ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Research

  • 5 Steps to Combat Phishing With Intelligence-Powered Security Operations

    Sponsored by: ThreatConnect

    In this year’s first quarter alone, there have been 1 million phishing attacks. This blog serves as a guide for combatting phishing attacks, providing you with 4 strategic principles for dealing with phishing, as well as a 5-step plan. Go on to the full blog to unlock these resources and protect your organization from phishing.

  • Modernize Your Databases With Amazon Aurora And Confluent

    Sponsored by: AWS & Confluent

    Take a look at this data sheet to learn how, by moving to real-time streaming with Confluent and connecting data from any environment to Amazon Aurora, your organization can provide application teams with the data they need faster and deliver new features and capabilities to customers at scale.

  • Power SQL Server With Best-in-Class Infrastructure

    Sponsored by: Cisco and AMD

    Check out this TechTarget blog post for the critical capabilities to explore when deciding on an upgrade for your SQL Server infrastructure.

  • The Future of Digital Retail

    Sponsored by: BytePlus

    How can your organization provide an excellent customer experience to stay competitive in the face of a massive e-commerce wave? Access this white paper to learn about key challenges retailers are facing amidst an evolving digital landscape, next-gen tech solutions that can help retailers re-engineer their e-commerce engines and more.

  • Digital Product Management (DPM): From project thinking to product thinking

    Sponsored by: HCL Technologies

    In this on-demand webinar, get into the details of how companies succeed by embracing a product- and value-centric mindset with Digital Product Management (DPM). The flexibility of digital product management, combined with its focus on customers at the center and a much faster speed-to-market, gives it an edge over project-centric business model.

  • Wakfield Council Overview

    Sponsored by: Inciper

    Supporting bespoke solutions is associated with unwanted long-term overhead. Learn how Inciper was able to help a government district with executing bespoke product delivery using the agile RAPID approach, allowing them to deliver value early in their digital transformation process.

  • Cisco Video 1

    Sponsored by: Cisco

    When Cisco Systems decided to evaluate their service assurance, they realized that it was crucial for their tooling to be modernized. They began to develop a solution that would allow them to optimize service assurance while being able to meet their needs and priorities. That’s where the Nexus Dashboard comes in. Watch this webinar to learn more.

  • Face Cyber Threats With Confidence

    Sponsored by: Spectrum Enterprise

    Increases in cyberattacks and threats for government agencies has caused chronic underinvestment and a shortage of cybersecurity expertise, which has left most organizations unable to support a necessary level of security. Because of this, many leaders are struggling to evolve and combat the threat landscape. Access this white paper to learn more.

  • Disrupting the Kill Chain with WithSecureTM Cloud Protection for Salesforce

    Sponsored by: WithSecure

    Due to their popularity, Salesforce Cloud applications have attracted the attention of cybercriminals. Proactively securing your Salesforce Cloud environment requires understanding the methods that attackers are using. Download this whitepaper to identify various types of advanced threat actors that could target your Salesforce Cloud environment.

  • Passwordless (and keyless) Approach to Cybersecurity Explained:

    Sponsored by: SSH Communications Security Corp.

    For an organization undergoing a digital transformation, determining the proper cybersecurity approach is key. One such approach is passwordless. But what is a passwordless approach to cybersecurity? Dig into this infographic to access a 3-point explanation of passwordless cybersecurity.

  • 7 Ways To Increase Profit Margin In Food Service

    Sponsored by: Accruent

    In an industry overwhelmed with competition, food service managers are tasked with the challenge of increasing profit margins. This white paper outlines 7 tips for doing so while also improving your business’s best practices. Read on to learn how it is possible to find savings in areas that were considered unavoidable costs.

  • Gartner Market Guide

    Sponsored by: ThreatConnect

    In today’s cybersecurity landscape, security teams are pressured to stay a step ahead of attackers. Doing so requires the proper threat intelligence (TI) tools. Gartner has created a market guide to support security teams on their journey of assessing and selecting TI tools. Explore this landing page to unlock 4 of the guide’s recommendations.

  • Advance your AWS cloud Environment with Automatic & Intelligent Observability

    Sponsored by: AWS and Dynatrace

    Download a copy of this e-book to examine the definition of intelligent observability, view 5 ways your company can enhance cloud performance using this method, and review an O11y solution from Dynatrace purpose-built for AWS workloads.

