CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

anti

Results 1 - 25 of 1114Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Jul 31, 2019
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing. Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institute’s “2017 Cost of Data Breach Study” says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EU’s General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Riskified     Published Date: Aug 06, 2019
The outlook for online electronics sales is bright, with global sales set to surpass $300 billion in 2018, a 10.7% increase over 2017. The US and Europe are anticipating healthy growth as customers (particularly millennials) become more comfortable making larger purchases online: Best Buy’s 2017 Q4 revenue from online sales in the US was up 17.9% over the previous year. But the largest contributor to this surge will be China, where the enormous population is rapidly adapting to shopping online.
Tags : 
    
Riskified
Published By: Infinidat EMEA     Published Date: May 15, 2019
Fondato nel 1998, IFOM, Istituto FIRC di Oncologia Molecolare è un centro di ricerca dedicato allo studio della formazione e dello sviluppo di tumori a livello molecolare. Nello specifico, il laboratorio di Francesco Ferrari si concentra sull’identificazione e sullo studio di elementi regolatori non codificanti nel genoma e sul modo in cui vengono coinvolti nella regolazione dei processi biologici fisiologici e patologici. Il gruppo utilizza i dati della genomica funzionale (trascrizione, indicatori epigenetici, organizzazione tridimensionale) e altre informazioni genomiche (come il re-sequencing dei pazienti) con metodi di massive sequencing.
Tags : 
    
Infinidat EMEA
Published By: Adobe     Published Date: Jun 26, 2019
IDC quantifies the value of Adobe Experience Manager Assets for organizations interviewed at an average of $3.17 million per year per organization over three years, which would result in an average three-year ROI of 366%. Adobe Experience Manager Assets generates this value by: — Increasing the return on content investments by improving asset findability and reuse and by reducing redundant content creation efforts — Accelerating time to value from marketing and brand campaigns by streamlining asset distribution — Improving team productivity through workflow automation — Reducing risk associated with the use of outdated or unapproved digital assets
Tags : 
    
Adobe
Published By: Shell     Published Date: May 28, 2019
You may see recommendations for universal tractor transmission oil, anti-wear hydraulic oil, zinc free hydraulic oil, TO-4 transmission drive train oil, and more. These varying recommendations can leave one confused and asking, “Is there one hydraulic oil I could use in all of my mobile equipment?” This is a question our technical team is asked frequently; after all, hydraulic systems perform similar duties, and some components, like pumps and valves, can be common across different OEM brands.
Tags : 
    
Shell
Published By: Achievers     Published Date: Aug 16, 2019
Understanding HR and Engagement Leaders’ Challenges and Opportunities How can organizations understand the gaps in employee expectations, anticipate the most pressing issues, and adopt the processes and technology that make it scalable? Achievers surveyed HR and engagement leaders’ on the front lines of engagement who understand the challenges and opportunities facing the workplace today. In this report, discover how you can address: • The most pressing engagement challenges for organizations today • The role of employee empowerment and trust in engagement success. • Technology and culture changes that can ensure success
Tags : 
    
Achievers
Published By: Genesys     Published Date: Dec 20, 2018
If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: • The size of your contact center, and business requirements such as customer journey management • The location and quantity of contact centers being managed • The need for scalability, speed of deployment, and maintenance requirements
Tags : 
    
Genesys
Published By: Cisco EMEA     Published Date: Jun 19, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. To find out more download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Red Hat     Published Date: Sep 09, 2018
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by: » Enabling more efficient and effectiv
Tags : 
    
Red Hat
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Mar 22, 2019
Hyperconverged infrastructure solutions are making substantial inroads into a broader set of use cases and deployment options, but limitations exist. I&O leaders should view HCI solutions as tools in the toolbox, rather than panaceas for all IT infrastructure problems.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 26, 2019
Uncover the riskiest 1% of threats you’ve been missing. In hours. Not days or months. Nearly all endpoint security solutions claim to block 99% of malware. But what about the 1% of threats they miss? The most dangerous 1% of threats will wreak havoc on your network. If you rely solely on traditional point-in-time technologies, such as antivirus, those threats can go undetected for 200 days on average. For months on end, they can be creeping in and moving laterally across your network causing damage through stealthy malware campaigns without you even knowing it—until it’s too late.
Tags : 
    
