CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

access

Results 326 - 350 of 2629Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
CA Technologies
Published By: SafetyCulture     Published Date: Aug 14, 2018
Consistency and customer experience are key to quality and profitability in retail. Manual reporting processes can be unwieldy and time-consuming, but bringing together all compliance procedures under one digital platform means fast, consistent and easy-to-access performance data. Using real-time insights into best practice improves the reporting of quality control, stock loss prevention, inspection processes, logistics and more – saving time, increasing efficiency and boosting customer satisfaction. Benefits include better branding through monitoring rollouts with uploaded photos and videos, protection against shrinkage through improved inspection processes and audits, and clearer visibility of issues which means a speedier response.
Tags : 
    
SafetyCulture
Published By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internet—and probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : 
data, big data, security, corporate network, mobility, application security, productivity, software compliance
    
Absolute Software
Published By: Cleversafe     Published Date: Mar 29, 2013
Scalability has always been an important characteristic of enterprise storage systems, maybe the most important, since the rationale of consolidating storage assumes that the system can easily grow with aggregate demand.
Tags : 
object storage, cloud storage, access nodes, scalability, metadata, storage controller, backup and recovery, network attached storage, raid, storage area networks, storage management, storage virtualization, application integration, application performance management, best practices, data deduplication, business technology
    
Cleversafe
Published By: Riverbed     Published Date: Jul 17, 2013
International Herald Tribune (IHT) needed to ensure that all of its journalists, regardless of their location, have network access 24x7 to meet their demanding editorial schedule. Read the case study to learn how IHT deployed Riverbed Cascade™ to gain insight into their WAN traffic and a true end-to-end view of the application delivery path from servers to desktops.
Tags : 
herald tribune, iht, network access, riverbed cascade, riverbed, cascade, wan traffic, wan, infrastructure, local area networking, migration, network management, network performance, network performance management, remote access, remote network management
    
Riverbed
Published By: Okta     Published Date: Mar 10, 2016
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: Okta     Published Date: Mar 10, 2016
The Forrester Wave report identifies the six most significant solution providers in the market, evaluating the strengths and weaknesses of each vendor against 15 criteria, including current offering, strategy and market presence. Access your complimentary Forrester Wave report and learn why Okta is named a leader in the space.
Tags : 
    
Okta
Published By: Okta     Published Date: Mar 10, 2016
LinkedIn sees cost and time benefits from Okta’s on-demand identity and access management service; securely integrating their cloud applications with Active Directory, single sign-on, and provisioning reports.
Tags : 
    
Okta
Published By: Okta     Published Date: Mar 10, 2016
To manage and control how the airport's employees make use of these cloud-computing services, Gatwick has turned to the cloud-based identity management service from Okta, which lets the security manager centrally manage, provision and de-provision single sign-on access to cloud services for Gatwick's staff.
Tags : 
    
Okta
Published By: Okta     Published Date: Mar 10, 2016
Rotary Simplifies Online Access for Members with Okta. Learn how Rotary achieved $300k annual savings and a 75% reduction in help-desk tickets with Okta.
Tags : 
    
Okta
Published By: Panasonic Business Mobility Solutions     Published Date: Feb 08, 2017
Automotive and Large Equipment Service professionals need to be mobile - in the field diagnosing and solving customer equipment operation issues – fast. These highly skilled technicians and mechanics need reliable, quick access in real time to vehicle and customer information and service diagnostics systems.
Tags : 
    
Panasonic Business Mobility Solutions
Published By: CA Technologies     Published Date: Sep 25, 2017
APIs are a critical component of digital business—empowering developers to build apps across any channel and enabling partners to incorporate your data or services into their offerings. By making it easier for other organizations to access your services, you create value and growth opportunities.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat is a trusted partner to enterprise customers; cloud, software, and hardware suppliers; and the global open source community. A Red Hat® Enterprise Linux® subscription provides customers with direct access to innovation and advocacy—within the open source community and within a certified and trusted network of partners. Red Hat Enterprise Linux provides you with an innovative platform that serves as the foundation for your business. It is hardened, certified, and supported by the Red Hat Product Security team, support teams, and certified engineers. Red Hat supports your timelines and advocates for your requirements so you can focus on the work of your business rather than being your own operating system vendor. We use our leadership in the open source community to do the work that brings you the best of open source. Get direct access to: Technology-driven solutions Emerging technology Experience and support Continuous security Timeline support Download the whitepaper to lea
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
Business-critical applications need a platform that is proven to be stable. Red Hat®Enterprise Linux® frees you to deliver meaningful business results through technology by providing exceptional reliability and military-grade security. With a Red Hat Enterprise Linux Server subscription, you gain access to the industry's most extensive ecosystem of partners, customers, and experts that supports and accelerates your success. Read the datasheet to learn more.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
Evaluate Red Hat Enterprise Linux for your application deployments, datacenter infrastructure or virtual and cloud environments. Red Hat Enterprise Linux provides a reliable and secure operating system that you can trust to run your most mission critical workloads. This evaluation: Provides a single subscription for a variant of Red Hat Enterprise Linux Offers access to Red Hat's award winning Customer Portal, including knowledge, videos, and documentation Is not intended for production use
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat è il partner scelto da migliaia di aziende, fornitori di soluzioni software, cloud e hardware, e dalla community open source globale. Una sottoscrizione Red Hat® Enterprise Linux® garantisce accesso diretto a innovazione e supporto all'interno della community open source e di una rete di provider e clienti. La tecnologia open source di Red Hat promuove le innovazioni di oggi e alimenta i progetti tecnologici che vedremo nascere in futuro. Scopri tutti i vantaggi della sottoscrizione.
Tags : 
    
Red Hat
Published By: IBM APAC     Published Date: Mar 06, 2019
A single environment to build, train, and deploy machine-learning and deep learning models. Take advantage of machine learning and AI to analyze your data. Catalog your data to make it easy to find. All applications are free and without time limit!
Tags : 
    
IBM APAC
Published By: Workday Italy     Published Date: Sep 20, 2018
In che cosa è differente Workday in termini di sicurezza? Diversamente dai sistemi legacy, la sicurezza è parte integrante del sistema, non una funzione aggiuntiva. Guarda il video, scoprirai in che modo il nostro speciale approccio alla sicurezza elimina gli accessi non autorizzati tipici dei sistemi legacy, aumenta le funzioni di conformità e audit e garantisce la sicurezza di dati, transazioni, processi di elaborazione e applicazioni.
Tags : 
    
Workday Italy
Published By: Workday Italy     Published Date: Feb 04, 2019
In che cosa è differente Workday in termini di sicurezza? Diversamente dai sistemi legacy, la sicurezza è parte integrante del sistema, non una funzione aggiuntiva. Guarda il video, scoprirai in che modo il nostro speciale approccio alla sicurezza elimina gli accessi non autorizzati tipici dei sistemi legacy, aumenta le funzioni di conformità e audit e garantisce la sicurezza di dati, transazioni, processi di elaborazione e applicazioni.
Tags : 
workday, workforce technology, digital strategy
    
Workday Italy
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search