  • Network Performance Monitor vs. PRTG Network Monitor

    Sponsored by: SolarWinds, Inc.

    Finding a cost-effective and efficient network monitoring tool can be a challenge to many security teams. To meet this need, SolarWinds developed Network Performance Monitor, which provides a cross-stack view of events. Read this product overview to unlock 6 benefits of the tool.

  • Cloud Management Solutions: What is Cloud Management?

    Sponsored by: Veritas

    To scale up and bolster security, many businesses are turning to cloud management. But how does cloud management work? This blog overviews the process of cloud management and introduces 3 types of cloud computing services. Read on to learn 16 benefits of cloud management.

  • An Analysis by Synopsys Application Security Testing Services

    Sponsored by: Synopsys (WhiteHat)

    Dive into this analyst report for insights drawn from over 3,900 Synopsys security tests conducted on 2,600 targets (i.e., software or systems), and discover the most pressing vulnerability issues facing the modern enterprise.

  • IT Operations Management (ITOM) and Automation: What IT Pros Need to Know

    Sponsored by: SolarWinds, Inc.

    Automation can free up valuable time for IT pros to focus on things requiring human brain power, but it hasn’t yet reached ubiquity in relation to ITOM. Make the first step and introduce automation into your ITOM with this blog piece, which gives you everything you need to know for a successful transition.

  • The rise of ransomware: Opportunities for access and monetisation

    Sponsored by: Okta

    Cybercriminals have become cleverer than ever before when it comes to finding entry points to initiate ransomware attacks. This white paper analyzes the role identity plays in ransomware defense, advocating for an identity-first zero-trust access approach which positions identity access at the center of the defense. Read on to learn more.

  • Cortex XDR: Outwit. Outmaneuver. Outmatch.

    Sponsored by: Palo Alto Networks

    With recent reports showing $2.2 million as the average ransom demanded by ransomware attackers, organizations need to defend themselves to avoid financial devastation. This webcast looks at dealing with the danger of ransomware, going through a 3-pronged approach to give you the information you need. Watch now to learn more.

  • SAS KPMG Intel Video

    Sponsored by: SAS KPMG Intel

    IFRS 17 promises to have a transformative effect on insurers’ financial reporting. However, the next two years will be highly challenging, as insurers will be tasked with operationalizing IFRS 17. Hear valuable lessons from insurers on the front line and learn why you should invest in your IFRS 17 solution now by watching this webinar.

  • Five key Considerations for Enterprise Cloud Monitoring

    Sponsored by: AWS and Dynatrace

    This e-book gives you 5 key tips for cloud monitoring so that you can enable development, operations/SRE and business teams to get fast feedback on application performance. Download now and use it as an opportunity to revisit your company’s cloud monitoring practices.

  • Why is IT Important to Protect Machine Credentials?

    Sponsored by: SSH Communications Security Corp.

    Machine credentials present a vulnerability which IT need to secure. This data sheet looks at 6 different threats associated with machine credentials. Download the full data sheet to unlock the 6 risks and understand how you can better manage machine credentials.

  • A well-architected AWS solution enabling high availability, complete visibility and enhanced performance for a global publishing house

    Sponsored by: AWS

    Check out this case study to learn how Cloud4C helped the client redesign their architecture from the ground up for a reliable, scalable, secure, and operationally excellent new framework.

  • Advances in server hardware components speed up data centers

    Sponsored by: SearchDataCenter.com

    As data centers grow to meet more data-intensive applications and support larger, more diverse infrastructures, having the right server hardware components is paramount. Access this custom TechTarget editorial piece for a buyer’s handbook to server hardware selection, including a 7-step server maintenance checklist.

  • 5 companies, 1 clear path to cloud success: RISE with SAP on Google Cloud

    Sponsored by: Google

    How can you enable your organization to embark on the cloud migration journey with minimal risk and on your own terms? Access this blog post to understand how 5 companies were able to leverage RISE with SAP and Google Cloud to simplify their cloud migration journey and to learn 4 steps to cloud success.

Browse by Report Type: .NET White Papers | .NET Multimedia | .NET IT Downloads

See more topics related to: .NET

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.