CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

maturity

Results 51 - 75 of 300Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Oracle Analytics     Published Date: Oct 10, 2017
How are organizations balancing self-service analytics and data governance today? What are the trends for tomorrow? Many organizations are on their way to achieving self-service analytics maturity through the use of intuitive data visualization technologies aimed at non-technical users; as well as various tactics that reduce reliance on IT. But handing the analytics reins entirely to business users can make governance nearly impossible. As a result, organizations are increasing investments in modern analytics platforms that enable a balance between IT governing and curating data, empowering business users to derive insights from data mostly on their own and without delay. Join guest speaker, Forrester Research VP and Principal Analyst, Boris Evelson and Oracle Analytics Senior Group Director, Jose Villacis as they discuss insights from an Oracle-commissioned study of North American enterprise analytics leaders.
Tags : 
    
Oracle Analytics
Published By: Oracle Analytics     Published Date: Oct 10, 2017
How are organizations balancing self-service analytics and data governance today? What are the trends for tomorrow? Many organizations are on their way to achieving self-service analytics maturity through the use of intuitive data visualization technologies aimed at non-technical users; as well as various tactics that reduce reliance on IT. But handing the analytics reins entirely to business users can make governance nearly impossible. As a result, organizations are increasing investments in modern analytics platforms that enable a balance between IT governing and curating data, empowering business users to derive insights from data mostly on their own and without delay.
Tags : 
    
Oracle Analytics
Published By: IBM     Published Date: Jan 09, 2017
Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Cybersecurity issues are no longer limited to the IT department; instead, they threaten every aspect of the organization and pose a significant threat to ongoing business continuity and reputation.
Tags : 
ibm, security, maturity, c suite, cybersecurity, enterprise applications, business technology
    
IBM
Published By: Oracle     Published Date: Sep 24, 2015
The Business Impact Of Marketing Maturity In The Age Of The Customer
Tags : 
modern marketing, forrester report, becoming a modern marketer, email marketing, emerging marketing, social media
    
Oracle
Published By: Akamai Technologies     Published Date: Aug 24, 2018
xxx
Tags : 
    
Akamai Technologies
Published By: Success Factors     Published Date: Jul 27, 2012
The complimentary 2011-12 Towards Maturity Benchmark report consolidates the experiences of more than 1,800 organizations over the last 8 years. It cuts through the hype to show how HR leaders in real organizations are using both established and new learning technologies to help improve performance and business agility. Download today.
Tags : 
success factors, sap, towards maturity, towards maturity benchmark, boosting business agility, learning technologies, learning strategies, technology-enabled learning, workplace learning, business agility, e-learning maturity, learning technology investment, learning technology adoption, business technology
    
Success Factors
Published By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : 
adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
    
CAST
Published By: Steelwedge     Published Date: May 12, 2014
Supply Chain Insights in their study found that more than 80% of the companies they surveyed had an S&OP process. However, most companies have varying levels of maturity with it, and hence, very mixed results. The starting point to building a roadmap for a mature and successful S&OP process is to assess your current process. Gartner’s Maturity Model provides a very good mechanism for it.
Tags : 
steelwedge, s&op, integrated business process, financial planning, sw2, gartner, it management, knowledge management, business technology
    
Steelwedge
Published By: Monotype     Published Date: Jun 16, 2016
Read Monotype’s latest white paper to learn: - User interface and technology considerations at each stage of the Product Maturity Model - How using advanced font technologies in early stages can lay the groundwork for smoother transitions and advanced product features - The difference between scalable fonts and bitmap fonts
Tags : 
monotype, spark, font, product maturity model, product maturity, user interface, user experience, font technology, emerging marketing, social media, internet marketing, crm & customer care, marketing research, traditional marketing
    
Monotype
Published By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
    
CA Technologies
Published By: Skillsoft     Published Date: Aug 26, 2016
Around the globe, organizations in every industry sector are struggling to attract, retain, and develop talent. But few organizations are prepared to successfully overcome those challenges. Download a new learning and talent framework to learn how to create a sustainable source of talent, and to overcome skill gaps. In it you’ll find: - What fundamental shifts you need to make to better compete for talent - How to exploit technology for smarter HCM and L&D strategies - Why learning and talent management processes must be tightly integrated Download "The Skillsoft Learning and Talent Maturity Framework.
Tags : 
microlearning, development, mobile, employee developmentlearning, engagement, talent management, elearning, elearning, hcm, enterprise applications, business technology
    