Cisco
Published By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard
Published By: Zaloni     Published Date: Apr 23, 2019
Although data and analytics are highlighted throughout the popular press as well as in trade publications, too many managers think the value of this data processing is limited to a few numerically intensive fields such as science and finance. In fact, big data and the insights that emerge from analyzing it will transform every industry, from “precision farming” to manufacturing and construction. Governments must also be alert to the value of data and analytics as the enabler for smart cities. Institutions that master available data will leap ahead of their less statistically adept competitors through many advantages: finding hidden opportunities for efficiency, using data to become more responsive to clients, and developing entirely new and unanticipated product lines. The average time spent by most companies on the S&P 500 Index has decreased from an average of 60 to 70 years to only 22 years. There are winners and losers in the changes that come with the evolution of both technology
Tags : 
    
Zaloni
Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco
Published By: Cisco     Published Date: Dec 11, 2018
Hyperconverged infrastructure solutions are making substantial inroads into a broader set of use cases and deployment options, but limitations exist. I&O leaders should view HCI solutions as tools in the toolbox, rather than panaceas for all IT infrastructure problems. I would like to receive email communications about products & offerings from Cisco & its Affiliates. I understand I can unsubscribe at any time. For more information on how Cisco collects and uses personal information, please see the Cisco Online Privacy Statement.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 03, 2019
This IDC study represents the vendor assessment model called the IDC MarketScape. This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's chances for present and future success worldwide. This study assesses the capability and business strategy of 12 global enterprise videoconferencing vendors. This evaluation is based on a comprehensive framework and a set of parameters expected to be most conducive to success in providing enterprise videoconferencing solutions, for both the short term and the long term.
Tags : 
    
Cisco
Published By: Lenovo UK     Published Date: Mar 14, 2019
Lenovo commissioned Cebr to research the changing dynamics of workplaces around the UK. The report quantifies the potential gains from remote working and looks at issues such as: What attributes do people at the start of their careers look for in an employer? Will there be a continued shift towards remote working? And how much importance do people place on flexible working hours?
Tags : 
modernworkplace, flexibleworking, smartoffice, remoteworking, work-lifebalance, futureofwork, artificialintelligence, virtualreality, workplacedynamics, workplaceresearch
    
Lenovo UK
Published By: Hewlett Packard Enterprise     Published Date: Apr 24, 2018
Solid-state array features, pricing, scale and density are improving at a rapid pace, while agility and disaggregation benefits are providing long-term value. Gartner has analyzed 19 SSA products across five high-impact use cases to quantify what's important to infrastructure and operations leaders.
Tags : 
    
Hewlett Packard Enterprise
Published By: ExactTarget     Published Date: Aug 14, 2014
Marketing as you know it will never be the same. There’s a fundamental shift in relationships between brands and customers—fueled by smartphones, social media, and today’s always-on, always-connected mentality. Marketers have access to more customer data (big data) than ever before. But the quantity of data only matters if you’re smart about using it—to power 1:1 customer journeys.
Tags : 
marketing cloud, target, big data, brands, customers, social media, smartphones, always-on
    
ExactTarget
Published By: Zendesk     Published Date: May 21, 2018
Your door is always open, regardless of your business or support hours. Today’s customers ask questions at any time of the day or night and will wait for you to respond (but not for long). This poses a challenge to most businesses: How can you anticipate which channels a customer will need or want, and how can you determine whether these channels will be efficient for your organization? The short answer is: you do. Customers want the ability to contact businesses in more than one way, and they expect each brand interaction to be consistent with the one before and after. Learn how with Zendesk's Omnichannel solution.
Tags : 
    
Zendesk
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
With IT under increasing pressure to deliver on availability service levels and make a positive impact on the business, having a robust, efficient, and reliable modern data protection strategy is a must. Making the right IT investments can be instrumental in moving the needle, and leveraging the right tools and technology can make a substantial impact.
Tags : 
    
Hitachi Vantara
Published By: Hewlett Packard Enterprise     Published Date: May 10, 2019
Applications are the engines that drive today’s digital businesses. When the infrastructure that powers those applications is difficult to administer, or fails, businesses and their IT organizations are severely impacted. Traditionally, IT assumed much of the responsibility to ensure availability and performance. In the digital era, however, the industry needs to evolve and reset the requirements on vendors. HPE Nimble Storage has broken away from convention and transformed how storage is managed and supported with the HPE InfoSight predictive analytics platform. HPE engaged ESG to conduct a quantitative survey of the HPE Nimble Storage installed base, as well as non-HPE Nimble Storage customers, to better assess how HPE InfoSight positively impacts customer environments. To find out more download this whitepaper today.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Feb 23, 2017
Companies are increasingly using outside contractors and suppliers stay competitive, which means granting third-parties access to applications via VPN or VDI. This reliance causes increased complexity and burden on the Enterprise team while also creating additional security risk, as third-party access creates additional points of entry to an organization’s network. Read this solution brief to learn about a new painless, secure approach to remote access.
Tags : 
painless, security, third-party, resources, enterprise, vpn, solution
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search