CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information management

Results 651 - 675 of 683Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: May 24, 2016
Mobilität bietet das Potenzial größerer Wettbewerbsvorteile und damit erstklassige strategische Chancen für Unternehmen jeder Art, sei es durch Möglichkeiten für produktiveres Arbeiten für die Mitarbeiter oder durch innovative Methoden der Kommunikation mit den Kunden. Um dieses Potenzial auszuschöpfen, werden mobile Systeme im Unternehmen benötigt, die von den Benutzern nahtlos auf mehreren Geräten genutzt werden können und einen sicheren Arbeitsbereich für geschäftskritische Anwendungen bieten. Um den Anforderungen des mobilen Personals und Kundenstamms zu genügen, müssen Unternehmen BYOD- und Selbstbedienungsfunktionen sicher auf einer etablierten Plattform bereitstellen, die zudem skalierbar ist, um neue Prozesse zu unterstützen.
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management, project management
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 24, 2016
IT-Abteilungen müssen ihre BYOD-Anwender dazu anhalten, durch die Einbindung in enterprise mobility management (EMM) den unbefugten Zugriff auf Unternehmensnetzwerke zu minimieren und Sicherheitsverletzungen zu vermeiden. Um die Mitarbeiter von der Lösung zu überzeugen, müssen die Unternehmensleitung und das IT-Personal ihnen die Vorteile des Programms erläutern. Positionieren Sie BYOD als echten Vorteil. Mit BYOD können die Mitarbeiter selbst entscheiden, wie und mit welchem Gerät (etwa ihrem eigenen) sie arbeiten möchten. Auf den Geräten der Mitarbeiter sind in der Regel bereits Apps und Tools installiert, die die Benutzer als hilfreich betrachten. Dies erweist sich für Mitarbeiter wie Arbeitgeber als Vorteil. Die Betonung der Flexibilität und der Wahlmöglichkeiten von BYOD trägt dazu bei, dass das Programm als eine Lösung angenommen wird, die den Mitarbeitern eine höhere Produktivität und Effizienz ermöglicht.
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management, project management
    
VMware AirWatch
Published By: IBM     Published Date: Jan 07, 2016
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe, cloud, information management, security
    
IBM
Published By: EMC     Published Date: Oct 13, 2015
MG Group explains their adoption of EMC Documentum Capital Projects to streamline information control and effective management in the world’s largest PET production plant.
Tags : 
emc documentum capital projects, document management, share information, share documents
    
EMC
Published By: OpenText     Published Date: May 26, 2017
The global nature of today’s manufacturing industry means that it is more important than ever to ensure that all participants in the design and engineering process are able to access digital information relating to a product any time, or anywhere around the world.
Tags : 
opentext, manufacturing, design, engineering, information management
    
OpenText
Published By: OpenText     Published Date: May 26, 2017
Today’s fast-moving consumer market is putting pressure on manufacturers to be able to share digital product information seamlessly and quickly across retail and distribution channels. A centralized digital asset management platform helps to simplify the distribution of digital information across the extended enterprise.
Tags : 
opentext, manufacturing, retailer, distributor
    
OpenText
Published By: Jamf     Published Date: Mar 13, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: • How the Apple ecosystem is structured • How Apple management differs from Windows • What security features are unique to the Apple ecosystem • What to consider when adding new Apple devices • What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
Published By: Microsoft     Published Date: Apr 05, 2018
Im April kündigte Microsoft die Lösung Microsoft Relationship Sales an, die Microsoft Dynamics 365 for Sales mit LinkedIn Sales Navigator kombiniert. Vertriebsmitarbeiter haben Zugriff auf Informationen aus dem weltweit führenden professionellen Netzwerk, damit sie einfacher Interessenten finden und Beziehungen zu stärken. Die Lösung bietet: -Zugriff auf 500 Millionen LinkedIn-Profile mit Fotos sowie Informationen zu aktuellen und früheren Tätigkeiten der Mitglieder. Damit können Vertriebsmitarbeiter einen besseren Eindruck von ihren aktuellen Kunden erhalten und über das Netzwerk neue Leads finden. -Empfehlungen für die nächsten Schritte der Benutzer in Dynamics 365 auf Basis von Signalen aus E-Mail, Customer Relationship Management (CRM)-Software und LinkedIn. Diese basieren auf künstlicher Intelligenz (KI) und enthalten Vorstellungs- und Vernetzungsvorschläge sowie Vorschläge für InMail und Nachrichten.
Tags : 
crm strategy, crm-strategie, linkedin, dynamic sales
    