Skillsoft
Published By: Progress     Published Date: Mar 06, 2017
The Digital Marketing Maturity Guide helps organizations determine the level of sophistication within their digital marketing operations. Dimensional Research to conducted a global survey of 700 marketing professionals gauging the level of digital marketing maturity across various verticals and company sizes. Use these findings to benchmark your organization against other groups.
Tags : 
digital marketing, operations, big data, analytics, web content management, content management systems, it management, data management
    
Progress
Published By: Progress     Published Date: Oct 09, 2017
The Digital Marketing Maturity Guide helps organizations determine the level of sophistication within their digital marketing operations. Dimensional Research to conducted a global survey of 700 marketing professionals gauging the level of digital marketing maturity across various verticals and company sizes. Use these findings to benchmark your organization against other groups.
Tags : 
    
Progress
Published By: Intel     Published Date: May 15, 2017
This paper proposes a Service Provider Network Maturity Model — a framework by which Service Providers can prioritize activities, measure their progress, and benchmark against best-in-class developments.
Tags : 
service providers, prioritization, sdn, nvf, networking
    
Intel
Published By: Splunk     Published Date: Aug 21, 2018
While the modern enterprise embraces digital technology, it is also at risk of cyberattacks. In this guide, “The Essential Guide to Security”, we map out how organizations can use machine data for specific use cases and get started addressing threats and security challenges. Download your complimentary copy to learn: *How to assess your organization’s security maturity *What specific threats you should be looking for and how to fight them *What data sources are needed for specific use cases *What software solution you need to get ahead of different threats
Tags : 
    
Splunk
Published By: Dun & Bradstreet     Published Date: Apr 21, 2016
When the right approach is applied, analytics can drive more effective marketing strategies. While marketers understand the role analytics plays within the organization, most are not leveraging analytics to really drive enterprise performance. We surveyed 100+ business leaders to understand the state of analytics maturity across today’s leading organizations, uncovering common challenges teams are facing in their quest to use data and analytics to deliver a competitive advantage. What We Uncovered: - 73% of analytic professionals claim to work for an analytically-driven company - Only 42% of companies have a strategy for using analytics across the enterprise - Just 38% of companies share results of their analytic insights outside their department - 81% of organizations rely on 3rd parties for at least some portion of their analysis Download the report to learn how marketers, like yourself, view themselves in light of using analytics to drive their business.
Tags : 
hoover's, marketing strategies, analytics, data, internet marketing, sales
    
Dun & Bradstreet
Published By: IBM     Published Date: Jul 26, 2017
Just a few years ago, many organizations turned to private cloud environments to help increase flexibility and control costs—largely because of the immaturity and lack of control within the public cloud environments then available. Today, however, the decision to “go cloud” is less of a binary, and more of a spectrum of choices, spanning different deployment models (public, private and hybrid) and service types, including IaaS, PaaS and SaaS.
Tags : 
cloud, data protection, security, deployment methods, service types
    
IBM
Published By: Cisco     Published Date: Jul 01, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale, cloud computing
    
Cisco
Published By: Cisco     Published Date: Jul 27, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale, cloud computing, design and facilities
    
Cisco
Published By: Workday     Published Date: May 09, 2018
Compare your professional services firm with more than 450 PSOs with this expansive benchmark study from Service Performance Insight. Get access to hundreds of pages of charts, graphs, and analyses that offer insight into the performance of your peers and where you can improve to make the greatest impact.
Tags : 
    
Workday
Published By: Salesforce.com     Published Date: Sep 20, 2013
In 2013 Salesforce.com partnered with Fifth Quadrant to conduct quantitative and qualitative research into the customer service space in Australia and New Zealand. The research was designed to specifically examine new channels for service delivery such as Mobile Devices, Social Media to name a few and the maturity level of Australian organisations in regards to Customer Experience Strategy.
Tags : 
salesforce, crm, crm solutions, research, best practices, ces, technology, knowledge management, data management, business technology
    
Salesforce.com
Published By: RSA Security     Published Date: Nov 06, 2013
This paper discusses the value of operational technologies while acknlowledging there is a "value ceiling" for some niche tools, highlighting the opportunity to seek broader value as part of the GRC program maturity process.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search