CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

mba

Results 1 - 25 of 360Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and severity of cyberattacks continue to grow with no end in sight, cybersecurity teams are implementing new tools and processes to combat these emerging threats. However, the oneoverriding requirement for meeting this challenge is improved speed. Whether it’s speed of detection, speed of remediation or other processes that now need to be completed faster, the ability to do things quickly is key to effective cybersecurity. The reason why speed is essential is simple: As the dwell time for malware increases, the lateral spread of an attack broadens, the number of potentially breached files expands, and the difficulty in remediating the threat increases. And the stealthy nature of many of the newer threats makes finding them faster?before they become harder to detect?a critical focus in reducing the impact of an intrusion. These requirements make it essential that security operations centers (SOCs) can complete their activities far more quickly, both now and moving forwa
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: TIBCO Software     Published Date: Sep 16, 2019
A transformação digital da maior instituição de serviços financeiros familiar dos Estados Unidos, com uma história que remonta a três gerações. Saiba como o papel dos dados mudou no banco durante uma evolução contínua da experiência do cliente. O First Citizens Bank vem utilizando a tecnologia de integração e análise avançada da TIBCO para oferecer uma experiência de autoatendimento contínuo e consistente ao cliente, com o objetivo de combater fraudes e fornecer serviços financeiros mais precisos e proativos.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
La transformación digital de la institución de servicios financiera familiar más grande de América, con una historia que data de tres generaciones atrás. Entérese de cómo la función de los datos cambió en el banco durante la evolución de la experiencia del cliente. First Citizens Bank ha estado utilizando la integración y la tecnología analítica avanzada de TIBCO para ofrecer a sus clientes una experiencia de autoservicio consistente y continua, con el propósito de combatir el fraude y brindar servicios financieros más precisos y proactivos.
Tags : 
    
TIBCO Software
Published By: Shape Security     Published Date: Sep 16, 2019
Starbucks’ Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large.
Tags : 
    
Shape Security
Published By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how it’s evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
    
Iovation
Published By: Infosys     Published Date: Sep 09, 2019
Infosys has embarked on a transformational journey to reinvent the way it and its clients do business. Like our most visionary clients, Infosys' goal is to become a completely knowledge- and data-driven organization, with agility built into its DNA so that it can quickly sense changing business needs and continuously evolve in response. But we are not there yet, and the road is challenging. We are envisioning Infosys to be a Live Enterprise powered by the Infosys Digital Platform. The vision with the digital platform is to provide everyone who uses it with a frictionless digital experience wherever they are in the world. Anytime, anywhere access will be completely scalable and secure, and will feature online and offline compatibility in a flawless, employee-centric manner.
Tags : 
    
Infosys
Published By: FICO EMEA     Published Date: Aug 30, 2019
Telecommunications companies lost more than $29 billion to consumer fraud in 2017 globally (1.27% of their revenues). The largest and most advanced communications service providers (CSPs) have sophisticated fraud detection systems and processes in place, but those organizations are now questioning their fraud readiness. Are they doing enough? Fraudsters may be individuals or increasingly sophisticated criminal networks. They constantly develop new methods and target new lines of business Read this interview where Anat Hoida, Head of the FICO’s Telecom Practice in Europe, Middle East, and Africa, discusses the impacts of the evolving spectrum of fraud risks on the growth and competitiveness of CSPs globally.
Tags : 
telecom subscription fraud, prevent fraud, fight fraud using analytics
    
FICO EMEA
Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Today’s C-level executives expect data and analytics to provide them with speed and agility to deliver competitive advantage and to disrupt new markets. But, in today’s complex data environment exists a near paradox between these expectations, that companies will be able to rapidly deliver value using data and analytics--and the complexities of the data landscape, making it more difficult to find, govern, connect to and access the data needed to deliver that value. Once thing is clear: if management expectation is to be met, simplifying connectivity is a must.In this white paper, veteran analyst Mike Ferguson, Managing Director of Intelligent Business Strategies explores how simplifying data access –connectivity –aligns expectations with data realities thus decreasing time to value.
Tags : 
    
