    Seeking a tool that would provide a convenient way to share credentials (internally and externally) with trusted partners became Mary Kay’s priority. Read the case study to examine Mary Kay’s success with LastPass’ password management solution, which is now integral to their security awareness program.

  • Enterprise Bank Connectivity & Financial Messaging

    Sponsored by: TIS

    Numerous connection types and channels comprise the financial technology landscape, making management a complex undertaking for treasury groups. TIS is here to help. How? By optimizing enterprise bank connectivity and financial messaging. Learn more in this white paper.

  • Introducing Endace Network History

    Sponsored by: Endace

    Though they deliver great power, advancing networks also present monitoring challenges. Endace’s response to these challenges is Network History. How does Network History work? It records copies of the packets that traverse your network, allowing you to gain insights from them when an attack strikes. Learn more about the tool in this overview.

  • Fortinet Secure Application Journey Solutions

    Sponsored by: Fortinet, Inc.

    Discover in this data sheet how Fortinet Secure Application Journey solutions can help empower your organization with consistent, secured, and optimized tools to build, deploy, and run cloud applications across all deployments — wherever your applications will live.

  • EndaceProbe Analytics Platform and Cisco Stealthwatch

    Sponsored by: Endace

    When a threat enters your network, you need to investigate it quickly. Endace and Cisco have teamed up to help you do so. Read this overview to learn how you can enhance your incident response by integrating EndaceProbe’s network packet history with Cisco Stealthwatch.

  • Questions to Build your L&D Strategy on Strong Digital Foundations

    Sponsored by: Go1

    Build an L&D strategy on strong digital foundations by asking yourself these 6 questions. Download this infographic to access them now.

  • Fortinet Secure Application Journey Solutions

    Sponsored by: Fortinet, Inc.

    Discover in this data sheet how Fortinet Secure Application Journey can help your organization protect business-critical applications from attacks between all cloud and hybrid cloud instances, to help deliver the best application experiences possible.

  • Splunk Sanofi Alexander Kreussler

    Sponsored by: Splunk

    Join in this webinar Sanofi's Head of Global Monitoring Services, Alexander Kreussler, as he shares his Splunk journey, including migrating legacy and application monitoring infrastructure.

  • U.S. Department of Energy - Savannah River Site

    Sponsored by: Advanced

    Discover in this case study the success story of U.S. Department of Energy Savannah River Operations Office’s modernization efforts, and how Advanced streamlined natural rehosting with the Application Transparency Platform (ATP) rehosting product.

  • Employer of Record Simplify Your Ability to Expand Globally

    Sponsored by: Atlas Technology Solutions

    Risks and costs dot a business’s path to global expansion. To simplify the process, employer of record (EOR) services have emerged. Dig into this e-book for an EOR deep dive.

  • Secure by Default: How to Build Your Cloud Architecture From the Back

    Sponsored by: Contino

    In this blog post, take a look at the principles that organizations should follow — from both a technical and cultural perspective — to both bolster design methodology and fully integrate secure by default thinking into every architectural decision.

  • Enhance Your Disaster Recovery Strategy with QoreStor

    Sponsored by: Quest

    Major natural disasters, such as hurricanes, floods, earthquakes, and more can heavily impact your organization. While you can’t control or prevent these events, you can prepare for them. This white paper explores how QoreStor can allow you to effectively backup your data and implement an enhanced disaster recovery strategy. Read now to learn more.


    Sponsored by: CrowdStrike

    It is up to MSSPs to protect their customers from breaches. And, in the face of increasing cyberattacks, that mission is more challenging than ever. To help MSSPs level up their breach protection, CrowdStrike developed Falcon MSSP Advanced Defend. Learn all about it in this data sheet.

  • Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29 (v1.3)

    Sponsored by: Mandiant

    APT29 and other threat actors have used several methodologies to move laterally from on-premises networks to the cloud, specifically Microsoft 365.This white paper is designed to help organizations understand the attack techniques employed by APT29 and remediate environments where similar techniques have been observed.Download now to learn more.

  • Faster time to market for new AI services with AWS

    Sponsored by: AllCloud

    GmbH, is a telematics specialist company that decided to move its GPS FLEET software solution to the AWS cloud. This enabled the firm to develop innovative AI services soon afterwards, such as its Health Index for machines. Access the case study here to learn more about how to unlock AI services with your move to AWS.

  • Protecting Applications, Data, and Users with Next-Generation CASB

    Sponsored by: Palo Alto Networks

    With hundreds of SaaS applications, each with a unique mix of settings, it can be difficult for IT and security teams to ensure resources are properly configured, protected, and compliant. Download this ESG white paper to explore today’s changing IT environments in detail and unlock key attributes for next-generation CASBs.

  • American Airlines Delivers the Goods

    Sponsored by: HP NVIDIA and Future Tech

    American Airlines needed a way to optimize the configuration of their freight and become more efficient as a business. Tap into this case study to learn how they were able to leverage machine learning to flag at-risk shipments and enable agents to focus on high-priority bookings – leading to a massive improvement in planning cargo freights.


    Sponsored by: HP NVIDIA and Connection

    Without modern tools, organizations risk falling victim to bigger problems like reduced productivity and profitability. Access this e-book to learn about today’s most advanced AECO technology trends and to understand how AI and deep learning-enabled software can empower your business to optimize your design process.

  • IT Asset Cost Reduction

    Sponsored by: Riverbed

    You want to cut your IT expenses—but not at the expense of your employees’ digital experiences. So, how can you accomplish that goal? Download this overview to understand how Riverbed’s solutions can get you started.

Browse by Report Type: .NET White Papers | .NET Multimedia | .NET IT Downloads

See more topics related to: .NET

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.