CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

maturity model

Results 26 - 50 of 62Sort Results By: Published Date | Title | Company Name
Published By: MicroStrategy     Published Date: Mar 15, 2018
xxx
Tags : 
    
MicroStrategy
Published By: Oracle     Published Date: Apr 03, 2012
Download this white paper, Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives, for a guide to governance that will set you on the right path.
Tags : 
soa, service oriented architecture, networking, middleware, weblogic, oracle, information technology, web services, application server, server, sla, maturity model, 10g, jvm, java, data management
    
Oracle
Published By: Kofax     Published Date: Aug 24, 2017
Are you ready for the digital revolution? Digital transformation is fundamentally reshaping the way insurers do business. From automated data integration, mobile implementation and analytics, digital transformation spans across your enterprise operations This white paper provides you with the roadmap you need to build a comprehensive enterprise-wide digital transformation plan that makes your insurance organization not only competitive, but differentiated. • Understand the forces behind digital disruption: customers, competitors, costs and compliance • Learn how to map, prioritize and identify opportunities for digital transformation • Leverage a process maturity model to advance your digital position
Tags : 
digital future, digital revolution, data integration, positioning
    
Kofax
Published By: Looker EMEA     Published Date: Sep 27, 2017
What is your Analytics Maturity? An 'Army of Analysts' can be very powerful. The problem, of course, is that as your organisation scales, and more data requests come in, you’ll constantly be hiring more analysts (and that gets expensive!). Download this infographic to discover what your analytics maturity is, and how to move from an 'Army of Analysts' to a more efficient, scalable model.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Looker EMEA
Published By: Tricentis     Published Date: Nov 15, 2018
The following maturity model is designed to help you assess your team’s progress on the journey to BDD maturity. This guide will give you a framework for understanding where your team is now on the road to BDD maturity and help you chart a direct course for taking it to the next level. The transition to BDD often comes with significant bumps in the road, but in our experience it is well worth the effort. Teams with mature BDD practices report higher levels of collaboration across functions and also tend to be more advanced in their DevOps release processes. By shifting testing left with BDD, these teams are delivering faster without sacrificing quality. By downloading this ebook, you will learn: o Five BDD maturity levels based on the adoption patterns we’ve seen among our user base and the industry at large o Strategies for achieving the significant process changes that BDD requires, both within and outside the QA team o Where your team is today and the milestones that will get you
Tags : 
    
Tricentis
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si può aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identità diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunità Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per sé, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilità attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identità umane.
Tags : 
    
CA Technologies EMEA
Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group
    
Burton Group
Published By: F5 Networks Inc     Published Date: Nov 20, 2008
One of the pillars of the Virtual Data Center is virtual platform infrastructure, or the virtual machine; however virtual platforms are dependent on many other, oft forgotten components of both the physical and virtual data center.
Tags : 
virtualization maturity, vdc maturity model, virtual data center stock, data center, iscsi, enterprise applications, storage
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Nov 20, 2008
Defining the baseline and process of virtualization maturity for the data center.
Tags : 
virtualization maturity, vdc maturity model, virtual data center stock, network virtualization, networking, enterprise applications, storage
    
F5 Networks Inc
Published By: Skillsoft     Published Date: Mar 06, 2014
Compliance training is a necessity to reduce the liability and legal risks businesses face on a daily basis.
Tags : 
risk management, compliance, code of conduct, governance, risk assessment, safety, training, risk prevention, skillsoft, human resources, corporate counsel
    
Skillsoft
Published By: ServiceNow     Published Date: Oct 11, 2017
Customer service and contact centers are on the front lines representing organizations. Their successful handling of service issues helps deliver on the promise of a great customer experience. To continue meeting the demands of customers — while fulfilling the organizational goal of delivering a differentiated service experience — the modern customer service organization requires a seamlessly integrated front-office to back-office enterprise applications architecture and set of processes. As products and services become more technical in nature — think IoT devices — this interconnectedness is essential. Systems and customer support staff must be informed and enabled through technology to provide a contextualized experience that meets the customer's needs. Consistency across channels, proactive service, knowledge of a customer's past service requirements, technical skills, and rapid assessment and response will be essential requirements for modern customer service, which in turn creates
Tags : 
    
