CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information access

Results 51 - 75 of 199Sort Results By: Published Date | Title | Company Name
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : 
data security, passwords, password protection, data vulnerability
    
Citrix ShareFile
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Data fuels workforce productivity. But corporate data typically resides in disparate silos spread across on-premises networks and cloud repositories. Knowledge workers are forced to repeatedly disrupt daily workflows to gather information from this data sprawl — a time-consuming and inefficient activity that diminishes productivity. They need a single point of access to all data sources, available from any device, where they can share and manipulate the content resources required to do their jobs.
Tags : 
sharefile, productivity, security, mobility, workflow
    
Citrix ShareFile
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This paper introduces a brief explanation of digital continuity and the opportunities and threats that it faces. The movement of product information to the digital domain in the 21st century has meant that we do not have physical items, like pieces of paper, which we can authenticate as being reliable information for decision making. Digital continuity is meant to remedy shortcomings of the digital environment by ensuring that information is unique, authoritative, current, and consistent, or more simply, has the characteristic of singularity. This paper includes: • Digital continuity within the Product Lifecycle • Digital continuity within manufacturing • Threats to digital continuity If we implement digital continuity correctly, we have all the advantages of the singularity of paper documents, but with the instantaneous and simultaneous ability to access the latest, updated information. Offered Free by: Dassault Systemes
Tags : 
    
Dassault Systèmes
Published By: Citrix Systems     Published Date: Sep 17, 2015
This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Tags : 
citirx, xenapp, xendesktop, business productivity, security, it management
    
Citrix Systems
Published By: MarkLogic     Published Date: Mar 13, 2015
Big Data has been in the spotlight recently, as businesses seek to leverage their untapped information resources and win big on the promise of big data. However, the problem with big data initiatives are that organizations try using existing information management practices and legacy relational database technologies, which often collapse under the sheer weight of the data. In this paper, MarkLogic explains how a new approach is needed to handle the volume, velocity, and variety of big data because the current relational model that has been the status quo is not working. Learn about the NoSQL paradigm shift, and why NoSQL is gaining significant market traction because it solves the fundamental challenges of big data, achieving better performance, scalability, and flexibility. Learn how MarkLogic’s customers are reimagining their data to: - Make the world more secure - Provide access to valuable information - Create new revenue streams - Gain insights to increase market share - Reduce b
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable
    
MarkLogic
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
    
MobileIron
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
    
Waterline Data & Research Partners
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Published By: IBM     Published Date: Oct 21, 2016
Between the Internet of Things, customer experience and loyalty programs, social network monitoring, connected enterprise systems and other information sources, today's organizations have access to more data than they ever had before-and frankly, more than they may know what to do with. The challenge is to not just understand that data, but actualize it and use it to recognize real business value. This ebook will walk you through a sample scenario with Albert, a data scientist who wants to put text analytics to work by using the Word2vec algorithm and other data science tools.
Tags : 
ibm, analytics, aps, aps data, open data science, data science, word2vec, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 09, 2018
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions. In search of instant analytical insights, businesses often prioritize data access and analysis over governance and quality. However, without ensuring the data is trustworthy, complete and consistent, leaders cannot be confident their decisions are rooted in facts and reality
Tags : 
    
IBM
Published By: SpyCloud     Published Date: Mar 30, 2018
Because of widespread password reuse, Account Takeover (ATO) attacks have become an extremely lucrative business for cybercriminals. Organized crime rings are performing ATO attacks at a massive scale by leveraging botnet-infected armies to attempt credential-stuffing attacks against various web and mobile applications. Cyber criminals exploit compromised accounts for financial gain by pilfering financial or personally identifiable information (PII) directly or by selling access to these accounts on underground markets. Download our report to understand: The Underground economy driving these attacks The tools criminals are using to automate ATO Remediation Strategies to prevent ATO in your organization
Tags : 
    
SpyCloud
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Sage Software     Published Date: Jun 20, 2018
Data inundation and information overload have burdened practically every largescale enterprise today, providing great amounts of detail but often very little context on which executives can act. According to the Harvard Business Review, less than half of an organization’s structured data is actively used in making decisions. The burden is felt profoundly among finance executives, who increasingly require fast and easy access to real-time data in order to make smart, timely, strategic decisions. In fact, 80% of analysts’ time is spent simply discovering and preparing data, and the average CFO receives information too late to make decisions 24% of the time.
Tags : 
sage enterprise management, bms, erp, bom, enterprise accounting, enterprise intelligence, drp, enterprise
    
Sage Software
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: Oracle OMC     Published Date: Nov 30, 2017
The act of engaging with a customer or buyer is hardly a new concept. Nor is the inherent need to do so in order to achieve success. Companies initially had control of the relationship because they controlled the information. When consumers received the advantage of online access, they took the lead. But the terms of engagement have changed again. Because of the mobile app, the power has shifted back to the marketing department.
Tags : 
    
