CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

cloud security

Results 1 - 25 of 905Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA Tier 3 ABM
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Workday Nordics     Published Date: Mar 06, 2018
This White paper looks at how system complexity is increasing, though enterprises deploy more applications to more endpoints than ever before. Hackers have evolved from isolated sociopaths into highly organised groups relying on leading-edge technology. Finally, IT budgets are growing, albeit slowly: International Data Corp. (IDC) expects budgets to increase 3.4% in 2017. So many CIOs are struggling to find the resources needed to ward off attacks. Cloud computing helps IT executives meet these conflicting objectives. These solutions are designed on a modern architecture, one much more fluid than premises-based systems. In addition, cloud is better able to handle threats than legacy systems. To be successful, CIOs need to overcome their traditional security (on premises is best) mindset, and hand management of their most important applications over to a cloud provider.
Tags : 
    
Workday Nordics
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
For data-driven businesses, cloud can be a boon. Data can be found, processed and managed on the cloud without an investment in local hardware infrastructure, but what does that mean to information trust and governance? When data comes from cloud-based sources, IT needs a plan for data integration and security. Download this insightful white paper and learn the four key priorities you must consider when developing your IT strategy to promote good hybrid information governance. Learn the blend of process, organizational and technical enablers that will allow you to move to a hybrid environment with speed and confidence.
Tags : 
data-driven business, cloud, information trust, information governance, data integration, data security, it strategy
    
Group M_IBM Q1'18
Published By: Hitachi Vantara     Published Date: Mar 21, 2018
Challenge: Ensure that technology infrastructure will support business transformation, new growth and services. Solution: Implement highly automated converged infrastructure and managed cloud services from Hitachi Vantara. Outcomes: Use new capabilities to integrate acquired companies, deploy next-generation security and speed time to the market.
Tags : 
    
Hitachi Vantara
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
With the rate of cloud spending predicted to outpace overall IT spending six to one over the next few years, organizations are rightly concerned about ensuring that applications in the cloud enjoy the same level of security as apps deployed in data centers. Using the public cloud does alter your attack surface area—and leveraging multiple public and private clouds (aka multi-cloud) does so even more. Some threats get bigger, some get smaller. Some even go away, or at least drift out of your control, while new threats should move front and center in your security thinking.
Tags : 
cloud, landscape, navigation, security, technology, applications
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
In the face of all the challenges presented by the accelerating pace of application development and everexpanding options for deployment, IT organizations are changing how they deliver services. Traditional manual approaches are simply too slow to keep up. Yet, when application teams attempt to circumvent IT in order to speed up deployment, security, performance, and longterm manageability suffer. To get the most out of your multi-cloud deployments, you need to fundamentally rethink how you deliver the right application services that meet current and future needs, consistently across every cloud. Standardization is key. If too much is changing too quickly, start with standardization. As your organization evolves, you will be better positioned to take the next step in making those standardized services accessible to developers through the automation toolchains they rely on.
Tags : 
multi cloud, organizations, application, security, deployment, performance
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
It seems like every day there’s another article about IoT, big data analytics, and cloud architectures—and their unlimited potential for companies trying to gain a competitive edge in this digital world. If your business is in the midst of a digital transformation (and chances are, it is), you’re probably already enjoying some the benefits of the public cloud: economies of scale, preconfigured solutions that can be spun up with a few clicks, utility billing, and more. What you may not have heard, however, is how the shared security model of the public cloud affects your security responsibilities —and how it can be used to your advantage in these multicloud environments.
Tags : 
roi, cloud, security, architectures, business, economies
    
F5 Networks Inc
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. Mimecast’s proven portfolio of cloud-based, security and cyber resilience services for email can be a vital component of any organisation’s Notifiable Data Breaches compliance strategy
Tags : 
    
Mimecast
Published By: Genesys     Published Date: Feb 22, 2018
Move to the Cloud with Confidence If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: • The size of your contact center, and business requirements such as customer journey management • The location and quantity of contact centers being managed • The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
contact center, cloud, ebook, customer journey
    