ServiceNow
Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™ (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats.
Tags : 
cyber security, security intelligence, best practices, technology, security, business technology
    
LogRhythm
Published By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection, access control, anti spam, anti spyware, anti virus, application security, authentication, compliance, identity management, intrusion detection, intrusion prevention
    
Logrhythm
Published By: Trillium Software     Published Date: May 19, 2011
By implementing the six pillars of data quality optimization, your organization can incrementally improve the quality of the data that drives all your operations.
Tags : 
trillium software, data quality management, iqm, information quality management, quality maturity model, enterprise data management, edm, data storage requirements, digital universe, data hygiene best practices, data standards, data monitoring
    
Trillium Software
Published By: LANDesk     Published Date: Jun 02, 2009
A proven framework for delivering business alignment and implementing best practices for IT service management.
Tags : 
landesk, avocent, itsm, it business management, itbm, maturity model, service management, cobit, capability maturity model integration, cmmi, cmdb, kpi, sla, itil, productivity, project management, desktop management
    
LANDesk
Published By: LANDesk     Published Date: Jan 12, 2009
The purpose of this paper is to present a method for reducing risk and increasing IT contribution during uncertain times and to assist readers with measuring the value and building a business case for IT Service Management (ITSM).
Tags : 
avocent, itsm, it service management, itil, it infrastructure library, green it, business management, maturity model, best practices, crm, customer relationship management, crm tools, sla, service management
    
LANDesk
Published By: LANDesk     Published Date: Aug 26, 2009
Service management solutions have the potential to return very significant hard-currency ROI. Successful implementations dramatically improve decision accuracy, enhance productivity, increase operating efficiency and reduce operational risk by providing comprehensive context for a wide range of management decisions.
Tags : 
avocent, itsm, it service management, itil, integration, sla, it infrastructure library, green it, business management, maturity model, best practices, crm, customer relationship management, crm tools, sla
    
LANDesk
Published By: TeamQuest     Published Date: Aug 21, 2012
The recent adoption of virtualization technologies lowers the amount of hardware required and reduces power consumption to some extent. But it also raises management complexity since there is no longer a permanent and exclusive relationship between physical resources and the software that runs on it. If you then choose to implement a Service Oriented Architecture (SOA) on top of that, the increase in complexity multiplies.
Tags : 
teamquest, capacity management. maturity model, business technology
    
TeamQuest
Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management
    
ARMA
Published By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
    
CrowdStrike
Published By: Sitecore     Published Date: Sep 11, 2015
Download now to learn how Uponor tackled these challenges by leveraging The Sitecore® Experience Platform™ and using the Sitecore’s Customer Experience Maturity Model to create a custom marketing roadmap plan that creates extraordinary customer experiences.
Tags : 
marketing maturity, uponor, sitecore, crm, customer experience, digital presence, sitecore, search marketing, cloud computing, content management, crm & customer care
    
Sitecore
Published By: IBM     Published Date: Jul 23, 2009
Companies that successfully introduce a new requirements-engineering process not only change their process and technology but also change their thinking. While improving your requirements management and analysis practices, this step-by-step guide can help you accelerate change and process acceptance across your organization. Learn more today!
Tags : 
ibm, telelogic, doors, enterprise applications
    
IBM
Published By: IBM     Published Date: Nov 08, 2012
This ESG white paper outlines the Virtualization Maturity Model, how virtualization can decrease costs, its impact on storage, and what challenges comes with it.
Tags : 
server virtualization, ibm stormwize, v7000, ibm stormwize, server, data management, business technology, virtualization, cloud computing
    
IBM
Published By: Ektron     Published Date: Jun 03, 2014
Don’t let the mobile revolution pass you by. Download the whitepaper to find out where you rank, and where you should be headed.
Tags : 
ektron, digital experiences, digital marketing, marketing strategies, search, social, mobile, customer engagement, mobile first, mobile friendly, search marketing, email marketing, emerging marketing
    
Ektron
Start   Previous    1 2 3    Next    End
Search