CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

mba

Results 251 - 275 of 369Sort Results By: Published Date | Title | Company Name
Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation, application security, auditing, internet security, security management, web service security
    
Iovation
Published By: Iovation     Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Tags : 
iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies, device print, web device print, pattern matching and risk assessment, identity theft, global fraud database, forensic analysis, credit card industry, application security, identity management, internet security, security management, web service security
    
Iovation
Published By: SPAN Systems     Published Date: Aug 30, 2013
2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.
Tags : 
securing applications, compliance, security, applications, security, firewall, compliance issues, loopeholes, ddos, denial of service, application security, business technology
    
SPAN Systems
Published By: SocialChorus     Published Date: Jan 07, 2014
Thanking advocates for their efforts is an important component to Advocate Marketing success. Whether your goal is to motivate advocates to create and share brand content or increase awareness, a comprehensive Thank You strategy is vital in keeping your employee, consumer and blogger advocates engaged and sharing.
Tags : 
advocates, advocate marketing, brand ambassadors, employee advocates, consumer advocates, bloggers, emerging marketing
    
SocialChorus
Published By: emily.shimell     Published Date: Oct 01, 2013
How is the trend of Virtualisation is impacting on the world of Video Conferencing? This paper looks at IT Virtualisation and traditional Video Conferencing, and discusses how the two worlds are now coming together to combat the main issues that have constrained the growth of video conferencing in the past 20 years, despite the prove benefits of HD video.
Tags : 
    
emily.shimell
Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection, security
    
Webroot Inc
Published By: Litmos     Published Date: Apr 27, 2015
Read this case study to see how Zumba enlisted the help of Litmos’ learning management system to expand and enhance Zumba’s fitness training program online.
Tags : 
learning management system, learning strategy, online training, mobile access, accessibility, human resources
    
Litmos
Published By: Micro Focus     Published Date: Sep 12, 2014
The corporate end-user community provides vital cogs in the wheel of a healthy organization. Users include the call centers, the retail assistants, the service desks, the sales offices and the people who deal with order processing. Yet many of these users are often faced with outdated user interfaces (UIs), and struggle to cope with the levels of efficiency and throughput needed. Worse still, these old systems typically only run on a connected terminal - or ‘green screen’ - but more and more these days, users need web and mobile access. Micro Focus Rumba+ dramatically improves business efficiency by providing a better user experience. It can also now be accessed from a variety of devices. Let’s take a look at five top reasons to move to Rumba+.
Tags : 
user experience, user interfaces, mainframe apps, business efficiency
    
Micro Focus
Published By: Micro Focus     Published Date: Sep 12, 2014
Where green screen apps meet modern interfaces, accelerating efficiency and enhancing the user experience. Provide core system access from Windows, iPad or your web browser – without the risks of new code or reprogramming.
Tags : 
green screen apps, modern interfaces, user experience, cores system access, software development, wireless
    
Micro Focus
Published By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : 
advanced threat defense, endpoint security, tech target research, security, it management
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This solution guide discusses how IT incident responders can unify the Protect, Detect, and Correct stages of managing threats in order to build a comprehensive security model that more efficiently combats targeted attacks.
Tags : 
threat management, adaptive security model, targeted attacks, agile, architecture, cybercrim, security connected framework, detection, analysis, intelligence
    
Intel Security
Published By: Group M_IBM Q3'19     Published Date: Aug 05, 2019
The possibilities for the machine-augmented future are endless — but while artificial intelligence has become ubiquitous in the commercial world, its adoption in government has been slow. This toolkit will help agencies identify the necessary steps to embark on an AI journey — and provide tips for government innovators to easily progress from crawling and walking to the running stage with the technology.
Tags : 
    
Group M_IBM Q3'19
Published By: IBM     Published Date: Dec 24, 2014
This infographic includes compelling statistics on cybercrime, and explains how to combat it with actionable insights using IBM i2 Enterprise Insight Analysis.
Tags : 
ibm, cybercrime, actionable insights, enterprise insight analysis, security, it management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, it security, vulnerability management, virus protection, spyware protection, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, data loss prevention
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management, compliance, disaster recovery, hacker detection, internet security, intrusion detection, intrusion prevention, web service security, vulnerability management, data loss prevention
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This white paper will discuss how the X-Force team collects, analyzes and distributes threat intelligence to IBM customers, as well as how this data is used to enrich the capabilities of the IBM Security portfolio.
Tags : 
intelligence technology, security management, threat intelligence, intelligence protection, security solutions, compliance, internet security, intrusion detection, intrusion prevention, network security appliance, security policies, vulnerability management, data loss prevention
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, bigfix, security qradar, security, endpoint intelligence, data security, data management, business technology
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security, security
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, threat, endpoint, security, intelligence, qradar, research
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, ibm bigfix, ibm security qradar, risk management, endpoint intelligence, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x-force, ibm security portfolio, threat intelligence, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 18, 2016
Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : 
ibm, big data, trusted data, data management, data solutions
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, security intelligence, bigfix, technology, best practices, security, business technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, security, big fix, advanced threats, security, security intelligence, endpoint security, networking, enterprise applications, data management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search