CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

evaluation

Results 301 - 325 of 443Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Dec 05, 2016
All-flash storage is increasingly being used to consolidate multiple workloads onto a single platform to reduce complexity, enhance agility and lower costs. Learn how these three factors are shaping the use of all-flash storage and find out the evaluation criteria when considering all-flash storage solutions.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: IBM     Published Date: Nov 19, 2014
Risk Management: OpenPages GRC Platform: Hypatia Research Group - The Convergence of Enterprise Governance, Risk & Compliance Software Solutions: Best Practices, Benchmarks & Vendor Galaxy Evaluations
Tags : 
ibm, enterprise governance, risk, compliance software, software solutions, hypatia research, grc, grc software
    
IBM
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
How did you choose your anti-malware solution? Did you put it through the same rigorous process as your other security solutions? Or, did you simply renew your current product licensing? Perhaps you went with something you had used at a previous job. Maybe you even went so far as to read a few product reviews and third-party test results or evaluations. But, did you test the anti-malware solution yourself? In this book, we explain how artificial intelligence (AI) can help your enterprise combat malware threats in a more preventative, proactive, and radically better way than legacy anti-malware products. We explain why you shouldn't just believe a vendor's marketing. Instead, you should test different solutions for yourself, just as you would with any other major security investment. Read more in this eBook.
Tags : 
anti, malware, testing, generation, data, security
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
Enhanced regulatory pressure requires continuous evaluation of your bank’s risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to: • Improve monitoring programs. • Reduce false-positive alerts. • Increase monitoring coverage. • Reduce the rapidly escalating financial cost of maintaining AML programs.
Tags : 
    
SAS
Published By: WebEx Communications     Published Date: Dec 14, 2007
Through remote desktop sharing WebEx Support Center enables companies to manage and resolve remote support issues — whether they be external customer-driven or internal user-driven. Support personnel can initiate a session with a remote user by sending them an e-mail or providing a URL.Download this Paper to Learn More About a Support Center.
Tags : 
customer support, helpdesk, help desk, technical support, remote access, roi, spend management, cut costs, cost control, webex, productivity, customer service, customer satisfaction
    
WebEx Communications
Published By: Numara Software     Published Date: Jul 16, 2009
Find out how Numara Track-It! can help you build better processes, manage organizational knowledge and solve problems quickly. Keep issues from falling through the cracks and efficiently manage help desk requests as well as other processes that require request management: • Optimize help desk efficiency with easy to use systems • Empower customers with self service • Improve productivity with automated alerts, notifications and assignments • Reduce diagnostic time with knowledge management • Reduce resolution time with asset and work order history
Tags : 
help desk, track it, numara, customer management, best practices, customer satisfaction, self service, knowledge management, asset, work order, request management, alerts, sla, service level agreement, performance evaluation, dashboard
    
Numara Software
Published By: Numara Software     Published Date: Jul 16, 2009
Discover how Numara® Track-It!® helps you avoid unplanned service interruptions, lost revenue and customer dissatisfaction due to unmanaged change. With change management capabilities, you will have the flexibility and management tools you need.• Implement change control • Reduce time and effort while improving productivity and compliance • Leverage your IT investment with a fully integrated change management solution • Improve customer satisfaction • Adhere to best practices in IT change management • Reduce the cost of IT services
Tags : 
help desk, track it, numara, customer management, best practices, customer satisfaction, self service, knowledge management, asset, work order, request management, alerts, sla, service level agreement, performance evaluation, dashboard, it service delivery, cost cutting, change management, change request
    
Numara Software
Published By: SAS     Published Date: Mar 14, 2014
This report examines how data visualization can help organizations unleash the full value of information, and outlines key considerations to guide the solution evaluation process.
Tags : 
sas, data categorization, retrieval and quality, data visualization, data governance program, data management, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics, business relevance, visualization deployment, deployment, institute for analytics, productivity, data center
    
SAS
Published By: Intel Corp.     Published Date: Aug 08, 2012
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP's new B6200 StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance), high availability, architectural approach, pricing, and licensing.
Tags : 
storeonce, extends, edison, group, b6200, storeonce, backup, system, emc, data, domain, industry, leadership, deduplication, emc, competetive, analysis, scalability, capacity, performance
    
Intel Corp.
Published By: Splice Machine     Published Date: Feb 17, 2014
Hadoop has become popular to store massive data sets because it can distribute them across inexpensive commodity servers. Click here to learn more from this free report.
Tags : 
big data, hadoop, data centers, massive data, servers, virutalization, blades, cloud, splice, splice machine, cloud computing, data center design and management, colocation and web hosting
    
