Whitepaper Library

I denne sektion finder du et udvalg af it-relaterede dokumenter, whitepapers, rapporter, cases, webcasts og meget mere. Marqit’s whitepaper-bibliotek er den it-professionelles online-kilde til dybdegående information.

Når du har registreret dig, kan du begynde at downloade dokumenterne gratis.

Søg whitepaper
Sorter efter:
 
Vis:

{{item.title}}

{{item.title}} {{item.published | date:'dd-MM-yyyy'}}{{item.supplier.fullName}}{{item.language}}{{item.class}}
 

Din whitepaper-konto

Opret en gratis whitepaper-konto hos Version2 og få direkte og nem adgang til alle dokumenter, whitepapers, rapporter, cases og webcasts

It-nyheder

Blog: Pandemi-sikre datacentre giver håb for fremtiden

Ordsproget, 'håb på det bedste, planlæg for det værste', er særdeles passende for datacenterindustrien lige nu. Investering i ny...

Digitale platformes sporing af danskerne overrasker Konkurrence- og Forbrugerstyrelsen

En ny undersøgelse kortlægger, hvordan digitale platforme i stort omfang indsamler data om danske brugere. Resultaterne overrasker...

It-fejl i Region H: 840 borgeres prøvesvar og cpr-numre kunne ses af fremmede

En softwareopdatering har ført til, at omkring 840 borgeres coronasvar er blevet sendt ud 60 forskellige personer.

Nye EU-anbefalinger er en bombe under cloud-markedet

Det er slut med at bruge cloud-tjenester, der er hostet i USA eller andre lande udenfor EU i fremtiden. Det vurderer flere eksperter, efter...

Blog: T-44w og vi leder med lys og lygte

Vores situation i datamuseum.dk er ikke ligefrem blevet lettere med de seneste Covid-19 restriktioner og realistisk må vi forvente at der...

Whitepapers

Protect Your Online Business from Credential Stuffing

An attacker uses bots to continuously ping your website pages (usually the...
Understanding Your Credential Stuffing Attack Surface

Understanding Your Credential Stuffing Attack Surface

In this white paper, we explain what’s behind the architectural challenge to...

Which Bot Management Solution Is Right for You?

If you picked a website at random, what you’d find might surprise you. You...
Performance Characterization of Virtual NGFWs

Performance Characterization of Virtual NGFWs

Virtualization is rapidly transforming data centers into agile and...
Realistic Application Simulation for Enterprise Firewall Performance Testing

Realistic Application Simulation for Enterprise Firewall Performance Testing

It is challenging for enterprises to use 100% realistic test traffic to...
Firewall Performance Testing Use Cases in Lab and Production Networks

Firewall Performance Testing Use Cases in Lab and Production Networks

This whitepaper identifies the requirements and challenges of different...
Protecting Personal Data While Enhancing Customer Engagement

Protecting Personal Data While Enhancing Customer Engagement

Retailers need to develop ever-closer relationships with their customers...
State of the Internet / Security: Financial Services – Hostile Takeover Attempts

State of the Internet / Security: Financial Services – Hostile Takeover Attempts

High-value targets generally attract sophisticated criminals and attacks. This...
Order form InfoSecurity 2020 the 29th and 30th of April

Order form InfoSecurity 2020 the 29th and 30th of April

Priceline Reduces Access Control Costs While Providing Remote Workers Secure Access to Critical Resources

Priceline Reduces Access Control Costs While Providing Remote Workers Secure Access to Critical Resources

Use case: Priceline provides remote workers with secure, simplified access to...