CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information management

Results 351 - 375 of 683Sort Results By: Published Date | Title | Company Name
Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management
    
ARMA
Published By: Quark Software     Published Date: Mar 19, 2015
Companies of all sizes are realizing the increasingly important role digital plays in the enablement of their employees, sales teams and customers. To communicate with employees and customers around the world, Lufthansa Cargo needed to develop a corporate tablet and smartphone app that featured key details about the company such as information on its fleet, network, infrastructure, products and corporate responsibility. While Lufthansa Cargo had already gone digital with a customer magazine, the company realized a corporate app was a must have. Originally the app was envisioned as a toolkit for Lufthansa Cargo‘s top management and sales staff, but it ultimately developed into a multimedia offering for all air cargo enthusiasts. Download the case study to learn how Lufthansa Cargo increased its digital reach with an award-winning corporate app.
Tags : 
digital publishing, sales enablement, digital sales enablement, mobile sales enablement, enterprise mobility, corporate app, automated publishing, automated digital publishing
    
Quark Software
Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
To power your new and legacy applications and workloads, different IT environments are required based on your unique industry and application needs. Organizations need the right mix of traditional infrastructure, private cloud, and public cloud with consistent management and control software to meet the demands for agility and excellent user experience.
Tags : 
infrastructure management, applications, information technology, cloud computing, content management, infrastructure, network management, business technology
    
CDW-HPE Servers
Published By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: LogRhythm     Published Date: Dec 20, 2016
For security analysts, a flow of security alerts is an inevitable consequence of the digital age. Moreover, as alerts can signal business-impacting incidents, the enterprise’s security staff cannot be complacent. Staff must be relentless in gathering logs, setting alert parameters, assessing alert severity, and then prudently responding to incidents with countermeasures.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: LogRhythm     Published Date: Feb 07, 2017
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: McAfee     Published Date: Mar 31, 2017
The concept of SIEM orchestration provides immediate, automated responses. It is the only way for a modern enterprise to protect against advanced attacks.
Tags : 
secops, siem, soc, orchestration, threat intelligence, epo, automation, process integration
    
McAfee
Published By: McAfee     Published Date: Apr 06, 2017
Kirk Davis, Information Security Director, Vidant Health, says that the integration of McAfee threat management products allows his business to protect and remediate against threats while focusing on the business.
Tags : 
siem, secops, security operations, advanced threats, threat intelligence
    
McAfee
Published By: Google - SAP     Published Date: Jun 20, 2019
According to SiriusDecisions, 79% of companies miss their forecast by 10% or more. Pipeline management is often mismanaged and sales forecasting often off-base. Getting accurate and reliable information about the state of the deals in your pipeline is the key to a happy sales force. Accurate pipeline information also is the foundation of predictable and reliable sales forecasts. Wouldn’t a sales forecast that’s right all of the time be a boon to your organization? Download our new eBook “Pipeline Management and Forecasting are Key to Improving the Sales Experience” to find out how automated tools, AI, and clean data sets can help you as a sales manager to: ? Eliminate the mid-pipeline “black hole” and find out what’s really going on ? Use signals outside of your CRM to get scarily accurate deal opportunity scores and quarterly forecasts. ? Help align the customer journey with your sales process and get happy customers and happy sales reps
Tags : 
    
Google - SAP
Published By: Submittable     Published Date: Nov 06, 2019
Today's applicants have high expectations when it comes to the online submission process. If they can't get their information to you quickly and easily, they may not complete their application at all. It's easy to see the value in quality application software, but making that final product choice for your organization can be difficult. Understanding the key aspects of quality software will help you evaluate options carefully. This document outlines important points to consider when researching application management software, and suggests questions to ask when vetting potential solutions. Check out the cheat sheet at the end for an all-in-one, easy-to-print checklist of those questions. And go into your next meeting confident you're asking the right questions and making an informed choice. Application management software can go a long way toward simplifying your application and review process. Before you buy, though, be sure to go through this checklist of important questions to
Tags : 
    
Submittable
Published By: Submittable     Published Date: Nov 06, 2019
If your a grantmaking org, your probably aware that today's grant applicants have high expectations when it comes to the online application process. If they can't get their information to you quickly and easily, they may not complete their application at all. It's easy to see the value in quality application software, but making that final product choice can be difficult. When you have the right tools in place, you can manage applications for multiple grant projects with ease. A powerful grants management software helps you set up sleek online forms, organize your incoming applications, and collaborate with your team as you consider each applicant. Take the time to evaluate your options so you can find a product that meets all your team's needs. Grants management software can go a long way toward simplifying your application and review process. Before you buy, though, be sure to go through this checklist of important questions to help you evaluate your options and make the right choi
Tags : 
    
