CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

manage devices

Results 151 - 175 of 304Sort Results By: Published Date | Title | Company Name
Published By: FICO EMEA     Published Date: May 31, 2019
: FICO commissioned an independent research study by TM Forum to look at how global telecommunication providers are using (and plan to use) machine learning and advanced analytics to improve the customer experience in credit risk and beyond. This in-depth report includes key insights from a global survey as well as executive interviews with leading communication service providers such as Telstra, Vodafone, Sky, Globe Telecom, and BT on their vision for leveraging artificial intelligence to stop fraud, better engage customers across channels, improve risk management, and drive collection results. Read this report to understand: o What CSPs see as the biggest drivers for deploying advanced analytics over the next two years o How and where BT, Globe Telecom, Vodafone UK, Sky and Telstra are using analytics, from marketing through origination o The opportunities and pitfalls around financing devices as opposed to or in addition to subsidising them o The scope for analytics to improve c
Tags : 
csp, advanced analytics, telco, improve credit risk, reduce fraud loss
    
FICO EMEA
Published By: Microsoft Surface     Published Date: Feb 14, 2017
There’s a big change happening in how small and medium-sized businesses (SMBs) think about IT security as they take advantage of mobility and the cloud. They’re recognizing the need for mobile device management (MDM), cloud security, and the importance of choosing the right devices.
Tags : 
    
Microsoft Surface
Published By: Motorola     Published Date: Feb 06, 2008
This paper details the importance of striking a balance between the lock-down management of your mobile solutions and allowing end users the freedom to use mobile devices in the way that works best for them.
Tags : 
motorola, motorola good, smart phone, smart phones, user experience, wireless
    
Motorola
Published By: Urban Airship     Published Date: Oct 08, 2013
Discover how the right Mobile Relationship Management (MRM) strategies and technologies can propel your brand to the front of the field. Winning in mobile means delivering real value to your customer's lives, and adding to that value as you learn from your customers over time. That’s where MRM fits in. Learn 10 things you can start doing now to harness the power of 3 billion mobile devices worldwide to create even stronger connections between your customers and your brand.
Tags : 
mobile relationship management, mrm, mobile marketing, mobile intelligence
    
Urban Airship
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : 
ciso, mobile, computing, security, idg, symantec, managers, enterprise
    
CDW Symantec
Published By: Tyco Integrated Security     Published Date: May 05, 2015
With security management apps, you can better protect your livelihood -- wherever and whenever you want.
Tags : 
mobility, mobile devices, networking, security, it management, wireless
    
Tyco Integrated Security
Published By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : 
byod, workforce mobility, enpoint protection, mobile devices, absolute software, access control, application security, identity management
    
Absolute Software
Published By: Sophos     Published Date: Jul 01, 2013
The BYOD paradigm has rapidly moved from novelty to near inevitability. Even IT organizations with deep concerns about manageability and security are increasingly accommodating user-owned devices. BYOD is here to stay, and tomorrow’s BYOD will involve even greater diversity in devices, form factors and platforms. Learn about where BYOD stands, where it’s headed, core challenges and how to build a BYOD action plan.
Tags : 
mobile, byod
    
Sophos
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management
    
netForensics
Published By: Proofpoint     Published Date: Apr 22, 2010
This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.
Tags : 
proofpoint, outbound email, data loss prevention, email security, social networking, electronic messaging, mobile email, internet security
    
Proofpoint
Published By: Zebra     Published Date: Jul 10, 2014
In this paper, Zebra shows how a solid device management solution can provide consistency and visibility into device status to maximize uptime and business efficiencies. Ensuring visibility of all assets whether they are directly on premise or at remote locations is another key benefit-for both IT and finance. Doing so helps maximize productivity where the devices are used, streamlines inventory management and compliance operations, and helps to create a more agile enterprise.
Tags : 
zebra, device management, centralized device management, finance, compliance operations, agile enterprises, device status, it management
    
Zebra
Published By: EMA     Published Date: Sep 23, 2013
Join Steve Brasen, EMA Managing Research Director, and Kimber Spradlin, IBM Product Marketing for Endpoint Manager, for this informative, on-demand Webinar where the latest unified endpoint management research is revealed. Learn the strategic management processes necessary to empower a mobile workforce with the agility to adapt to rapidly evolving business requirements. Topics discussed include: • Securing devices without impeding user productivity • Expanding management processes to address increased device heterogeneity • Supporting employee-owned devices • Simplifying practices for delivering business IT services • Enhancing user flexibility in accessing IT resources necessary to achieve business goals
Tags : 
ibm, ema, on-demand webinar, endpoint management, mobile workforce, strategic management, technology, productivity
    
EMA
Published By: IBM     Published Date: Apr 18, 2012
IBM Tivoli Netcool/OMNIbus is a "manager of managers" designed to collect and correlate events and provide a holistic "single pane of glass" view into the health and performance of the entire business IT and network infrastructure, with its increasingly instrumented devices.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, technology platform, software compliance
    
IBM
Published By: SAP     Published Date: Jul 18, 2012
As mobile operations spread through your organization, how is it possible to manage, support, and configure hundreds if not thousands of mobile applications for employees who use different mobile devices and operating systems requiring different versions of the same applications? Read this white paper to discover the importance of mobile application management, and learn best practices for establishing it within your organization.
Tags : 
technology, mobile, apps, applications, business, enterprise, workplace, e-mail
    
SAP
Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing, data protection, data management, software testing
    
CDW
Published By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
    
CDW
Published By: CDW     Published Date: Jun 14, 2016
Mobile devices and apps have transformed the way enterprises operate in recent years, improving productivity, communication and collaboration, and in many cases completely changing how work gets done. To help optimize mobility initiatives, many organizations turn to trusted IT partners that can help maintain mobile deployments and free up staff to focus on innovation.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity
    
CDW
Published By: CDW     Published Date: Jun 14, 2016
For most organizations, the question of whether to deploy mobile computing has long since given way to the question of how. And many are only in the early stages of mobility maturity. An expertly conceived strategy is necessary to achieve the innovation that mobility can provide.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity
    
CDW
Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
Published By: Plantronics     Published Date: Oct 18, 2013
Emerging technologies empower, but they can also confuse. Workers in the new mobile landscape struggle to manage communications with mobile phones, landlines, VoIP calls and different voicemail boxes, email, IM, text messages and social networking applications. Unified Communications is the answer. It’s the bridge between all these communication systems helping manage communications with one interface.
Tags : 
plantronics, office environment, unified communications, emerging technologies empower, manage communications, audio quality, communication channels, acoustic technology
    
Plantronics
Published By: Adobe     Published Date: Dec 08, 2014
When it comes to digital asset management (DAM) projects and rich media, marketers and IT professionals struggle to find the best ways to store, share, and deliver assets across devices. The Gartner Three Best Practices for Digital Asset Management Projects report identifies the key DAM challenges facing organizations and provides recommended strategies and best practices.
Tags : 
asset management, dam, rich media, metadata issues, emerging marketing, internet marketing, marketing research
    
Adobe
Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
Published By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : 
cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security, it management
    
ThreatTrack Security
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
    
CDW-Trend Micro
Published By: AWS     Published Date: Oct 31, 2018
In this panel discussion, AWS will join APN IoT Competency Partners, Bsquare (device management software and services), Eseye (global cellular connectivity), and Intel (edge-to-cloud IoT platform spanning sensors, processors, IoT gateways), and cloud infrastructure, for a conversation about the challenges and opportunities of device management. Find out how enterprises can accelerate time to business value with an integrated and fully-managed approach to their connected devices.
Tags : 
aws, iot, device, management, aws
    
AWS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search