Splice Machine
Published By: Neubrain     Published Date: Apr 22, 2014
A guide to software evaluation and selection that aligns best practices and leading-edge technology with planning activities.
Tags : 
neubrain, budgeting software, budgeting software selection, forecasting software, budgeting and forecasting software, budgeting software evaluation, finance
    
Neubrain
Published By: Incapsula     Published Date: Jul 11, 2014
Given today's threat landscape and the availability of inexpensive "Do it yourself DDoS attack kits,” commercial websites of all sizes have become targets of DDoS attacks. This guide offers online businesses practical guidelines and evaluation criteria for choosing their DDoS mitigation solution.
Tags : 
ddos, mitigation service, cloud-based, delivery, security, speed, availability, websites, e-commerce, networking, software development
    
Incapsula
Published By: Intel Corporation     Published Date: Sep 10, 2014
Sponsored by: NEC and Intel® Xeon® processor The goal of ESG Lab reports is to educate IT professionals about emerging technologies and products in the storage, data management and information security industries. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by NEC Corporation of America. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
lab, reports, improvement, storage, data, technologies, purchasing, valuable, customers, third-party, evaluation, security, information, data management
    
Intel Corporation
Published By: ForgeRock     Published Date: May 05, 2015
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by ForgeRock.
Tags : 
esg, forgerock, identity platform, self-service, third-party authentication, it management
    
ForgeRock
Published By: AuditBoard     Published Date: Nov 26, 2018
You are the CAE of a mature company sitting with your external auditor, ready to kick off planning for the upcoming year. You’ve always been on top of your controls environment, and expect this upcoming year to go smoothly. However, mid-way through discussing your new areas of focus, the conversation goes astray as your auditor starts throwing out terms like “IPE” or “Electronic Audit Evidence” and says a whole new set of evaluation points will have to occur for every control test in your environment.
Tags : 
    
AuditBoard
Published By: Tripwire     Published Date: Aug 21, 2009
This paper covers the implementation, disclosure and ongoing evaluation of internal controls for SOX compliance with a focus on the role of IT, as well as the penalties for non-compliance.
Tags : 
sarbane oxly act, sarbanes oxley, sox, sarbox, sarbanes-oxley, financial, it management, audit, compliance, auditing, enron, tripwire, data management, itil, project management, software compliance, sarbanes oxley compliance
    
Tripwire
Published By: IBM     Published Date: May 28, 2014
The ability to keep pace with trends like big data, open data, sophisticated analytics, and the de-compartmentalization of data silos and processes, distinguishes leading master data management (MDM) solutions from their counterparts. IBM, one of the five vendors in this evaluation, is positioned as THE leader with the most prominent, widely implemented solution in the market.
Tags : 
ibm, forrester, master data management, big data, database management technology, data administrators, infosphere, biginsights, industry-standard sql, management systems, database metadata, application programming interfaces, api, data persistence, virtualize data, lifecycle management, big data strategy, it management, data management, data center
    
IBM
Published By: IBM     Published Date: Nov 22, 2014
In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Rated against an extensive 15-criteria evaluation, IBM earned one of only three Leader positions, and outpaced the competition in "completeness of vision," signifying our strength in delivering the most competitive solution to the marketplace.
Tags : 
integration brokerage, supply chain management, service delivery, integration functionality, b2b, it management, knowledge management, enterprise applications, business technology
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: IBM     Published Date: Oct 17, 2014
In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Rated against an extensive 15-criteria evaluation, IBM earned one of only three Leader positions, and outpaced the competition in "completeness of vision," signifying our strength in delivering the most competitive solution to the marketplace.
Tags : 
integration brokerage, service delivery, integration functionality, competitive solutions, it management, data management
    
IBM
Published By: IBM MaaS360     Published Date: Jul 01, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
ibm, forrester, enterprise mobile management, mobile, security, wireless
    
IBM MaaS360
Published By: IBM     Published Date: Jul 31, 2015
Market trends and vendor evaluation criteria.
Tags : 
security, data, event management, infrastructure, network management, productivity, project management
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
CASBs provide CISOs with a critical control point for cloud service visibility, security and compliance. Use Gartner CASB frameworks to support continuous cloud service discovery, adaptive access, verification, protection and the prioritization of CASB evaluation criteria.
Tags : 
ibm, gartner, cloud, cloud security, casb, ciso, security, cloud computing
    
IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search