CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

cloud network

Results 126 - 150 of 666Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: Silver Peak     Published Date: Feb 11, 2016
This report outlines the limitations of legacy networks and how adding a technology called multipath networking can greatly improve the performance of cloud applications. It also provides advice on the evaluation criteria for multi-path networking solutions.
Tags : 
networking, cloud, cloud computing, multipath networking, multipath networking solutions, cloud applications, networking solutions, infrastructure
    
Silver Peak
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Manufacturers, in an effort to succeed with digital transformation, are relying on the Internet and public cloud to deliver key enterprise applications and processes. As manufacturers continue to become more digital enterprises, their network architecture must as well. Read this paper to learn key considerations for architects to create a holistic network that takes today’s, and tomorrow’s, requirements into consideration.
Tags : 
network management, manufacturing, network optimization, network applications, cloud services, enterprise applications, network architecture, network performance
    
Akamai Technologies
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, cloud security, data storage, network security, device protection, information protection
    
Citrix ShareFile
Published By: Google     Published Date: Aug 05, 2019
Moving existing enterprise workloads to the cloud has always been challenging as companies struggle to adapt and migrate applications to run in a cloud environment. IT managers must understand application dependencies, change drivers and networking configurations, and learn new management interfaces. This white paper will provide a deeper understanding of Migrate for Compute Engine's technology for mass migrations into GCP unique technology and architecture, and will explore how these capabilities improve current mass migration practices.
Tags : 
cloud applications, cloud as a service, velostrata, migration, google cloud
    
Google
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download “The Essential Guide to Infrastructure Machine Data” for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures
    
Splunk
Published By: Gigamon     Published Date: Dec 13, 2018
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Need to deliver secure customer experiences and high application performance? View our new infographic, “Digital Transformation: Seeing Through the Clouds to the Journey Ahead” to learn how to get the breadth and depth of network and application visibility needed to effectively monitor and secure your digital applications.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now. 
Tags : 
    
Gigamon
Published By: Red Hat APAC     Published Date: Jun 27, 2019
Red Hat® JBoss® Fuse is a lightweight integration platform that reduces the pain of connecting applications, services, processes, and devices for comprehensive and efficient solutions. JBoss Fuse includes the popular and versatile Apache Camel project, an implementation of the most commonlyused enterprise integration patterns. With integration patterns and more than 150 connectors ready to use, JBoss Fuse supports integration across the extended enterprise—including applications and services on-premise, on mobile devices, or in the cloud. JBoss Fuse is complemented by Red Hat JBoss Developer Studio for easier development of integration solutions and Red Hat JBoss Operations Networkfor monitoring of deployed solutions.
Tags : 
    
Red Hat APAC
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform* purpose-built for heterogeneous, multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience. With vRealize Suite, IT can provision and manage at scale—compute, storage, network, and application services across multiple private and public cloud environments.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: VMWare EMEA     Published Date: Oct 23, 2017
To meet the challenges of managing such a complex environment, IT teams need an enterprise-ready cloud management platform that can support multivendor environments, automate application and service delivery, and facilitate operations and governance. VMware provides an enterprise-ready cloud management platform that delivers the industry’s most complete solution for managing a heterogeneous, hybrid cloud, and supports cloud management requirements across Day 1 and Day 2 operations for compute, storage, network and application level resources. The VMware solution is in use today across a wide range of industries and use cases, delivering benefits such as faster provisioning, optimized IT operations, and lower capital spending. To learn more about the VMware cloud management platform, visit http://www.vmware.com/virtualization/ cloud-management.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: Aerohive     Published Date: Jun 01, 2015
This whitepaper provides details about cloud networking, the state of the cloud market, and its benefits.
Tags : 
networks, cloud, cloud networking, network infrastructures, networking, network architecture, network management, virtualization
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Ce document fournit des détails sur la mise en réseau dans le cloud, l’état du marché du cloud et ses avantages.
Tags : 
networks, cloud, cloud networking, network infrastructures, networking, network architecture, network management, virtualization
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
In diesem Dokument sind Details über Cloud-Networking, die Situation auf dem Cloud-Markt und dessen Vorteile angegeben.
Tags : 
networks, cloud, cloud networking, network infrastructures, networking, network architecture, network management, virtualization
    
Aerohive
Published By: Zscaler     Published Date: Oct 26, 2018
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them. Download this whitepaper today to find out more.
Tags : 
    
Zscaler
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains. Unlike appliances, our cloud security platform protects devices both on and off the corporate network. Unlike agents, the DNS layer protection extends to every device connected to the network — even IoT. Umbrella truly is the easiest and fastest layer of security to deploy everywhere. Download today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Aerohive     Published Date: Oct 26, 2015
Join this webinar to learn: - What the latest solution offerings look like and how to avoid investing in dead technology - Why more vendors are using the cloud to drive technical and commercial flexibility for organisations - How to easily grow your network with demand
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Schneider Electric     Published Date: Apr 20, 2018
In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
data center, edge computing, cloud computing, on-premise, power, cooling, networking, redundancy
    
Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search