CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

network

Results 1 - 25 of 4406Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
In an innovation-powered economy, ideas need to travel at the speed of thought. Yet even as our ability to communicate across companies and time zones grows rapidly, people remain frustrated by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The moats and castle approach is an antiquated, yet a common way, of protecting the enterprise network. This paper describes a new way to protect the enterprise which hides applications from the Internet, outside of the firewall, with zero open ports and a minimal attack surface.
Tags : 
security, enterprise security, eaa
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Published By: DigiCert     Published Date: Jun 19, 2018
Just as automation has become mandatory for scaling cloud workflows and critical workloads up or down in today’s dynamic business environment, the same is true in today’s dynamic threat environment. The ability to automate certificate renewals with our Complete Website Security solution helps you to strengthen certificate security, while helping you save resources, time and money on certificate administration and ensuring you remain compliant with industry rules and regulations. Download this whitepaper today to find out more.
Tags : 
    
DigiCert
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
As enterprises become more distributed and migrate applications to the cloud, they will need to diversify their network performance management solutions. In particular, the network operations team will need to complement its packet-based monitoring tools with active test monitoring solutions to enhance visibility into the cloud and help enterprises scale monitoring gracefully and cost-effectively.
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 03, 2018
This paper discusses the need to own and and use basic fiber test solutions in the datacenter.
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 03, 2018
Industry standards have been established to ensure performance, consistency, and interoperability between network equipment vendors. However, the consistent implementation and operation of these standards become even more critical as speeds and bandwidth increase. At the fiber infrastructure level, this also means more testing may be needed beyond the basic fiber end-face inspection certification and Tier 1 testing. This white paper explores Tier 2 optical time domain reflectometer (OTDR) testing and examines its relationship to Tier 1 testing and how inspection plays into both. This paper defines Tier 2 testing and explains when it is needed. It also addresses the OTDR complexity argument.
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 03, 2018
MPO connectors increase your data capacity with a highly efficient use of space. But users have faced challenges such as extra complexities and time required for testing and troubleshooting multi-fiber networks. VIAVI helps overcome these challenges with the industry's most complete portfolio of test solutions for MPO connectivity.
Tags : 
    
Butler Technologies
Published By: Dell PC Lifecycle     Published Date: May 15, 2018
Windows Server 2016 is an important release in enabling IT to deliver on the promise of the third platform. It provides a path to a seamless, integrated cloud environment—incorporating public, private and hybrid models—with the software-defined data center as the hub. In migrating to this next-generation data center model, it is essential that IT leaders choose the right partner for the compute platform, as well as storage, networking and systems management
Tags : 
    
Dell PC Lifecycle
Published By: TIBCO Software APAC     Published Date: May 31, 2018
The use of SaaS applications within an organization is the new normal. There is a good chance that just your marketing department is using more than 10 SaaS products, which is reflected in the amount you are spending on SaaS. According to Gartner, the 2015 worldwide market for SaaS software application sales was $33.4 billion, with projections to double that to $67.2 billion by 2019.1 Clearly, your integration needs are changing. SaaS applications, as well as mobile traffic, social networks, IoT, suppliers, partners, and customer channels are new integration points that will need to be captured in your business processes. This paper presents five principles for successful hybrid integrations.
Tags : 
    
TIBCO Software APAC
Published By: Workday     Published Date: Mar 02, 2018
It’s hard to imagine a world without Netflix. Yet less than 20 years ago, the world’s leading internet television network was nothing more than an idea and a vision. To meet incredible global demand and figure out how to expand rapidly, Netflix turned to Workday to help scale its resources quickly and modernize its systems. Check out this compelling story from Netflix to discover how Workday enabled Netflix to consolidate 11 systems into 1, streamline workflows, increase visibility, and bring its HR, IT, and finance functions together as a single team.
Tags : 
streamline workflow, increase visibility, global demand, modernize systems
    
Workday
Published By: Workday     Published Date: Mar 19, 2018
It’s hard to imagine a world without Netflix. Yet less than 20 years ago, the world’s leading internet television network was nothing more than an idea and a vision. To meet incredible global demand and figure out how to expand rapidly, Netflix turned to Workday to help scale its resources quickly and modernize its systems. Check out this compelling story from Netflix to discover how Workday enabled Netflix to consolidate 11 systems into 1, streamline workflows, increase visibility, and bring its HR, IT, and finance functions together as a single team.
Tags : 
netflix, global demand, streamline workflow, modernize
    
Workday
Published By: IBM     Published Date: May 30, 2018
If you are relying on a basic log manager or spreadsheets to manage security alerts, you may be missing critical threats in your network. You could boost your team's productivity with a modern SIEM platform. In this E-Book, you will learn the five most critical questions that you need to ask in order to determine the best security analytics solution for your organization.
Tags : 
    
IBM
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
Is your WLAN under increasing pressure from more users, more types of connected devices, and more bandwidth-intensive applications? It’s time to consider a better solution. With Ruckus Cloud Wi-Fi you get simple, centralized cloud-based management and the best performing Wi-Fi access points for high-density environments. Your job gets easier and your Wi-Fi gets better. Get visibility and control of your distributed Wi-Fi network with bandwidth to spare.
Tags : 
    
Ruckus Wireless
Published By: Ruckus Wireless     Published Date: Jul 16, 2018
Students and teachers at Belleville Township High School District now rely on Ruckus Networks to stay connected to laptops, tablets, and smartphones. With Ruckus Cloud Wi-Fi, the IT team at Belleville Township High School District is able to access and manage WLANs with a click of a button. Read this case study to learn why they chose Ruckus Cloud Wi-Fi, allowing Belleville to take classroom learning to the next level.
Tags : 
    
Ruckus Wireless
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance, networking, knowledge management, enterprise applications, business technology
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution, networking, knowledge management, enterprise applications, business technology
    
Sangoma
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search