CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

enterprise cloud

Results 1051 - 1075 of 1167Sort Results By: Published Date | Title | Company Name
Published By: StreamSets     Published Date: Sep 24, 2018
Imagine you’re running a factory but without a supply chain management system or industrial controls. Instead, you expect your customers to find and fix your delivery and quality problems. Sound ludicrous? Well, in many enterprises that’s the current “supply chain management” process for big and fast data. It relies on the lightly monitored dumping of unsanitized data into a data lake or cloud store, forcing data scientists and business users to deal with failures from data availability and accuracy issues.
Tags : 
dataflow, operations, factory, industrial
    
StreamSets
Published By: Stripe     Published Date: Aug 06, 2019
Payments is an increasingly strategic area of focus for enterprises, impacting market expansion, customer experience, business model evolution and, ultimately, revenue growth. As the role of payments in business strategy continues to expand, enterprises need secure, reliable and scalable infrastructure to underpin their transaction acceptance and processing capabilities. Stripe commissioned 451 Research to understand how large enterprise-scale merchants are thinking through their online payments infrastructure requirements. 451 Research surveyed 800 merchants across 8 countries, including a mix of business decision-makers from payments to finance to IT. KEY FINDINGS • 87% of mid- and large-sized businesses surveyed use the cloud as their dominant payments environment. • Nearly two-thirds of respondents using the public cloud for payments have seen improvements in security, innovation and uptime, while nearly three in five cited improved scalability. • Respondents using public-cloud-
Tags : 
payment security, platform as a service (paas), foreign currency transactions, fraud protection, payment solutions
    
Stripe
Published By: SunGard     Published Date: Aug 13, 2012
Unicous marketing improves reliability and flexibility, reduces costs, and increases performance with SunGard Enterprise Cloud Services.
Tags : 
unicous marketing, sungrad, cloud, services, improve performance, efficiency, enterprise applications, infrastructure, network performance, network provisioning, server hardware, servers, small business networks, green computing, cloud computing, data center design and management, data center
    
SunGard
Published By: Sungard Availability Services     Published Date: Apr 18, 2016
Is Hybrid IT really benefiting enterprises? Many are working through challenges while also receiving results.
Tags : 
hybrid it, enterprises, technology, cloud, cloud computing, hybrid, itil, virtualization, infrastructure, design and facilities
    
Sungard Availability Services
Published By: Sungard Availability Services     Published Date: Apr 18, 2016
This infographic illustrates the split personality of Hybrid IT.
Tags : 
hybrid it, enterprises, technology, cloud, cloud computing, hybrid, benefits of hybrid it, itil, virtualization, infrastructure
    
Sungard Availability Services
Published By: Symantec     Published Date: Jan 10, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has went from "if" to "when". This white paper is aimed to help enterprises making decisions on where and when to implement cloud.
Tags : 
cloud hosting providers, cloud, hosting, security, implementing cloud, networking, data management, business technology
    
Symantec
Published By: Symantec     Published Date: Oct 12, 2012
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions.
Tags : 
ssl certificates, cloud hosting, cloud services, encryption, authentication, certificate validation, secure sockets layer, it security, security, business technology
    
Symantec
Published By: Symantec     Published Date: Jun 18, 2015
Learn how to properly secure your enterprise in the cloud and see why it is important to safely move your organization to the cloud.
Tags : 
mobile devices, enterprise in the cloud, data breach, centralized servcers, security, enterprise applications
    
Symantec
Published By: Symantec     Published Date: Jun 18, 2015
Learn about the growing complexities of the cloud and see why there is a growing complexity within IT security and what your organization must do to adapt.
Tags : 
enterprise it architecture, service-oriented architecture, hybrid environments, private and public clouds, user identity, security
    
Symantec
Published By: Symantec     Published Date: Jul 09, 2017
This paper describes how malware is evolving, how it functions, and how it can be identified, neutralized, and blocked by what we refer to as cloud generation malware analysis, which is available as a robust enterprise cloud service. Let’s start with how the blizzard of advanced malware alarms is affecting IT security teams.
Tags : 
cloud, malware, threat and vulnerability management, security
    
Symantec
Published By: Symantec     Published Date: Jul 31, 2017
The Shadow Data Report, published by Symantec, addresses key trends and challenges faced by enterprises securing data in cloud apps and services.
Tags : 
data, data security, cloud, threat and vulnerability management, cloud applications
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Symantec CloudSOC Cloud Data Protection allows enterprises to selectively encrypt or tokenize field-level information in SaaS apps like Salesforce, ServiceNow, and Oracle. Stay agile, competitive and compliant with the freedom to move sensitive or regulated information to the cloud while retaining physical ownership of encryption keys /token vaults.
Tags : 
cloud data protection, data protection, security, encryption, security infrastructure
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
This white paper explores the challenges associated with protecting data in today’s enterprise and starts to detail how a modern data loss prevention (DLP) solution, delivered as part of a cloud-based web security gateway, can provide continuous monitoring and protection of sensitive data on mobile devices, on-premises and in the cloud.
Tags : 
data protection, security, encryption, cloud, web security
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Systemware     Published Date: Sep 07, 2018
Five key trends are shaping the enterprise content management (ECM) space. New business objectives, new market imperatives, and new cloud-based platforms compel technology and business decision makers to take a fresh look at their strategy and underlying platforms. This report will help enterprise architecture (EA) professionals make informed decisions about their content management agenda.
Tags : 
systemware, content management, digital transformation, content cloud, top key trends, intelligent information, data storage, enterprise content management, it management, content services, enterprise architecture
    
Systemware
Published By: Telx     Published Date: Dec 09, 2014
CIOs are on a constant quest to understand what infrastructure will provide the best fit, at the lowest risk and cost. In today’s evolving data center, defining the proper use of data center assets, and how cloud-based platforms may or may not fit into the mix is critical to business success. With the abundance of cloud offerings in the market place, physical infrastructure is no longer an enterprise IT requirement. Cloud has established itself as an excellent option for infrastructure outsourcing.
Tags : 
telx, data center, network architecture, infrastructure, storage, data center costs, power and cooling, energy, servers, data center design and management
    
Telx
Published By: Telx     Published Date: Mar 15, 2016
The cloud isn't just for startups and enterprises. Typically, businesses with 20-1,000 employees do not have huge IT teams or budgets. As result, understanding the potential of the Cloud hasn’t been easy and figuring out the benefits of the Cloud can be a huge challenge. The FierceCIO Midmarket and SMB Guide to Cloud Computing sponsored by Digital Realty | Telx and accompanying webinar shows how you can benefit from the Cloud, too.
Tags : 
cloud, telx, smb, midmarket, security, provider, digital, networking, it management, wireless, enterprise applications, platforms, data management, business technology, data center
    
Telx
Published By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : 
secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts, ebook
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
"What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services, including: Develop an enterprise cloud strategy, including guidance on what data can be placed into which clouds and under what circumstances. Implement and enforce policies on cloud ownership, responsibility and risk acceptance by outlining expectations for form, significance and control of public cloud use. Follow a life cycle approach to cloud governance that emphasizes the operational control of
Tags : 
    
Tenable
Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata
Published By: Teradata     Published Date: May 02, 2017
As companies consider incorporating enterprise-level cloud services offered by Amazon Web Services, Microsoft Azure, Teradata, and others, many challenges arise related to data security, integration into existing data architecture, and analytics activities themselves. Download this article to understand these and other considerations for evaluating and adopting a cloud strategy for your enterprise, and what it means for analytics.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Teradata
Start   Previous    33 34 35 36 37 38 39 40 41 42 43 44 45 46 47    Next    End
Search