dotnet White Papers

(View All Report Types)
Intermedia Archiving Automatically Preserve, Protect, And Retrieve Your Critical Business Communications
sponsored by Intermedia
WHITE PAPER: Today, organizations are leveraging a variety of communication tools, including chat, SMS, calls, and video to enhance their collaboration efforts. However, with this comes the potential for insecure sharing of business-critical information and data, which can hurt a company immensely. Access this white paper to learn more.
Posted: 29 May 2024 | Published: 29 May 2024

TOPICS:  .NET
Intermedia

SAP GRC Framework Integration with One Identity Manager
sponsored by One Identity
WHITE PAPER: Built in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.
Posted: 30 May 2024 | Published: 30 May 2024

TOPICS:  .NET
One Identity

Embrace Innovation While Securely Growing your Business
sponsored by Palo Alto Networks
WHITE PAPER: Modern organizations face a tricky balancing act: They have to securely grow while they embrace innovation. To unlock guidance for addressing that challenge, browse this white paper.
Posted: 22 May 2024 | Published: 22 May 2024

TOPICS:  .NET
Palo Alto Networks

The Journey from Open Banking to BaaS: Ensuring a Robust Quality Assurance Strategy
sponsored by Qualitest Group
WHITE PAPER: This white paper explores the evolution from open banking to Banking-as-a-Service, highlighting the need for robust quality assurance strategies. It covers open banking, open finance, and the transition to BaaS, with insights on testing, monitoring, and release management. Read the full white paper to learn more.
Posted: 14 May 2024 | Published: 14 May 2024

TOPICS:  .NET
Qualitest Group

Self-managed Kubernetes is easier than you think
sponsored by Rumble Cloud
WHITE PAPER: To unlock more control and higher cost efficiency, many businesses are self-managing their Kubernetes. Dig into this brief guide to learn how you can do the same.
Posted: 22 May 2024 | Published: 22 May 2024

TOPICS:  .NET
Rumble Cloud

8 Considerations For A Compliant PIA Process
sponsored by OneTrust
WHITE PAPER: Privacy impact assessments (PIAs) are essential for organizations to manage risks to personal data rights. The process, however, has become increasingly intricate due to diverse privacy regulations. This white paper delves into 8 essential PIA considerations to ensure compliance and reduce risk. Read on to gain practical PIA compliance guidance.
Posted: 17 May 2024 | Published: 17 May 2024

TOPICS:  .NET
OneTrust

Is Your Enterprise Network Ready for What’s Next in CX and EX?
sponsored by Comcast Business
WHITE PAPER: As customer experience (CX) and employee experience (EX) expectations evolve, can your enterprise network keep up? To help you confidently answer yes, this white paper breaks down 5 components of a future-ready network. Keep reading to access the full insights.
Posted: 17 May 2024 | Published: 17 May 2024

TOPICS:  .NET
Comcast Business

NIS2 Compliance Checklist: Ensuring Network and Information Security
sponsored by Exeon
WHITE PAPER: In its updated directive, NIS2 expands its scope, impacting new sectors like energy, banking and more. So, does your organization fall under the new scope? Find out in this white paper, which provides a 9-point checklist for achieving NIS2 compliance.
Posted: 31 May 2024 | Published: 31 May 2024

TOPICS:  .NET
Exeon

Why the Zero-Click Attack on Outlook Is a Game-Changer for Email Security
sponsored by Checkpoint Software Technologies
WHITE PAPER: In March, Microsoft disclosed the CVE-2023- 23307 vulnerability, a threat impacting Outlook with a 9.8 CVSS Rating. Download this white paper to see how Checkpoint’s Harmony Email & Collaboration (HEC) API can prevent malicious emails from reaching the inbox.
Posted: 10 May 2024 | Published: 10 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Five Best Practices For Securing Your Software Supply Chain
sponsored by Docker
WHITE PAPER: Traditional software development is often characterized by fragmented processes, long release cycles, and security vulnerabilities. This white paper explores how you can confidently pave the way for faster, more reliable, and more efficient software development and deployment, through a secure software supply chain (SSC). Read on to learn more.
Posted: 14 May 2024 | Published: 14 May 2024

TOPICS:  .NET
Docker