Submittable
Published By: Submittable     Published Date: Nov 06, 2019
Today's submitters have high expectations when it comes to the online submission process. If they can't get their information to you quickly and easily, they may not complete their submission at all. It's easy to see the value in quality submission software, but making that final product choice can be difficult. Understanding the key aspects of quality software for your organization will help you evaluate options carefully. This document outlines important points to consider when researching submission management software and suggests questions to ask when vetting potential solutions. Check out the cheat sheet at the end for an all-in-one, easy-to-print checklist of those questions. And go into your next meeting confident you're asking the right questions and making an informed choice. Submission management software can go a long way toward simplifying your submission and review process. Before you buy, though, be sure to go through this checklist of important questions to help you e
Tags : 
    
Submittable
Published By: Submittable     Published Date: Nov 07, 2019
When you're accepting digital submissions for contests, awards, or another purpose, organization is crucial. Today's consumers have high expectations when it comes to the online submission process. If they can't get their information to you quickly and easily, they may not complete their contest or award entry at all. It's easy to see the value in a quality submission software to manage your contest or award, but making that final product choice can be difficult. When you have the right tools in place, you can manage submissions for multiple contests and awards with ease. A powerful submission management software helps you set up sleek online forms, organize your incoming submissions, and collaborate with your team as you consider each submitter. Take the time to evaluate your options so you can find a product that meets all your team's needs. Submission management software can go a long way toward simplifying your contest or award submission and review process. Before you buy, t
Tags : 
    
Submittable
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Gartner     Published Date: Dec 21, 2011
Enterprise content management (ECM) represents both a strategy to deal with all types of unstructured content and a set of software products for managing the entire content life cycle. However, new content types and disruptive forces - such as the consumerization of IT - continue to multiply the number of repositories and applications that enterprises must deal with.
Tags : 
gartnet, enterprise, content management, technology, ecm, information management
    
Gartner
Published By: Brainloop     Published Date: Jan 04, 2012
How can IT provide a way for users to share documents without putting the company at risk? This white paper explores collaboration solutions using your current content management, ERP and security infrastructure, as well as a few new ones that might not be on your radar.
Tags : 
brainloop, technology, security, security solutions, infrastructure, access control, security management, security policies
    
Brainloop
Published By: VMware AirWatch     Published Date: May 18, 2016
A Google Trends search for “BYOD” reveals it is a fairly new term, appearing in news publications for the first time in late 2011. BYOD is one part of a much larger, deeper-rooted trend: The consumerization of IT, which can be traced back to the early 2000s. Around that time, most everyone had a personal computer, which enabled them to work from home after hours – and to realize the benefits of using the devices that they had carefully chosen and were comfortable using, rather than the corporate devices their IT departments had issued them. BYOD and the consumerization of IT continued to grow as devices became cheaper and more connected. Where IT leaders were once solely concerned with reining in all the unapproved devices accessing the corporate network, a recent Intel and readwrite report that shows 49 percent of U.S. IT managers “strongly agree that BYOD improves worker productivity.” The next era of BYOD has arrived, and IT departments are thinking about it as a strategic value-ad
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 19, 2016
Innovation in business mobility is adding up to opportunity for the enterprise— opportunity to accelerate employee productivity, increase collaboration, and streamline business processes through mobile applications. At the same time, IT organizations are keen to control costs and maintain safeguards around their corporate information. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. But how do you know your organization is poised to make the move to EMM, or if you should be leveraging more from an existing EMM solution? Here are five cues to consider that the time is right to adopt EMM for your organization.
Tags : 
innovation, opportunity, best practices, productivity, mobile, application
    
VMware AirWatch
Published By: Workday     Published Date: Sep 30, 2019
Be a more strategic partner to the business with data-driven HR analytics. Follow these five steps to: Streamline data processes Develop key metrics to answer essential business questions Share timely HR insights across the organization
Tags : 
workday inc (wday), career development, employee engagement, human capital management, human resource management
    
Workday
Published By: Cymfony     Published Date: Feb 22, 2007
Social media - online sites like blogs and discussion boards where consumers create and share information and opinions directly with each other - are beginning to affect brands. Download this white paper now to understand the importance of a social media strategy, and how to make the case to management.
Tags : 
blogs, branding, blog, social media, sales & marketing software, marketing automation, customer interaction service, cymfony
    
Cymfony
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : 
trend micro, trend, e-discovery
    
Trend Micro, Inc.
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: GoToMeeting     Published Date: Jun 09, 2010
This new Forrester white paper provides a snapshot of a typical day in the life of a U.S. information worker. It reveals how workers are employing new technologies and applications, interacting with their teams and engaging in mobile activities.
Tags : 
citrix gotomeeting, information worker, knowledge management, desktop computers, remote access employee, remote access, remote network management, desktop management
    
GoToMeeting
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search