Genesys
Published By: Genesys     Published Date: Feb 26, 2018
A cloud contact center can offer many advantages in performance, scalability and security, compared to an on-premise contact center infrastructure. To maximize these advantages, it’s important to determine how best to leverage the cloud to meet your business’s specific needs.
Tags : 
cloud, contact center, infrastructure, cloud contact center
    
Genesys
Published By: Genesys     Published Date: Feb 27, 2018
Everyone says they’re “in the cloud,” but most technology leaders would agree that not all clouds are created equal. When evaluating a cloud contact center solution for your business, it’s important to understand the difference between a true Cloud 2.0 application and traditional software, including which features to look for and why those features are important. Download this eBook and learn: • How a true Cloud 2.0 model is built to provide levels of reliability, scalability, flexibility and security that far exceed those of previous generations • The benefits of utilizing a platform built on microservices architecture • How to take your business to the next level with a built to scale cloud contact center platform
Tags : 
cloud contact center, ebook, cloud 2.0 model, microservices architecture
    
Genesys
Published By: IBM     Published Date: Mar 29, 2018
Evaluating cloud providers and looking for a trusted technology partner? Focus on these five vital aspects of cloud security.
Tags : 
security, cloud platform, cloud security
    
IBM
Published By: IBM     Published Date: Mar 29, 2018
This white paper explores how you can support cloud platform security and DevOps needs by building a hardware-rooted chain of trust.
Tags : 
container platform, devops, cloud platform
    
IBM
Published By: OracleSMB     Published Date: Jan 04, 2018
Compliance and risk management issues affect small and medium-sized businesses. They are not just a concern for larger, public companies, but smaller companies have fewer resources to deal with the regulatory demands that affect them. Instead of hiring expensive external resources to ensure compliance, invest in financial compliance cloud technology to continuously monitor and provide feedback on your compliance efforts. It will lower long-term costs, improve collaboration, and increase confidence in data security and financial reports.
Tags : 
    
OracleSMB
Published By: Workday     Published Date: Feb 27, 2018
CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Markets are becoming more global, product life cycles are shrinking, and profit margins are declining. Organisations need their finance, human resource, and planning systems to be agile and able to change as quickly as the business. System complexity is increasing, though. Enterprises deploy more applications to more endpoints than ever before. Hackers have evolved from isolated sociopaths into highly organised groups relying on leading-edge technology. Finally, IT budgets are growing, albeit slowly: International Data Corp. (IDC) expects budgets to increase 3.4% in 2017. So many CIOs are struggling to find the resources needed to ward off attacks.
Tags : 
business, enterprises, cloud, organisations, cybercrime
    
Workday
Published By: IBM APAC     Published Date: Mar 19, 2018
We know that flash storage can provide significant benefits and deliver needed agility for large businesses, but what about medium-sized businesses (MMB = 500 to 999 employees)? IBM asked Forrester Consulting to look into adoption and use of flash storage technologies by mid-market organizations. A snapshot survey of 106 IT professionals found the following: › MMBs are actively adopting flash storage › Flash is exceeding expectations regarding cloud management, flexibility and security › A majority of respondents expect to continue their investments, with almost half aspiring to an all-flash storage environment. To learn more download this report.
Tags : 
    
IBM APAC
Published By: Workday UK     Published Date: Mar 08, 2018
It’s no small feat for CIOs to balance efforts to support agility, contain IT costs, and keep data safe and secure. Moving to the cloud delivers on those first two priorities, but what about security? Can the cloud really keep your information safe? In the CIO.com report “Demystifying Cloud Security,” you’ll learn why the cloud is your best bet for data security and discover additional benefits your business could experience by moving to the cloud. Read the report to learn more.
Tags : 
    
