CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

configurations

Results 76 - 100 of 126Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
    
MobileIron
Published By: AWS     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : 
centrify, compliance, security, aws, dome9
    
AWS
Published By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
    
ThousandEyes
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard, identity management, internet security, policy based management, security management, security policies
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities, security management, vulnerability management
    
Qualys
Published By: IBM Corporation     Published Date: Sep 20, 2010
IBM Software Group performed a study that compared the performance of several WebSphere deployment configurations on Intel hypervisor environments.
Tags : 
ibm caching and cloud, test environment, websphere virtual enterprise, static cluster, wve, cloud computing
    
IBM Corporation
Published By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : 
tripwire, iso, iso 27001, security, compliance, comply, isms, information security
    
Tripwire
Published By: Tripwire     Published Date: Jul 08, 2008
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important industry standards and regulations. Learn why configuration assessment is so important, why organizations find it difficult to control system configurations, and what types of configuration assessment solutions are available.
Tags : 
tripwire, configuration, compliance, infrastructure, network management
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Learn how Tripwire can help you deploy a comprehensive configuration assessment and control solution that: a) reduces the time and resources required to verify compliance and prepare for audits; and b) maintains continuous compliance by allowing IT to immediately identify any exceptions and trigger remediation of configurations that do not conform to policy.
Tags : 
tripwire, automate, fisma, compliance, configuration, assessment, solution, audit, policy, electronic systems, infrastructure, security, management, control, documentation, it management, auditing, security management, software compliance
    
Tripwire
Published By: IBM     Published Date: Oct 06, 2014
While traditional B2B sales channels are still the most influential, the explosive growth of B2B ecommerce is forcing B2B organizations to dedicate resources and budget to the on-line sales channel. While B2B organizations can learn from B2C in terms of user experience, B2B selling is much more complex and requires a centralized commerce platform that fully supports sophisticated workflows, pricing, product configurations, approvals and more. In this paper, we explore the impact of the on-line channel and examine five key components required to achieve B2B commerce effectiveness.
Tags : 
b2b sales channels, b2b ecommerce, user experience, centralized commerce platfrom, emerging marketing
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
In this webinar, you will learn about the availability of SAP HANA across the entire IBM Power Systems line with pre-sized IBM POWER8 configurations that are optimised for SAP HANA, highly available/disaster recovery options for SAP HANA on Power Systems deployments, and systems management solutions to maintain the SAP HANA systems. You will also hear client use cases on why they chose to implement their SAP HANA solution on IBM Power Systems..
Tags : 
ibm, sap, sap hana, suse, ibm power systems, enterprise applications, open source
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"DBAs need help with tackling significant issues, including doing more with fewer resources, quickly responding to upgrade and patch needs, while reducing the time spent on cloning databases. Finally, they need help eliminating the time they spend integrating, testing, and deploying full-stack cloud solutions. How can DBAs reconcile these competing demands? Learn more about expanded offerings in a database appliance that are delivering numerous advantages. These new configurations have the potential to help IT derive new benefits in its efforts to serve the business. "
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: IBM     Published Date: Apr 04, 2013
IBM PureFlex Systems combine advanced IBM hardware and software with “patterns of expertise” and integrate them into three optimized configurations that are simple to acquire and deploy. Read the data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
ibm pureflex, system configurations, database configurations, patterns of expertise, integrate
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
IBM PureFlex Systems combine advanced IBM hardware and software with “patterns of expertise” and integrate them into three optimized configurations that are simple to acquire and deploy. Read the data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
ibm, ibm pureflex system, pureflex system configurations, pureflex system express, compute, storage, networking, enterprise applications, business technology
    
IBM
Published By: Metalogix     Published Date: Oct 16, 2013
Microsoft SharePoint sites can play a critical role in just about every business workflow.Originally embraced to streamline internal employee collaboration, today SharePointsystems support customer-facing services and enable information sharing with partners.
Tags : 
metalogix, ebook, microsoft sharepoint, microsoft sharepoint collaboration, governance and compliance, configurations, software development, it management
    
Metalogix
Published By: igus     Published Date: Aug 28, 2019
Cable carriers, sometimes referred to as cat tracks, drag chains or energy chains, can be manufactured in many ways. They can be made with different materials, such as steel or plastic, and they can have simple lightweight designs or complex multi-axis configurations. But how do you know which carrier is best for your application? Choosing the right energy chain is crucial because it offers the following benefits: Longer service life for cables and hoses Improved machine safety Reduced operating costs Read this basics guide to discover a range of cable carrier design and material options, as well as tips for selecting the ideal energy chain. You can also review installation guidelines for maximizing the service life of your cable carrier and the energy supply system it protects.
Tags : 
    
igus
Published By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
    
Symantec
Published By: Symantec     Published Date: Jun 29, 2012
Securing Multiple Web Server and Domain Configurations
Tags : 
licensing, symantec, multiple server, ssl acceleration, hosting configurations, business technology
    
Symantec
Published By: Cisco     Published Date: Nov 18, 2015
Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test methodology focused on specific areas in which Cisco believed there were key competitive differentiators between the products. Test results validated include throughput, latency, energy efficiency, stacking, LACP load balancing and Quality of Services (QoS) performance. Miercom found that the Cisco Catalyst 2960-X demonstrated superior performances against the competitive switches in the tests featured in this report. We tested the following switch-configurations of the Cisco Catalyst 2960-X, HP 2920 and HP 5120 product families.
Tags : 
competitive, analysis, deployed, methodology, networking, wireless
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics, security, data management
    
Cisco
Published By: HPE     Published Date: Aug 26, 2014
One thing is clear: the old way of running IT just won’t work in the new business environment.Truth is, preparing your IT department (and your company) to be agile, cost-efficient, metrics-driven, and flexible will require a change in how you operate. To support new business processes, you would do well to turn to a converged system, like HP ConvergedSystem for Virtualization. In this paper, we look at the greatest challenges faced by IT departments, and how traditional configurations, processes, and organizations are poorly-equipped to handle today’s workplace. We discuss the benefits of converged systems that are engineered to handle virtualized workloads. Finally, we look at HP ConvergedSystem for Virtualization as a simple and effective way for businesses to optimize their data center infrastructure and processes to better meet business needs.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business, converged, metrics-driven, cost-efficient, enterprise applications
    
HPE
Published By: HP     Published Date: Aug 26, 2014
Start or expand your virtualization efforts quickly and affordably. HP and VMware provide a portfolio of virtualization reference configurations designed for growing businesses like yours. Based on HP ProLiant Gen8 servers, the HP Flex-Bundles for VMware, provide predefined virtualization solutions that include everything you need to reduce application downtime by 30 percent, slash diagnostics and problem resolution time by 26 percent, boost VMware capacity utilization by 40 percent, and increase consolidation ratios by 37 percent. Discover how.
Tags : 
productivity, secure, safe, servers, processor, email, calendar, solution, improve, exchange, accessibility, management, system, contacts, device, performance, infrastructure, bundles, operations, portfolio
    
HP
Start   Previous    1 2 3 4 5 6    Next    End
Search