CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

adoption

Results 251 - 275 of 944Sort Results By: Published Date | Title | Company Name
Published By: Mitel     Published Date: Apr 07, 2017
De nos jours, le monde des affaires est rapide, compétitif, mondial et fondé sur la technologie. Des éléments culturels, technologiques et physiques collaborent pour accélérer le changement comme jamais auparavant. De la demande pour plus de liberté dans notre façon de travailler et la tendance de l’AVEC (« Apportez Votre Équipement personnel de Communication »), à l’innovation technologique et à l’adoption croissante de nouveaux appareils, plateformes et applications, en passant par la suppression des barrières internationales et régionales.
Tags : 
    
Mitel
Published By: Okta     Published Date: Jul 19, 2016
Have you ever wondered which enterprise cloud apps are most popular? Or which industries tend to use Office 365 versus Google Apps? Did you know that 43% of Okta customers have enabled deprovisioning? From where we sit, Okta has a unique view into the adoption and utilization of cloud apps in the enterprise. Our Businesses @ Work report takes an in-depth look into how organizations and people work today, and the apps and services they use to be productive.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Nov 09, 2016
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. However, Office 365 is unlike any other cloud app in its complexity, and it is best for IT to plan and deploy solutions around identity and mobility management in concert with their Office 365 rollout to get maximum user adoption. Download this white paper now!
Tags : 
    
Okta
Published By: Puppet     Published Date: May 20, 2016
At Puppet, we've been looking at the state of DevOps practices for several years and helping organizations achieve higher levels of efficiency. We’ve learned a lot about the impact of DevOps at varying stages of IT automation maturity. As DevOps has moved from theory to implementation for more organizations, a host of DevOps myths have blocked adoption in many organizations. This publication debunks these myths so your organization can automate, innovate, and get ahead. Download this publication, featuring research from Gartner, to discover: - Why DevOps is applicable to legacy environments, traditional enterprises and hierarchical organizations. - Practices that underpin DevOps, from version control to automated testing to infrastructure as code. - How companies like Walmart, Staples, Ambit Energy and Infusionsoft have embraced DevOps and IT automation.
Tags : 
    
Puppet
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
workforce, security, task automation, content security, employee collaboration
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile
Published By: Lookout     Published Date: Mar 29, 2017
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
practitioners, enterprise, mobile security, productivity, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
webinar, mobile security, ciso, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The Practical Guide to Enterprise Mobile Security was created to help IT managers fulfll their dual role of both enabling productivity and reducing risk through the adoption of modern-enterprise mobile security practices. This guide will help answer questions you might have about implementing mobile security, identify the components that make up a holistic enterprise mobile security strategy, point out key considerations that lead to successful deployments, and provide tips on how to successfully drive adoption of that solution in your global workforce.
Tags : 
enterprise mobile security, mobile security risk, risk reduction, device security
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The adoption of mobile in the enterprise space is accelerating. Users of mobile devices choose what applications they want to use, but it is up to the enterprise to predict the data that they will be accessing. With that change, comes a new spectrum of risk that CISOs must consider.
Tags : 
mobile security, mobile devices, device security, enterprise mobile security, enterprise mobile management
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Oct 10, 2018
Not long ago, the biggest concern for IT decision makers considering moving workloads to the cloud was security. That’s no longer the case. Today, the main obstacle to cloud adoption is different but familiar: the pain of migrating data.
Tags : 
    
Carbonite
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
Regardless of the industry, your customers are digital and always on; your business should be, too. As such, today's forward-thinking business has increased its use of digital channels and ecosystems to engage with and serve its customers. To do so, a well-crafted business continuity / disaster recovery (BCDR) plan can ensure a company's ability to keep its business uninterrupted and maintain its survival, despite unforeseen disruptions. Read this Forrester technology adoption profile to learn the mission-critical nature of and how to maintain an always-on business presence.
Tags : 
    
Spectrum Enterprise
Published By: Fiserv     Published Date: Oct 27, 2017
With the recent Financial Accounting Standards Board vote to proceed and the final Accounting Standards Update now published, the Current Expected Credit Loss (CECL) standards remain top of mind for the C-suite in financial institutions. Even though the official adoption deadline has been pushed back to after December 2019, financial institutions should take actions today to help prepare for the new rules. Data is a great place to start.
Tags : 
cecl compliance, cecl consulting, allowance for loan loss calculator, fasb, cecl, current expected credit loss, alco, reserve, alll, allowance for loan and lease loss, loan segmentation, loan pooling credit loss trends, loan reserve
    
Fiserv
Published By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : 
global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Dec 01, 2017
Les informations suivantes doivent servir de ressources aux directeurs financiers qui dirigent ou assistent leur organisation tout au long de sa migration vers le cloud. Elles ont pour objet de présenter les motivations, les coûts, les risques et les avantages de l'adoption du cloud, et de soulever des questions importantes en matière d'effectifs et de technologie, qui s'avèrent essentielles à la réussite de cette adoption. Elles visent également à permettre de mener des analyses de rentabilité, en mettant en valeur des mesures et des indicateurs spécifiques aux environnements cloud, capables d'influencer les résultats. Les conseils fondamentaux qui sont fournis sont tirés de conversations et d'entretiens directs entre Amazon Web Services (AWS) et les directeurs financiers d'entreprises clientes, qui représentent un large éventail de secteurs d'activité.
Tags : 
planification, amazon, web, services, destine, aux, directeurs, financiers, guide
    
Amazon Web Services
Published By: Oracle     Published Date: Sep 06, 2016
This survey presents the attitudes towards and future plans for the adoption of cloud-based supply chain management (SCM) solutions.
Tags : 
supply chain, supply chain management, oracle, security, security application, cloud computing, application security, security management, security policies, virtualization, infrastructure
    
Oracle
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 42.3% of respondents in ASEAN countries saying they deal with more than 50 alerts each day. Shockingly, for 7% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in ASEAN.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security, virtualization, data loss prevention
    
Symantec
Published By: Aerohive     Published Date: May 14, 2015
A whitepaper on how to enable modern classrooms to deliver immersive, personalised learning experiences, enhance campus productivity, and adopt new curriculum standards.
Tags : 
cloud for education, personalised learning, mobility adoption in schools, virtualization, cloud computing, infrastructure
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
A whitepaper on how to enable modern classrooms to deliver immersive, personalised learning experiences, enhance campus productivity, and adopt new curriculum standards.
Tags : 
virtualization, infrastructure
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
A whitepaper on how to enable modern classrooms to deliver immersive, personalised learning experiences, enhance campus productivity, and adopt new curriculum standards.
Tags : 
cloud for education, personalised learning, mobility adoption in schools, virtualization, cloud computing, infrastructure
    
Aerohive
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search