Simba by Magnitude
Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Siloed data has become the Achilles heel of marketing insights –especially in the world of B2B and B2B2C marketing. Today’s marketing and sales departments sit on a goldmine of data derived from the dozens of applications and data sources in their MarTech stack. Still, the real opportunity for insights is hidden in the combined data across applications. Combining data in a comprehensive way delivers a full picture of marketing efficacy and efficiency. In this eBook, learn about the origins of siloed data, and how data has emerged and evolved, as well as review the benefits that marketing can realize with connected data. Along the way, we’ll share some action items you can take to assess your current situation and build a plan to unify your data and fuel great marketing insights.
Tags : 
    
Simba by Magnitude
Published By: Group M_IBM Q3'19     Published Date: Aug 05, 2019
The possibilities for the machine-augmented future are endless — but while artificial intelligence has become ubiquitous in the commercial world, its adoption in government has been slow. This toolkit will help agencies identify the necessary steps to embark on an AI journey — and provide tips for government innovators to easily progress from crawling and walking to the running stage with the technology.
Tags : 
    
Group M_IBM Q3'19
Published By: Cisco     Published Date: Jan 04, 2016
Sin embargo, los costes operativos se dispararon, ya que se necesitó una serie de procesos complejos y laboriosos. Con el tiempo, estos costes se controlaron gracias a una mayor integración de los servidores y la infraestructura de la red, así como a capacidades de software más avanzadas.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless, data center
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
We have conditioned patients not only to expect opioids for pain relief, but to utilize more and more of them, and the addiction is both psychological and physical. To remedy the situation, a lot of policies and practices and behaviors must change around how the health care system approaches pain. But we do not yet have the data and analytics we need to determine what specifically to do at the patient level or the policy level. Download this whitepaper to learn more about the resources available and how we can fix this issue.
Tags : 
    
SAS
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC Flash Storage, powered by Intel® Xeon® processors. Download this report to learn more.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Nov 29, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC solutions, powered by Intel®. Download this report to learn more.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
La tecnología del hardware no dura para siempre. Tiene un ciclo de vida, un comienzo y un final medibles con respecto a su productividad y valor. El departamento de TI se encarga de optimizar el ciclo del ciclo de vida de los PC e impulsar al mismo tiempo avances estratégicos para la organización. Sin embargo, lidiar con el coste alto y la complejidad que impone la gestión de los PC deja poco tiempo para la innovación. Ofrecemos opciones de financiación flexibles que ayudan a garantizar que el departamento de TI siempre tenga todo lo que necesita y cuando lo necesita para que los usuarios finales nunca tengan que interrumpir su trabajo por problemas de este tipo. Obtenga más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : 
enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, cloud computing, mobile device management
    
CA Technologies
Published By: Dell EMC     Published Date: Feb 07, 2018
Technology is quickly moving to the forefront of business priorities as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users leverage applications and data in new ways. Organizations in all industries must better align with changing customer preferences to avoid being disrupted by a new crop of nimble competitors. Technology will increasingly determine how businesses define and distinguish themselves in the market. IDC has noted that most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on an IT transformation initiative to modernize and automate their legacy infrastructure to prime themselves to achieve their digital business goals and initiatives. Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. a
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2018
Modern businesses are increasingly embracing digital transformation — leveraging new technologies to reinvent core processes, business models, product offerings, and the customer experience. As businesses embark on the digital transformation journey, they need to modernize their underlying technology infrastructure to enable a more agile, customerfocused, flexible, and innovative digital workplace to drive greater human and operational efficiencies. Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor
Tags : 
    
Dell EMC
Published By: Ruckus Wireless     Published Date: Jan 19, 2016
Lodi USD needed a long-lasting wireless infrastructure with enough headroom to support media-rich apps running on tens of thousands of Chromebooks. This case study explains why the school district turned to Ruckus Wireless.
Tags : 
lodi school, student-to-mobile, students, wlan, wifi, mobile devise, network, wireless, classroom, media-rich apps, school
    
Ruckus Wireless
Published By: Pega     Published Date: Aug 11, 2016
Citizens rely on government social services programs to help combat poverty, disease, disabilities, and economic and physical hardships. Governments are also tasked with providing healthcare, security, and infrastructure services.
Tags : 
    
Pega
Published By: Akamai Technologies     Published Date: Mar 19, 2019
If you have a website, you most likely have an infestation of bots. While some bots are beneficial, bots can make up a significant portion of your daily website traffic. Malicious bots bombard websites with direct and specific attack goals, such as stealing customer information, scraping content, and even initiating DDoS attacks. Our latest eBook explores the differences between good bots and bad bots, and explains the best way to manage harmful bots.
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search