CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

aca

Results 126 - 150 of 271Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
Cisco
Published By: NuView     Published Date: Jun 07, 2011
Is your HR department equipped to handle the Health Care Reform Changes? NuView is the only vendor that offers this level of flexibility and configurability designed to help you adapt to the healthcare reform changes. Download to see the changes and timeline for important issues planned during each calendar year.
Tags : 
nuview, health care reform, president obama, ppaca, hceaa
    
NuView
Published By: AWS     Published Date: Nov 15, 2018
"To provide trusted identities and secure transactions to your customers, you want a flexible, scalable monitoring solution that offers a unified view on the Amazon Web Services (AWS) cloud. Learn how Entrust Datacard can help your organization quickly identify, resolve, and prevent issues by using a cloud-native platform to deliver seamless customer experiences every time. Watch our on-demand webinar and gain valuable insights into: • How to use a DevOps approach to monitoring • The best practices to scale your monitoring solutions • How Entrust Datacard monitors trace, syslog and metric data from sources like Amazon CloudWatch, Application Load Balancer, and Amazon Aurora"
Tags : 
    
AWS
Published By: CA Technologies EMEA     Published Date: May 23, 2018
La protección del acceso con privilegios y la prevención de infracciones siguen constituyendo preocupaciones urgentes en empresas de todos los tamaños. Los atacantes recurren a una gama mayor de métodos más sofisticados para infiltrarse en sistemas vulnerables y, a pesar de que las noticias sobre infracciones externas ocupan con frecuencia los titulares, las organizaciones también deben ser capaces de defenderse contra las amenazas internas. De hecho, dado que en la actualidad se recurre de forma generalizada a la externalización y la asociación para acometer labores clave, un mayor número de usuarios tiene, hoy en día, acceso con privilegios a sistemas empresariales de fundamental importancia. Además, resulta primordial que los administradores actuales de los sistemas comprendan cómo se están utilizando estos últimos, quién los usa y en qué condiciones. Desafortunadamente, las soluciones estándar de seguridad no pueden proteger el acceso interno o con privilegios de manera eficaz y ad
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Hace dos años que CA comenzó a reevaluar la manera en la que las organizaciones sacaban partido a sus soluciones de gestión de proyectos y carteras. Nuestro objetivo se centraba en identificar las distintas formas en las que CA Project & Portfolio Management (CA PPM) podría servir mejor a todos los usuarios, desde los gestores financieros, de proyectos y de recursos hasta los responsables ejecutivos y los miembros del equipo.
Tags : 
ppm, potente, configurable, social
    
CA Technologies EMEA
Published By: Glider     Published Date: Jun 04, 2018
Recruiting great engineering talent is hard. The recruiting process for developers can feel like an impossible task because evaluating technical talent continues to evolve. The typical flow can be broken down into three basic steps: source, screen, and interview. Only recruiters truly understand the real challenges in finding qualified candidates but the pain doesn’t stop there. Learn more on tech recruiting by downloading this ebook by Glider
Tags : 
    
Glider
Published By: Aon Hewitt     Published Date: Aug 06, 2015
Read this white paper to learn why it’s critical for employers to evaluate key differences between retiree exchanges— especially the level of support offered to retirees—when determining which model will best meet their organizational needs, as well as the needs of their retiree populations.
Tags : 
retirees, private exchange strategy, health care, ppaca, retiree exchanges, human resources
    
Aon Hewitt
Published By: Entrust Datacard     Published Date: Jul 30, 2008
Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.
Tags : 
layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard, entrust, identity management, iam
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 10, 2009
This white paper examines the elements that comprise a high quality PKI and the advantages of outsourcing to Entrust Managed Services PKI.
Tags : 
pki, digital certificates, hosted certificates, managed services pki, managed certificates, authentication, digital signature, entrust
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 31, 2013
Mobility Helps Enterprises Enter a New Age
Tags : 
entrust, mobile, mobility, secure mobile assets, mobile devices, mobile device security, security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 31, 2013
Smart credentials are the best bet for strong physical and logical access security.
Tags : 
entrust, security, smart credentials, multifunction access, password authentication, software development
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, cloud access, digital security, security software
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
Know the truth: Mobile devices more secure than traditional PCs
Tags : 
entrust, mobile devices, mobile, security, mobile security, mobile perception
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
As mobile momentum in the workplace continues, so do the opportunities to leverage connected mobile devices to bolster security, enable new business capabilities and effectively defeat desktop-based malware. Entrust’s latest Infographic, Mobile Security: Perception vs. Reality, explores the perceptions of IT decision-makers and why more and more enterprises are investing in mobility in 2013 and beyond.
Tags : 
entrust, security, mobile security, infographic, malware, mobile devices
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
Mobile Security Gains Traction as Enterprises Embrace New Technology
Tags : 
entrust, security, mobile, mobile security, mobile devices, malware
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
The Deprecation of Internal Server Names and Reserved IP Addresses
Tags : 
entrust, fqdn's, security, internal server, reserved ip addresses
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security. Entrust IdentityGuard Cloud Services provide digital certificate and identity management solutions that bring together all certificate services, tools and security under a single cloud-based service. It’s a simple, strong and easy solution to issue and manage identities through their lifecycle via the cloud.
Tags : 
entrust, digital certificates, cloud services, identity management, security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials
Tags : 
entrust, identityguard, smart credentials, certificate based security, security, pki software, cloud, networking
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Certificate Discovery & Management Solution
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Securing Mobile Identities & Devices
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI). Entrust’s cloud-based PKI service eliminates up-front capital investment and significantly reduces on-going operation cost associated with in-house PKI software, provides built-in maintenance capabilities and speeds deployment time.
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
entrust, certificates, mobile devices, security, device certificates, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, passwords, memory cards, smart credentials, authentication, it management
    
Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search