CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information management

Results 251 - 275 of 674Sort Results By: Published Date | Title | Company Name
Published By: STARLIMS     Published Date: Apr 16, 2014
Learn how a Laboratory Information Management System can improve trace evidence management in the crime lab, but will also help analysts with data entry, documentation, and quality control.
Tags : 
starlims, lims, trace evidence management, crime lab, quality control, it management, data management
    
STARLIMS
Published By: STARLIMS     Published Date: Apr 16, 2014
Learn how a Laboratory Information Management System reduced turnaround time for all system functions by an average of 50% for a pharmaceutical manufacturer.
Tags : 
starlims, flexible electronic canvas, lims, data management
    
STARLIMS
Published By: Adobe     Published Date: Jun 26, 2019
In the race to please customers and beat out the competition, there’s been a lot of talk about customer data platforms (CDPs). For marketers, a CDP is just what they’ve been looking for — a more comprehensive approach to unified customer data that lets you include raw personally identifiable information or sensitive data in your data pool. But while IT teams see the ultimate value, they may question the idea introducing a new point solution that complicates their tech stack even more. The days of brute forcing customer experience with new technology are over. Today, IT teams need to make decisions about customer experience management that span the business and go beyond marketing. That requires a different approach to the customer data problem. To learn more about our solution to the customer data platform, read our article Real-time CPD. Real-time customer experience.
Tags : 
    
Adobe
Published By: Oracle Primavera     Published Date: Apr 17, 2015
Learn how top performers select and execute transformative projects due to the centralized information and automated processes that Project Portfolio Management (PPM) solutions provide.
Tags : 
ppm, oracle, transformative projects, project portfolio management, it management, knowledge management
    
Oracle Primavera
Published By: CommVault     Published Date: Jun 10, 2015
Data and information management is becoming increasingly complex and dynamic. There are innovations in technology and process that can supply new advantages.
Tags : 
software, backup, optimize, management, efficiency, productivity, business technology, infrastructure
    
CommVault
Published By: Cherwell Software     Published Date: Apr 24, 2019
Each year, a total of 180,000 IT service tickets are created and processed. These include requests and incidents of all kinds, such as the provision of the flight information displays, an employee request for a laptop, through to IT equipment for an airline customer. The Airport’s IT team therefore decided to undertake a complex and ambitious project, entitled “ITSM 2020,” which aimed to establish a uniform and future-oriented IT service management system that would effectively and efficiently serve all areas of Munich Airport. Munich Airport evaluated various bidders in a two stage process conducted on the basis of the European Union tendering procedures. Cherwell was able to hold its own against other ITSM solutions both technically and in terms of price.
Tags : 
    
Cherwell Software
Published By: LogRhythm     Published Date: Aug 08, 2016
The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
Tags : 
cyber threat, cyber risk, technology, best practices, business management, business analytics, security, business technology
    
LogRhythm
Published By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : 
security, technology, best practices, information technology, business technology
    
LogRhythm
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Datastax     Published Date: Apr 04, 2017
As the big data ecosystem continues to expand, new technologies are addressing the requirements for managing, processing, analyzing, and storing data to help companies benefit from the rich sources of information flowing into their organizations. From NoSQL databases to open source projects to commercial products offered on-premises and in the cloud, the future of big data is being driven by innovative new approaches across the data management lifecycle. The most pressing areas include real-time data processing, interactive analysis, data integration, data governance, and security. Download this report for a better understanding of the current landscape, emerging best practices and real-world successes.
Tags : 
evolution, big data, technology, datastax, nosql
    
Datastax
Published By: Datastax     Published Date: Apr 04, 2017
An an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet the company's business goals. Read this comprehensive guide to learn how all the key areas of database design, creation, security, object management, backup/recovery, monitoring and tuning, data migrations, and more - are carried out in a NoSQL database.
Tags : 
architect, guide, nosql, datastax
    
