CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

layered

Results 26 - 50 of 95Sort Results By: Published Date | Title | Company Name
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Even with more advanced features and supposed higher throughput than ever before, firewalls are not able to keep up with modern demands or advanced threats. Users are more distributed than ever, and so is data. Threats are changing rapidly, and traditional defense mechanisms that rely on layered security do not work.
Tags : 
palo alto, enterprise network firewall, custom applications, traffic classification
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Every year, record levels of money are spent on new IT security technology yet major breaches and compromises are more prevalent than ever. The concept of “layered security” in which an organization supports a wide variety of security technologies in order to discourage attackers doesn’t seem to be working. It’s time to rethink IT security not just the technology, but the way it’s approached from a strategic, architectural perspective.
Tags : 
palo alto, security, security architecture, saas, applications
    
Palo Alto Networks
Published By: Symantec     Published Date: Dec 13, 2017
This paper explores in more detail how you can use complementary application isolation and antimalware capabilities, delivered by Symantec Endpoint Protection, to achieve a more holistic, layered approach to your security, without sacrificing productivity.
Tags : 
defenses, symantec, endpoint, protection, application, holistic, security, antimalware, isolation
    
Symantec
Published By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : 
mobile, security, technology, deployment, enterprise, crow sourced, intelligence
    
Symantec
Published By: MindTouch     Published Date: Mar 18, 2019
The recent groundswell around customer centrism and knowledge management (KM) is no coincidence. Today’s customer journey is far more expansive and layered. Customers, conditioned by the vast availability of convenient digital experiences, have come to prefer digital channels. And their expectations are high.
Tags : 
    
MindTouch
Published By: WatchGuard     Published Date: Oct 17, 2012
The Cisco ASAs and point solutions were not cutting it. The 3-person IT team needed a solid multi-layered solution that was easy to manage and could consolidate many processes within one device. Learn how WatchGuard provided an easy to manage answer.
Tags : 
watchguard, it solution, administrator, it infrastructure, it security, data management, utm, unified threat management, security, business technology
    
WatchGuard
Published By: WatchGuard     Published Date: Oct 17, 2012
Learn how STF Consulting used Watchguard to help them develop an easy to implement solution and helped them create multilayered network protection.
Tags : 
watchguard, utm, unified threat management, it infrastructure, it security, data management, security, business technology
    
WatchGuard
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 14, 2019
Use Case Demo: -Layered security strategy of UEM + Threat Defense -Detects jailbroken and rooted devices, using a root tool Magisk, which is a system-less root
Tags : 
    
MobileIron
Published By: FICO     Published Date: Mar 14, 2017
In this Executive Brief, we share best practices in how to evaluate and deploy layered controls that will help you develop a holistic approach to controls, investigate and control where risk is introduced, assess your risk appetite and benchmark your cybersecurity posture against others in your industry.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: LogicNow     Published Date: Mar 10, 2016
Layered Security in less than 10 minutes. All from a single, easy to use dashboard. Try MAX free for 30-days!
Tags : 
msp, layerd security, web protection, antivirus, patch management, software, web security, bandwidth, security, it management, enterprise applications, data management, business technology, data center
    
LogicNow
Published By: LogMeIn     Published Date: Feb 27, 2018
The North Face rigorously tested several providers and quickly realized that Bold360 hit all the marks. After the initial implementation, The North Face entered into a 3-month professional services engagement to take their chat strategy to the next level. The Bold360 professional services team helped The North Face implement strategic new chat features and tactics, including adaptive canned messages, proactive chat, dual monitors and layered chat, and provided additional development support as needed. To maximize the impact of its chat strategy, The North Face also created an 11-person core chat team, with reps chosen for their skills and product knowledge. Empowered with the capabilities of Bold360, these dedicated agents can now provide truly in-depth product support.
Tags : 
north face, online, customer, products, engagement, professional
    
LogMeIn
Published By: Webroot UK     Published Date: Feb 04, 2013
The Webroot solution provides customers with a layered approach to security including products for Web and email security, email archiving and endpoint security. Offerings can be implemented as an integrated suite or as individual point products.
Tags : 
solution, malware, email archiving, endpoint security, individual point products, web, business technology
    
Webroot UK
Published By: BMC Software     Published Date: Jun 30, 2009
Read a compelling case study by EMA, Inc. to learn how Dell uses BMC CONTROL-M to cut cost and increase productivity with workload automation.
Tags : 
dell, ema, bmc, control-m, itil, it services, application integration, saas, end-to-end workflow mapping, erp, enterprise visibility and management, service-driven management, dynamic and agile workflow, itsm integration, layered architecture, technical account manager, tam, it management, enterprise applications
    
BMC Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Published By: Entrust Datacard     Published Date: Jul 30, 2008
Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.
Tags : 
layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard, entrust, identity management, iam, authentication, compliance, password management, security management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, business technology
    
Entrust Datacard
Published By: VMware     Published Date: Apr 08, 2011
Layered Tech chose Dell servers to build a new infrastructure that would take its managed hosting and cloud services to a new level, and saw performance increase by 22 percent. Download this case study to learn how.
Tags : 
vmware, vm ware, layered tech, dell, hosting, cloud services, consolidation, virtualization, cloud computing, colocation and web hosting
    
VMware
Published By: VMware     Published Date: Apr 08, 2011
Watch this video for an educational overview that explains how virtualization can help your business.
Tags : 
vmware, vm ware, dell, layered tech, virtualization
    
VMware
Published By: Layered Tech, Inc.     Published Date: Dec 16, 2010
"WordPress.com does everything possible to ensure ease-of-use when it comes to our systems, but we also do everything possible to be both flexible and stable," said Barry Abrahamson, Systems Wrangler for Automattic, the company behind services including WordPress.com. "Layered Tech's willingness to innovate with us helps keep WordPress.com among the world's most popular sites."
Tags : 
layered tech, wordpress, hosting solution, blogging, web publishing, dedicated hosting, infrastructure, servers, data center design and management, colocation and web hosting
    
Layered Tech, Inc.
Published By: Layered Tech, Inc.     Published Date: Dec 16, 2010
Layered Tech's engineers created a customized package of virtual private data centers (VPDCs), managed services and disaster recovery solutions that support KANA's clients, large and small. Layered Tech tailored the architecture to meet the highest enterprise security requirements, as well as ensuring that each KANA client can deploy applications that scale to ongoing volume fluctuations.
Tags : 
layered tech, kana, virtual private data center, enterprise security, vpdc, disaster recovery, customer interaction, grid computing, servers, cloud computing, colocation and web hosting
    
Layered Tech, Inc.
Published By: Citrix Systems     Published Date: Jul 17, 2015
Why app and desktop virtualization should be the foundation for your layered approach.
Tags : 
information security, layered approach, mobility, application, desktop virtualization, application security, compliance, productivity, data loss prevention
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2016
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security.
Tags : 
citrix, it security, app virtualization, desktop virtualization, app, security, enterprise applications, business technology
    
Citrix Systems
Published By: CDW     Published Date: Nov 13, 2012
A Network that's layered with latency. we get it. and we've helped many organizations implement a network optimization solution to help keep their staff connected wherever their work takes them.
Tags : 
cdw, network optimization, network optimization, solution, business technology
    
CDW
Start   Previous    1 2 3 4    Next    End
Search