Whitepaper Library

I denne sektion finder du et udvalg af it-relaterede dokumenter, whitepapers, rapporter, cases, webcasts og meget mere. Marqit’s whitepaper-bibliotek er den it-professionelles online-kilde til dybdegående information.

Når du har registreret dig, kan du begynde at downloade dokumenterne gratis.

Søg whitepaper
Sorter efter:
 
Vis:

{{item.title}}

{{item.title}} {{item.published | date:'dd-MM-yyyy'}}{{item.supplier.fullName}}{{item.language}}{{item.class}}
 

Din whitepaper-konto

Opret en gratis whitepaper-konto hos Version2 og få direkte og nem adgang til alle dokumenter, whitepapers, rapporter, cases og webcasts

It-nyheder

Ritzau er stadig lammet efter it-angreb: Hackere kræver løsepenge

Tirsdag blev Nyhedsbureauet Ritzau ramt af et hackerangreb. Hackerne har efterfølgende krævet penge for at frigive data, men det har...

Britisk sikkerhedslov vil udelukke Huawei og kræve bedre sikkerhed hos teleselskaber

Tirsdag blev en ny sikkerhedslov præsenteret i Storbritannien. Den indeholder blandt andet bødetrusler til de britiske teleselskaber, der...

Tysk delstat vil belønne borgere, der downloader corona-app

For at få antallet af downloads i vejret, har den tyske delstat Nordrhein-Westfalen foreslået, at borgere med den tyske corona-app får...

Organisationer frygter cloud-kaos: Staten skal finde erstatning for Privacy Shield

En bred skare af danske organisationer frygter for konsekvenserne af den såkaldte Schrems II-dom, der kan få afgørende betydning for...

Danmarks største nyhedsbureau lagt ned af hackerangreb

Alle tjenester og systemer er lukket ned.

Whitepapers

Protect Your Online Business from Credential Stuffing

An attacker uses bots to continuously ping your website pages (usually the...
Understanding Your Credential Stuffing Attack Surface

Understanding Your Credential Stuffing Attack Surface

In this white paper, we explain what’s behind the architectural challenge to...

Which Bot Management Solution Is Right for You?

If you picked a website at random, what you’d find might surprise you. You...
Performance Characterization of Virtual NGFWs

Performance Characterization of Virtual NGFWs

Virtualization is rapidly transforming data centers into agile and...
Realistic Application Simulation for Enterprise Firewall Performance Testing

Realistic Application Simulation for Enterprise Firewall Performance Testing

It is challenging for enterprises to use 100% realistic test traffic to...
Firewall Performance Testing Use Cases in Lab and Production Networks

Firewall Performance Testing Use Cases in Lab and Production Networks

This whitepaper identifies the requirements and challenges of different...
Protecting Personal Data While Enhancing Customer Engagement

Protecting Personal Data While Enhancing Customer Engagement

Retailers need to develop ever-closer relationships with their customers...
State of the Internet / Security: Financial Services – Hostile Takeover Attempts

State of the Internet / Security: Financial Services – Hostile Takeover Attempts

High-value targets generally attract sophisticated criminals and attacks. This...
Order form InfoSecurity 2020 the 29th and 30th of April

Order form InfoSecurity 2020 the 29th and 30th of April

Priceline Reduces Access Control Costs While Providing Remote Workers Secure Access to Critical Resources

Priceline Reduces Access Control Costs While Providing Remote Workers Secure Access to Critical Resources

Use case: Priceline provides remote workers with secure, simplified access to...