CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information management

Results 376 - 400 of 683Sort Results By: Published Date | Title | Company Name
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : 
quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing
    
Quark, Inc.
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : 
quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing
    
Quark, Inc.
Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
There are wide variations in the level of SIEM technology support for specific use cases, so understanding them is a prerequisite for selecting the best product in a given situation
Tags : 
security, enterprise applications
    
Quinstreet - Infosec
Published By: Accelops     Published Date: Nov 05, 2012
Read this white paper to learn about guidance to operationalize security and put the top 10 best SIEM practices to work, offering pertinent insights and details about how to gain more assure value from security information and event management.
Tags : 
siem, information security, security information, event management, security, business technology
    
Accelops
Published By: TIBCO     Published Date: May 15, 2013
According to Forrester, most organizations today are only using 12% of their available data and only 37% of organizations are planning some type of big data technology project. At a time when companies are seeing volume of information increase quickly, it’s time to take a step back and look at the impact of big data. Join Mike Gualtieri, Principal Analyst at Forrester, for this webcast exploring the importance of integration in your big data initiatives. Discover how your ability to operate, make decisions, reduce risks and serve customers is inextricably linked to how well you’re able to handle your big data. Continue on to gain insight into: •3 key big data management activities you need to consider •Technologies you need to create for your big data ecosystem •A multi-dimensional view of the customer is the holy grail of individualization •Overcoming key integration challenges And more!
Tags : 
big data, integration, architecture, database, data warehousing, operations management
    
TIBCO
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security, business technology
    
Intralinks
Published By: Intralinks     Published Date: Oct 30, 2014
Are you struggling with finding an enterprise collaboration solution that’s both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, it’s even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers’ Guide provides insight into the factors you should be considering, keepi
Tags : 
enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency, security, enterprise applications
    
Intralinks
Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: Globalscape     Published Date: Jun 27, 2014
The PCI Security Standards Council issued version 3 of their PCI DSS guidelines for processing electronic payments. Our whitepaper details the newest additions to the guidelines as well as tools and resources to help organizations comply with the standards.
Tags : 
globalscape, file transfer, security, compliance, payment information, electronic payments, ecommerce, security
    
Globalscape
Published By: TIBCO     Published Date: Aug 18, 2014
Digitalization—the process of exploiting digital information to maximize business success—has increased the value of your data to the point where it is arguably your most important asset. This paper explains why mastery will not be possible with merely adequate integration technology.
Tags : 
tibco, integration, data integration, business integration, business intelligence, intelligence, analytics, digitalization
    
TIBCO
Published By: ReadyTalk     Published Date: Jul 07, 2016
Let’s face it, employees in Information Technology have a tough job. You’re the technical experts, responsible for hardware and software as well as business processes and sometimes project management. You’re also charged with being experts in communications, sales, marketing, psychology, counseling, and more just to get your company to adopt new ways of doing things or new technology. This is especially true when trying to deliver everything on time and on budget.
Tags : 
best practices, business optimization, business management, productivity, information technology, communication
    
ReadyTalk
Published By: Rackspace     Published Date: Mar 08, 2016
The cloud has taken many twists and turns on its route to maturity.
Tags : 
cloud management, information technology, cloud services, cloud management, productivity, cloud computing, content management
    
Rackspace
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: SAP     Published Date: Jun 23, 2009
Discover the importance of data integration in your environment, and learn about the key challenges, benefits, and approaches to integrating data.
Tags : 
business intelligence, data integration, sap, businessobjects, data warehousing, sarbanes-oxley, data consolidation, data marts
    
SAP
Published By: SAP     Published Date: Jun 23, 2009
In this paper, Frank Dravis, Six Factors Consulting, discusses how even with the finest marketing organizations, the success of marketing ultimately comes down to the data.
Tags : 
single platform, data integration, data quality, quality management, soa, architecture, soa, sap businessobjects data services
    
SAP
Published By: SAP     Published Date: Jun 24, 2009
As information flows more freely in the business world, decisions need to be made quicker and based on sturdier data.
Tags : 
business intelligence, smb, sap, small business, medium business, best-in-class, time-to-information, laggards
    
SAP
Published By: SAP     Published Date: Jul 07, 2009
How do you know what to do to protect your current business and identify areas of future growth? How do you balance opportunity with risk? This paper helps answer those essential questions.
Tags : 
sap, crm, supply chain management, enterprise resource planning, erp, business intelligence, information management, enterprise performance management
    
SAP
Published By: SAP     Published Date: Feb 21, 2008
Many significant business initiatives and large IT projects depend upon a successful data migration. Your goal is to minimize as much risk as possible through effective planning and scoping. This paper will provide insight into what issues are unique to data migration projects and offer advice on how to best approach them.
Tags : 
sap, data architect, data migration, business objects, information management software, bloor, sap r/3, application
    
SAP
Published By: SAP     Published Date: Jan 19, 2010
Your information can be one of your greatest assets - helping you stay on top of regulatory requirements, close to customers, and ahead of the competition. Organizations that pay attention to their data will be the ones to survive and thrive. So how do you obtain a complete view of your information when it is scattered across silos? Or integrate data from structured and unstructured data sources? Or help reduce the risk of inaccurate reporting? And how do you manage your information more effectively to help keep costs from spiraling out of control?
Tags : 
sap, eim, enterprise information management, erp, crm, etl, project management
    
SAP
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search