dotnet White Papers

(View All Report Types)
8 Considerations For A Compliant PIA Process
sponsored by OneTrust
WHITE PAPER: Privacy impact assessments (PIAs) are essential for organizations to manage risks to personal data rights. The process, however, has become increasingly intricate due to diverse privacy regulations. This white paper delves into 8 essential PIA considerations to ensure compliance and reduce risk. Read on to gain practical PIA compliance guidance.
Posted: 17 May 2024 | Published: 17 May 2024

TOPICS:  .NET
OneTrust

RANSOMWARE PREVENTION ESSENTIAL GUIDE
sponsored by Checkpoint Software Technologies
WHITE PAPER: Ransomware is a growing threat, with attacks costing millions. This guide provides practical tips to protect your business, including using zero-trust network access and secure web gateways. Learn how to build a secure corporate network and prevent ransomware attacks. Read the white paper to learn more.
Posted: 07 May 2024 | Published: 07 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

5 Ways Event-Driven Automation Can Help You Achieve More
sponsored by Red Hat
WHITE PAPER: Discover how event-driven automation enhances IT proactivity, efficiency, and streamlining in this white paper.
Posted: 07 May 2024 | Published: 07 May 2024

TOPICS:  .NET
Red Hat

Plans Improve Member Care With Better Data
sponsored by LexisNexis
WHITE PAPER: Research from the University of Pennsylvania shows that incomplete records can perpetuate inequities, such as less accurate disease prediction, especially those with lower access to care. Learn how to leverage data, including social determinants of health, to improve whole-person care in this white paper.
Posted: 27 Apr 2024 | Published: 27 Apr 2024

TOPICS:  .NET
LexisNexis

Secure remote access. Simplified.
sponsored by Palo Alto Networks
WHITE PAPER: According to a recent report, 50% of workers now take part in a hybrid work structure. Palo Alto Networks Prisma Access is designed to transform remote access by providing high-performing secure remote access. Download the white paper to learn more.
Posted: 27 Apr 2024 | Published: 27 Apr 2024

TOPICS:  .NET
Palo Alto Networks

PREVENTING NEXT-GENERATION THREATS THROUGH AI AND INNOVATION
sponsored by Checkpoint Software Technologies
WHITE PAPER: The current threat landscape is more untenable than ever before. Enter artificial intelligence (AI). By integrating AI into security technologies, organizations can enhance threat prevention. Download this white paper to learn more.
Posted: 07 May 2024 | Published: 07 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Protecting Against Compromised Accounts in Email
sponsored by Checkpoint Software Technologies
WHITE PAPER: In a single month alone, Checkpoint HEC researchers saw 1,345 unique compromised accounts. In this whitepaper, HEC will discuss how to prevent account takeover from taking control of your business by giving you tips and strategies you can implement to improve security. Read on to learn more.
Posted: 14 May 2024 | Published: 14 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

The IT Automation Imperative
sponsored by Red Hat
WHITE PAPER: Automation is now mission-critical for modern IT. This e-book from Red Hat explores how enterprises can leverage Ansible Automation Platform to fill skill gaps, maximize IT investments, and achieve substantial business value. Read the full report to learn more.
Posted: 14 May 2024 | Published: 14 May 2024

TOPICS:  .NET
Red Hat

Accelerating AdTech Applications With Intel and AWS
sponsored by Intel Tiber App-Level Optimization
WHITE PAPER: Cloud computing and AdTech advancements have transformed digital advertising, but also brought challenges like latency sensitivity and cost-performance balance. This white paper details how AWS and Intel Granulate can help AdTech companies navigate these issues. Read on to learn how you can drive performance for your AdTech applications.
Posted: 15 May 2024 | Published: 15 May 2024

TOPICS:  .NET
Intel Tiber App-Level Optimization

Inbox Incursions Are More Than An Annoyance They Are A Security Risk
sponsored by Checkpoint Software Technologies
WHITE PAPER: An inbox incursion occurs when phishing emails are available to the end user for any length of time, forcing the vendor to remediate them post-delivery. Download this white paper for a deeper look at inbox incursion and the role it plays in the broader topic of email security.
Posted: 09 May 2024 | Published: 09 May 2024

TOPICS:  .NET
Checkpoint Software Technologies