Workday UK
Published By: Oracle     Published Date: Apr 05, 2018
Les fonctions marketing et informatique font plus que jamais la paire. Aujourd'hui, l'agilité des entreprises se mesure à l'aune de la flexibilité opérationnelle de leurs outils marketing. Pour découvrir les possibilités ouvertes par les nouvelles technologies dans le domaine du marketing, lisez notre « Guide des technologies marketing ». Au sommaire : Les technologies du paysage marketing actuel Les nouveautés de l'automatisation marketing Le rôle de vos contenus et des réseaux sociaux dans votre stratégie globale Oracle is a global technology company who provide a range of services, including the Oracle, the ‘industry’s broadest and most integrated public cloud’ which lowers costs and reduces IT complexity. They also offer IT security service, database, Java services, Enterprise Management, consulting and support services and more. Oracle have more than 420,000 customers worldwide and are widely revered throughout the computing industry. All information that you supply is pro
Tags : 
    
Oracle
Published By: Oracle     Published Date: Apr 05, 2018
Eine effektive Zusammenarbeit zwischen Marketing und IT ist wichtiger denn je und hängt zunehmend von der Flexibilität der Marketingtools ab. Hierbei spielt die Technologie eine zentrale Rolle. Unsere ‚Anleitung zum Aufbau Ihrer Marketingtechnologie‘ verrät, wie Sie Ihre Marketingstrategie mit der richtigen Technologie optimieren:: • Gewinnen Sie neue Perspektiven zum Einsatz von Technologie im Marketingbereich • Informieren Sie sich über neue Entwicklungen zur Automatisierung im Marketingbereich • Integrieren Sie Content und soziale Netzwerke in Ihre Gesamtstrategie Oracle is a global technology company who provide a range of services, including the Oracle, the ‘industry’s broadest and most integrated public cloud’ which lowers costs and reduces IT complexity. They also offer IT security service, database, Java services, Enterprise Management, consulting and support services and more. Oracle have more than 420,000 customers worldwide and are widely revered throughout the computi
Tags : 
    
Oracle
Published By: Oracle     Published Date: Apr 05, 2018
Effective collaboration between marketing and IT continues to be crucially important. As we enter an era where our business agility will be defined by the flexibility of operation of our marketing tools, technology in marketing is a key focus. Read ‘The guide to building your marketing technology stack’ to learn more about how technology can enhance every area of marketing: • Rediscover the technology in marketing landscape • Explore the latest in marketing automation • See how content and social fit into your overall strategy Oracle is a global technology company who provide a range of services, including the Oracle, the ‘industry’s broadest and most integrated public cloud’ which lowers costs and reduces IT complexity. They also offer IT security service, database, Java services, Enterprise Management, consulting and support services and more. Oracle have more than 420,000 customers worldwide and are widely revered throughout the computing industry.
Tags : 
    
Oracle
Published By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
    
Amazon Web Services
Published By: Microsoft Azure     Published Date: Apr 11, 2018
What you need to know now about moving your enterprise to a cloud computing strategy In the second edition of the Enterprise Cloud Strategy e-book, we've taken the essential information for how to establish a strategy and execute your enterprise cloud migration and put it all in one place, so you can quickly understand topics like: What to consider when choosing between hybrid, public, or private cloud environments How cloud reduces costs, and even benefits on-premises computing New analytics and IoT capabilities Security and compliance considerations This valuable asset for IT and business leaders provides a comprehensive look at moving to the cloud, as well as specific guidance on topics like prioritizing app migration, working with stakeholders and cloud architectural blueprints.
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Developing for and in the cloud has never been more dependent on data. Flexibility, performance, security—your applications need a database architecture that matches the innovation of your ideas. Industry analyst Ovum explored how Azure Cosmos DB is positioned to be the flagship database of internet-based products and services, and concluded that Azure Cosmos DB “is the first to open up [cloud] architecture to data that is not restricted by any specific schema, and it is among the most flexible when it comes to specifying consistency.” From security and fraud detection to consumer and industrial IoT, to personalized e-commerce and social and gaming networks, to smart utilities and advanced analytics, Azure Cosmos DB is how Microsoft is structuring the database for the age of cloud. Read the full report to learn how a globally distributed, multi-model data service can support your business objectives. Fill out the short form above to download the free research paper.
Tags : 
    
Microsoft Azure
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search