Microsoft
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
In today’s highly digital world, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses in order to deliver an optimal user experience. The IBM MaaS360 suite allows for a robust app development platform where you can increase portability and interoperability to enable and support every mobile user in your organization. Download this e-book to see how you can create the best mobile environment for your users and employees. All of the Enterprise Mobile Management tools and services needed to deliver the optimal user experience to every user, wherever they are, whatever app they are using, and whenever they need resources, are well-integrated into the MaaS360 suite from IBM.
Tags : 
enterprise management, mobile management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Datastax     Published Date: Aug 07, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
An integral part of your information management technology strategy is how you actually get the needed information into your business systems. Do you have staff devoting time to manually entering data in those systems? Data capture solutions automatically extract data from incoming documents and make data validation simple. Download this AIIM article to explore the history of data capture, its evolution into truly intelligent solutions and how you can benefit from these capabilities today.
Tags : 
information, management, technology, intelligent, data, capture, strategy, capabilities, solution, content, systems, onbase, hyland, validation
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Whether we’re talking about a life partner, a business partner or an enterprise information platform, you don’t want to start any kind of relationship without all relevant information – or worse yet, go in blind. Selecting a case management solution provider is no different. Download this white paper to discover key considerations and questions to ask when evaluating case management vendors and software solutions.
Tags : 
case, management, software, solution, dynamic, onbase, hyland, knowledge, worker, bpm, investigations, information, content, unpredictable, whitepaper, service, requests, issue, tracking
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Digital transformation is a concept on every IT and business leader’s mind, from improving back-office operations to creating better front-office experiences. Yet when it comes to adopting the latest information management technologies and digitally transforming operational processes, some organizations are further along than others. Download this report to find out how your organization stacks up.
Tags : 
strategy, digital, transformation, onbase, hyland, information, management, cloud, governance, content, back-office, whitepaper, enterprise, transforming, business, industry
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Case management continues to gain traction as a key capability in the information management space – supporting work that is unpredictable, information-centric and driven by human decisions. These are the processes that often directly touch your customers and stakeholders, including areas like contract management, claims processing, customer service, incident tracking and more. Download this eBook to explore three steps you can take to embrace a case management approach – improving employee productivity and customer experiences.
Tags : 
case, management, ebook, e-book, information, content, dynamic, applications, claims, processing, incident, tracking, solutions, software, strategy, knowledge, worker, enterprise
    
OnBase by Hyland
Published By: Epson     Published Date: Nov 20, 2017
A customer may store heavy file boxes in one of its warehouses, but Fireproof Records Center spends a lot of time strategizing about the paperless office. Based in Grove City, Ohio, the company helps businesses in central Ohio manage information more efficiently, offering a suite of cloud document management and scanning tools, including the easy-to-use Epson WorkForce® color document scanner.
Tags : 
    
Epson
Published By: IBM     Published Date: Jul 05, 2018
IBM® Information Governance Catalog helps you understand your information and foster collaboration between business and IT by establishing a common business vocabulary on the front end, and managing data lineage on the back end. By leveraging the comprehensive capabilities in Information Governance Catalog, you are better able to align IT with your business goals. Information Governance Catalog helps organizations build and maintain a strong data governance and stewardship program that can turn data into trusted information. This trusted information can be leveraged in various information integration and governance projects, including big data integration, master data management (MDM), lifecycle management, and security and privacy initiatives. In addition, Information Governance Catalog allows business users to play an active role in information-centric projects and to collaborate with their IT teams without the need for technical training. This level of governance and collaboration c
Tags : 
    
IBM
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search