Datastax
Published By: Zebra Technologies     Published Date: Oct 12, 2017
Zebra offers forward-thinking manufacturers unparalleled visibility into goods, assets, people and transactions that help maximize output, ensure quality assurance and traceability and increase operational flexibility with a smarter, more connected plant floor. Zebra Technologies commissioned a global study to analyze trends and challenges that impact manufacturing companies. The survey asked 1,100 executives from automotive, high tech, food, beverage, tobacco and pharmaceutical companies for their insights on adopting technology on the plant floor to increase their competitive position.
Tags : 
quality assurance, manufacturing, operations visibility, plant floor operations, iiot, visibility, jit shipment, wip information
    
Zebra Technologies
Published By: SafeNet     Published Date: Oct 06, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
    
SafeNet
Published By: Logrhythm     Published Date: Feb 24, 2016
This research will help you to: - Select an appropriate SIEM solution based on vendor research. - Create an implementation roadmap. - Define your SIEM architecture. - Measure the continued value of your SIEM.
Tags : 
security, security application, siem, siem architecture, it security managers, application security, security management, security policies
    
Logrhythm
Published By: Oracle     Published Date: Apr 05, 2016
With cybercrime and security breaches sharply on the rise, protecting valuable information from cyberattacks is an ongoing challenge for companies. In this increasingly insecure world, your critical information deserves the best protection, making the database and surrounding infrastructure the best line of defense. Protect your data better through evolving your approach to data security. Learn about three key steps to reinvent the security of your surrounding infrastructure to create an information fortress by protecting your valuable data at its source.
Tags : 
information management, security, best practices, information secuirty
    
Oracle
Published By: Safenet     Published Date: Oct 11, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
    
Safenet
Published By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : 
security information, event management, orchestration, surface, intel security
    
McAfee EMEA
Published By: SafeNet     Published Date: Jul 13, 2010
The information presented in this white paper discusses various approaches to cryptography and key management, and can be used as a starting point for developing an effective policy-based key management solution.
Tags : 
safenet, key management, cryptography, integrated security platform, policy compliance, data protection, enterprise security policy, lifecycle
    
SafeNet
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation
    
Dell Software
Published By: Motorola     Published Date: Aug 09, 2007
Wireless access to enterprise information is going mainstream. However, while the groundswell of enthusiasm for wireless access is coming from the bottom up, the management of wireless access needs to be driven from the top down. Learn how you can build a solid wireless strategy for your organization.
Tags : 
wireless, mobility, mobile computing, wireless security, remote access, fleet management, mobile workforce, mobile worker
    
Motorola
Published By: Computhink     Published Date: Nov 30, 2007
The Marin Community Foundation (MCF) was established in 1986 with the assets of a trust created by long-time Marin residents Leonard and Beryl H. Buck. From the start, MCF’s mission was to use philanthropic contributions to help improve the human condition and enhance the quality of life in Marin County, CA. An unintended consequence was that they were swimming in paper.
Tags : 
electronic document, document management, information management, case study, marin, mcf, marin community foundation, workflow
    
Computhink
Published By: Computhink     Published Date: Dec 10, 2007
The amount of paper that DUCA Financial Services had to retain for every member they dealt with was piling up. In fact, DUCA had a complete office wall dedicated to the storage of client records in thirteen large fireproof filing cabinets. "We simply ran out of space and had no more room to put anything," said Jack Vanderkooy, President & CEO. "While we have to maintain documents for our daily reference and access, the problem was made greater by the fact that legally we have to retain documents and files for the full term of each mortgage or loan."
Tags : 
paperless, document management, imaging, information management, computhink, viewwise, viewise, finserve
    
Computhink
Published By: Computhink     Published Date: Dec 10, 2007
The job of a Records Management Office is to take all paper documents that need to be preserved, from all county offices, and implement a strategy to preserve them. When the law changed on January 1, 2001 to allow digitally scanned copies to be legal documents (The Illinois Electronic Records Act), the challenge to find a preservation system that would be both efficient and cost effective increased dramatically.
Tags : 
document management, records management, information, electronic document management, computhink, viewwise, viewise, government
    
Computhink
Published By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Symantec.cloud     Published Date: Feb 12, 2010
Understand the legal issues if you do not conduct a risk assessment before creating your AUP.
Tags : 
messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment, information security, business continuity management, compliance
    
Symantec.cloud
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search