CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

government agencies

Results 76 - 100 of 113Sort Results By: Published Date | Title | Company Name
Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security, anti virus, network security appliance
    
Shavlik Technologies
Published By: IBM     Published Date: Jul 24, 2012
Tax revenues have been declining recently and some of this loss is caused by fraud, tax evasion, and various forms of tax cheating. The ineffective recovery techniques can give government agencies poor results, which results in 20% of broad-approach audits ending in "no charge". By using IBM SPSS Predictive Analytics Solutions it is possible to maximize revenues, analyze the data you already collect, detect non-compliant accounts efficiently, and identify important differences in tax records. This program has tremendous power and features an easy to use interface that focuses investigations on case that yield large adjustments ensuring a successful ROI for clients.
Tags : 
tax revenues, fraud, ibm, business analytics, spss solutions, tax cheating, roi, finance
    
IBM
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio, networking, security, it management, wireless, enterprise applications, sales, information technology
    
E-SignLive by Silanis
Published By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
    
HPE Intel
Published By: Canon Solutions America     Published Date: Oct 17, 2017
Transforming government processes starts with laying the right foundation for your organization’s workflow. Many government agencies have embarked on transformation initiatives; however, there is still room for improvement to build a more stable transformation foundation.
Tags : 
pii security, pii breach, pii compliance checklist, how to protect pii, pii information security, pii data compliance, pii data protection, pii data breach, pii encryption, pii encryption best practices, public sector printing, secure public sector printing, security breach in public sector
    
Canon Solutions America
Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard, internet security, intrusion detection, intrusion prevention, policy based management, security management, vulnerability management
    
Qualys
Published By: IBM     Published Date: Dec 11, 2012
Enterprise Ready Intelligent Capture (ERIC) — a coordinated approach to document input and processing that combines distributed and centralized scanning with fax and electronic conversion across numerous departments. Read on to learn more.
Tags : 
government agencies, critical improvements, paper bound functions, ibm, enterprise ready intelligent capture, efficiency, enterprise applications, data management, business technology
    
IBM
Published By: AlienVault     Published Date: Oct 21, 2014
The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.
Tags : 
communication, government, reducing cost, digital, network, public sector, logical, industry, standards, performance, security, management, unified, solution, it management
    
AlienVault
Published By: SAP     Published Date: Jan 21, 2010
The goal of this article will be to contribute to the emerging dialog on the subject of business value by extrapolating from BI lessons learned and from DecisionPath Consultings experience working with Fortune 1000 customers and Government agencies.
Tags : 
sap, business intelligence, data warehousing, enterprise application, erp, scm, crm, manufacturing, process engineering, readiness assessment, roi analysis, business value delivery
    
SAP
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: Lumension     Published Date: Jun 10, 2011
Government agencies must protect sensitive data while improving transparency and accessibility-all in the face of rising cyberthreats. Download this free whitepaper to learn how.
Tags : 
malware, endpoint security, cyberattack, hacker, government security, identity, hacker detection, identity management, security management
    
Lumension
Published By: SAS     Published Date: Mar 06, 2018
The 2016 ACFE Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion.8 Victim organizations that lacked anti-fraud controls suffered double the amount of median losses. SAS’ unique, hybrid approach to insider threat deterrence – which combines traditional detection methods and investigative methodologies with behavioral analysis – enables complete, continuous monitoring. As a result, government agencies and companies can take pre-emptive action before damaging incidents occur. Equally important, SAS solutions are powerful yet simple to use, reducing the need to hire a cadre of high-end data modelers and analytics specialists. Automation of data integration and analytics processing makes it easy to deploy into daily operations.
Tags : 
    
SAS
Published By: Adobe     Published Date: Oct 25, 2017
With the right foundation, the road to digital transformation is easy. Find out the steps you can take to start your journey – and start delivering experiences that truly put your customers at the center. Read the guide, Customer-centric Digital Transformation: What You Need to Know to learn: • Five steps toward customer-centric digital transformation • Four key components that make up excellent customer experiences • Tips and inspiration from industry experts and digital government agencies
Tags : 
public sector, digital innovation, customer-centric, digital government, customer experience
    
Adobe
Published By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
    
Adobe
Published By: Group M_IBM Q3'19     Published Date: Aug 05, 2019
Expectations for government agencies are rising at a rapid and sometimes overwhelming pace. New laws, mandates and policies combined with rising citizen demands for usability and technology driven services put pressure on the public sector to deliver with current or even shrinking resources.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 05, 2019
The possibilities for the machine-augmented future are endless — but while artificial intelligence has become ubiquitous in the commercial world, its adoption in government has been slow. This toolkit will help agencies identify the necessary steps to embark on an AI journey — and provide tips for government innovators to easily progress from crawling and walking to the running stage with the technology.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
Society simply must change the way it serves its most vulnerable members. Service delivery models are outdated and constrained by budgets, organizational structures and legislation. Citizens aren’t getting what they need to become more self-sufficient and recover from hard times or significant events such as disasters. Government isn’t keeping up with the demand generated by the complex times we live in and agencies are stressed to the breaking point by current service expectations. Something different must be done to generate better outcomes. This action requires better engagement between government and citizens which can lead to more self-reliant individuals and lower demands and costs on government. In California, one county is tackling this challenge head on and has found a better way to serve their citizens.
Tags : 
    
Group M_IBM Q119
Published By: IBM     Published Date: Jun 09, 2015
Government revenue management agencies are using computer technology to capture and harvest data and extract value from it. This paper explains the importance of being data-droven and outlines a way forward in the journey of getting there.
Tags : 
ibm, government, data, records, legal, information, benefits
    
IBM
Published By: Neustar     Published Date: Mar 29, 2010
How SMS can help government agencies reach the public in 160 characters or less.
Tags : 
neustar, sms, mobile networks, text message, call to action, mobile marketing, government
    
Neustar
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
As employers, government agencies face a unique set of challenges. Fierce competition to find, keep, and develop the best talent, along with an increasingly intense level of scrutiny is placing human capital front and center. Not having enough staff, not having them properly trained, or having a noncompliant workplace can trigger a public crisis.
Tags : 
management, talent, organizations, communication
    
Cornerstone OnDemand
Published By: ForeSee Results     Published Date: Feb 07, 2007
Find out how e-government agencies, departments and offices fared in customer satisfaction, and how satisfaction was earned, in this Q4 Report by Foresee Results.
Tags : 
loyalty and retention, e-government, customer satisfaction, foresee, foresee results
    
ForeSee Results
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
Government agencies today are focused on collaboration and how they can best share information and make it available to those who need it, while maintaining security. This white paper discusses the necessary elements of a personalized portal and how they are leveraged to enable e-intelligence. Includes case studies of the U.S. Air Force Portal and the U.S. Coast Guard Portal.
Tags : 
egovernment, e-government, government, usaf, agency, agencies, portal, broadvision, knowledge management
    
Clearvale by BroadVision
Published By: Safe Software     Published Date: Aug 21, 2009
Spatial data warehouses are becoming more common as government agencies, municipalities, utilities, telcos and other spatial data users start to share their data. This paper illustrates some of the issues that arise when undertaking data replication and data sharing.
Tags : 
data warehousing, share data, data management, data distribution, data sharing, replication, safe, safe software
    
Safe Software
Published By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : 
security, network security, access control, compliance, secure content management, information security, physical security, holistic, riskwatch
    
RiskWatch
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military, compliance, hacker detection
    
HP - Enterprise
Start   Previous    1 2 3 4 5    Next    End
Search