Whitepaper archive

Latest topics:

Fast DC EV Charging: Common Topologies and Power Devices Used in the System

The role of DC Fast charging (DCFC) is clear in removing barriers to EV adoption. The need for shorter charging times has resulted in higher power EV fast charging approaches 400 kW entering the market. In this paper, we will d...

View Whitepaper

SiC MOSFETs: Gate Drive Optimization

For high−voltage switching power applications, silicon carbide or SiC MOSFETs bring notable advantages compared to traditional silicon MOSFETs and IGBTs. Switching high−voltage power rails in excess of 1,000 V, operating at hun...

View Whitepaper

smartCIO Magazine

smartCIO is the magazine for CIOs and IT leaders in EMEA

View Whitepaper

Cloud Security Services

The security landscape has changed drastically in recent years. Today, companies work across distributed cloud environments, while end-users need anytime, anywhere access to data. Instead of securing the perimeter to keep thre...

View Datasheet

6 myths of SIEM - Early visibility and rapid response to threats in your environment

To say that security is a hot topic right now is an understatement. The threat landscape has changed drastically in recent years, meaning that every company needs to rethink or review its approach. In the new world of security...

View Whitepaper

Managed SIEM - Early visibility and rapid response to threats in your environment

Organisations are facing more security challenges today than at any time in the past, traditional defences are not working, new technologies introduce new risks, and conventional security practices are unsustainable. This - all...

View Solution Brief

Advanced Threat Prevention with VMware NSX Distributed Firewall

Security professionals understand that hackers hide lateral movement inside large volumes of east-west network traffic. Organizations need new tools and techniques to detect and prevent such activity. In this paper, you will l...

View E-Book

Ransomware vs. Multi-Cloud: How to Protect Multi-Cloud Environments From the Next Attack

Though the scale and economics of the cloud are a boon for today’s enterprise, moving applications and data out of the data center into multi-cloud environments has greatly expanded threat surfaces, putting enterprises at great...

View report

THREAT REPORT: Exposing Malware in Linux-Based Multi-Cloud Environments

90% of cloud runs on Linux. So, is it any wonder that malware is propagating in multi-cloud environments under the radar? Current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments ...

View report

Internal Firewalls for Dummies Guide

Organizations can no longer rely on edge firewalls alone to provide network security. Once attackers get past an edge firewall, they can move laterally to high-value assets. This book illustrates how internal firewalls can help...

View report
Register for our newsletter
The most important news for free via E-Mail