Whitepaper-archief

Laatste onderwerpen:

Fast DC EV Charging: Common Topologies and Power Devices Used in the System

The role of DC Fast charging (DCFC) is clear in removing barriers to EV adoption. The need for shorter charging times has resulted in higher power EV fast charging approaches 400 kW entering the market. In this paper, we will d...

Whitepaper bekijken

SiC MOSFETs: Gate Drive Optimization

For high−voltage switching power applications, silicon carbide or SiC MOSFETs bring notable advantages compared to traditional silicon MOSFETs and IGBTs. Switching high−voltage power rails in excess of 1,000 V, operating at hun...

Whitepaper bekijken

smartCIO Magazine

smartCIO is the magazine for CIOs and IT leaders in EMEA

Whitepaper bekijken

Cloud Security Services

The security landscape has changed drastically in recent years. Today, companies work across distributed cloud environments, while end-users need anytime, anywhere access to data. Instead of securing the perimeter to keep thre...

Gegevensblad bekijken

6 myths of SIEM - Early visibility and rapid response to threats in your environment

To say that security is a hot topic right now is an understatement. The threat landscape has changed drastically in recent years, meaning that every company needs to rethink or review its approach. In the new world of security...

Whitepaper bekijken

Managed SIEM - Early visibility and rapid response to threats in your environment

Organisations are facing more security challenges today than at any time in the past, traditional defences are not working, new technologies introduce new risks, and conventional security practices are unsustainable. This - all...

Oplossingsoverzicht bekijken

Advanced Threat Prevention with VMware NSX Distributed Firewall

Security professionals understand that hackers hide lateral movement inside large volumes of east-west network traffic. Organizations need new tools and techniques to detect and prevent such activity. In this paper, you will l...

E-boek bekijken

Ransomware vs. Multi-Cloud: How to Protect Multi-Cloud Environments From the Next Attack

Though the scale and economics of the cloud are a boon for today’s enterprise, moving applications and data out of the data center into multi-cloud environments has greatly expanded threat surfaces, putting enterprises at great...

Rapport bekijken

THREAT REPORT: Exposing Malware in Linux-Based Multi-Cloud Environments

90% of cloud runs on Linux. So, is it any wonder that malware is propagating in multi-cloud environments under the radar? Current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments ...

Rapport bekijken

Internal Firewalls for Dummies Guide

Organizations can no longer rely on edge firewalls alone to provide network security. Once attackers get past an edge firewall, they can move laterally to high-value assets. This book illustrates how internal firewalls can help...

Rapport bekijken
Registreer u voor onze nieuwsbrief
Het belangrijkste nieuws gratis via e-mail