Oracle OMC
Published By: Mimecast ABM Q4     Published Date: Nov 22, 2017
Mimecast Cloud Archive has long set the industry standard for enterprise information archiving, helping to keep corporate knowledge available, protecting and preserving it while simplifying management and administration. By aggregating data across multiple platforms, organizations gain long-term business insights and create a secure, digital corporate memory while at the same time reducing costs and risks for legal and compliance teams. IT teams can reduce administrative overhead with streamlined management and simplified data recovery. Anytime, anywhere access to archive data improves employee productivity and efficient workflow efficiency. Customers can rest assured that their data is always-available, always-replicated and always-safe.
Tags : 
datenarchivierung, verantwortlich, eigentlich, organisation, it-mitarbeitern, wissensarbeiter, fuhrungsebene
    
Mimecast ABM Q4
Published By: SAS     Published Date: May 24, 2018
This paper provides an introduction to deep learning, its applications and how SAS supports the creation of deep learning models. It is geared toward a data scientist and includes a step-by-step overview of how to build a deep learning model using deep learning methods developed by SAS. You’ll then be ready to experiment with these methods in SAS Visual Data Mining and Machine Learning. See page 12 for more information on how to access a free software trial. Deep learning is a type of machine learning that trains a computer to perform humanlike tasks, such as recognizing speech, identifying images or making predictions. Instead of organizing data to run through predefined equations, deep learning sets up basic parameters about the data and trains the computer to learn on its own by recognizing patterns using many layers of processing. Deep learning is used strategically in many industries.
Tags : 
    
SAS
Published By: Epicor     Published Date: Jul 06, 2017
It’s hard to make good decisions without good information. Having access to data, and the tools to quickly analyze that data, is essential. Without data, you are blind to how your business is performing and areas for improvement—all you have to go on is instinct. A robust business intelligence (BI) system can provide new insights to help steer your distribution organization clear of obstacles that impede growth—and toward the opportunities that enable it. A monthly report just doesn’t cut it anymore. You need real-time information, and if you’re running legacy software, it’s probably slowing you down.
Tags : 
erp software, enterprise resource planning software, business intelligence, distribution, inventory management, distribution software
    
Epicor
Published By: Epicor     Published Date: Jul 06, 2017
Distribution is being transformed by digital innovations. More and more distributors are replacing manual, paper-driven processes with digital tools and automation that allow employees to work more efficiently and effectively in the warehouse and beyond. Efficiency doesn’t just benefit employees—modern technology can help keep customers and vendors happier with up-to-date information accessible anytime. Epicor Prophet 21 software was designed to meet the unique needs of distributors. It offers robust features including eCommerce, mobility tools, customer relationship management (CRM), wireless warehouse management, purchase management, and analytics to make more informed business decisions. With deep industry knowledge and best practices built into features throughout the solution, Prophet 21 can deliver the digital transformation your organization needs to grow.
Tags : 
erp software, enterprise resource planning software, distribution software, prophet 21, p21, inventory management
    
Epicor
Published By: Epicor     Published Date: Nov 07, 2017
Enterprise resource planning (ERP) software is the backbone of modern manufacturing information systems, enabling the digital transformation that’s changing operations and customer expectations. As the movement toward a digital workplace evolves, your ERP system must keep pace. Epicor commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) of deploying Epicor ERP. Several manufacturers using Epicor ERP found: • Faster access to data and improved real-time visibility enabled better decision-making • Improved multi-company operational efficiency • Increased competitiveness with faster turnaround of customer quotes and improved pricing accuracy • Increased versatility with the Epicor ERP cloud offering • Access to deep expertise in manufacturing best practices Read the study to find out how else Epicor ERP has helped manufacturers.
Tags : 
please add tags-- erp software, enterprise resource planning software, cloud, digital. roi
    
Epicor
Published By: Epicor     Published Date: Jun 11, 2018
Enterprise resource planning (ERP) software is the backbone of modern manufacturing information systems, enabling the digital transformation that’s changing operations and customer expectations. As the movement toward a digital workplace evolves, your ERP system must keep pace. Epicor commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) of deploying Epicor ERP. Several manufacturers using Epicor ERP found: • Faster access to data and improved real-time visibility enabled better decision-making • Improved multi-company operational efficiency • Increased competitiveness with faster turnaround of customer quotes and improved pricing accuracy • Increased versatility with the Epicor ERP cloud offering • Access to deep expertise in manufacturing best practices Read the study to find out how else Epicor ERP has helped manufacturers.
Tags : 
    
Epicor
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search