CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

password

Results 151 - 175 of 218Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 09, 2015
This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.
Tags : 
ibm, it security, password security, malware prevention, security infrastructure, anti spyware, anti virus, application security
    
IBM
Published By: SAS     Published Date: Mar 06, 2018
Industry leaders from the banking and vendor landscape are working to streamline the customer experience while closing the opportunities for fraud and exposure. Balancing security and convenience will require an approach that combines consumer-facing authentication (such as passwords, PINs and biometrics) with background security measures (such as transaction and session-behavior analytics).
Tags : 
    
SAS
Published By: Dell Software     Published Date: May 10, 2013
The fact is that managing Window service accounts is time-intensive and tedious, so managing them well is nearly impossible—without the right third-party tools. Read this white paper to discover how easy it can be to manage services in Windows.
Tags : 
dell software, service account, automated tools, secure passwords
    
Dell Software
Published By: e-DMZ Security LLC     Published Date: Nov 16, 2010
This whitepaper discusses how e-DMZ Security's Total Privileged Access Management enhances host controls to deliver PCI compliance.
Tags : 
e-dmz security, pci compliance, compliance, pci dss, access control, password management, privileged users, security management
    
e-DMZ Security LLC
Published By: IronStratus     Published Date: Apr 10, 2012
With all their benefits, cloud applications increase passwords and decrease IT control over user access, compromising security. Register for a free IronStratus account and start securely managing access to all your cloud applications in minutes.
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption
    
IronStratus
Published By: IronStratus     Published Date: Apr 10, 2012
Passwords are the keys to your corporate apps in the cloud and they're managed ad-hoc and insecurely in spreadsheets, sticky notes & browser cache. Signup for a free IronStratus account and start securely managing access to your cloud apps in minutes
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption
    
IronStratus
Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi
    
Tripwire
Published By: IBM     Published Date: Apr 27, 2016
When it comes to customer service, millennials have little patience and incredibly high expectations. In the United States, this segment's buying power will surpass that of any other single generation in 2017. Are you ready to meet these demands? IBM Watson Engagement Advisor goes far beyond the conventional call center automation mandate of controlling operational costs - it empowers customers to serve themselves however and whenever suits them best. Whether it's troubleshooting their account, getting advice on which products to buy, or resetting their password, Watson Engagement Advisor is available 24x7 through any device to get to the heart of customers’ needs, faster.
Tags : 
ibm, ibm watson, watson engagement advisor, customer service, customer relations, customer engagement
    
IBM
Published By: IBM     Published Date: Apr 27, 2016
"When it comes to customer service, millennials have little patience and incredibly high expectations. In the United States, this segment's buying power will surpass that of any other single generation in 2017. Are you ready to meet these demands? IBM Watson Engagement Advisor goes far beyond the conventional call center automation mandate of controlling operational costs - it empowers customers to serve themselves however and whenever suits them best. Whether it's troubleshooting their account, getting advice on which products to buy, or resetting their password, Watson Engagement Advisor is available 24x7 through any device to get to the heart of customers’ needs, faster."
Tags : 
ibm, ibm watson, watson engagement advisor, customer engagement, millennial, millennial generation, customer experience, business technology
    
IBM
Published By: Ping Identity     Published Date: Jan 29, 2013
Expecting your employees to remember strong passwords for every application they use is unrealistic. Learn how identity federation provides a secure, private mechanism for businesses to share user identities, eliminating the username/passwords issue
Tags : 
passwords, password protection, unrealistic passwords, complex passwords, eliminating password confusion, security, knowledge management, enterprise applications
    
Ping Identity
Published By: Ping Identity     Published Date: Jan 29, 2013
Now that employees are using more SaaS applications, its time for enterprises to adjust the way they manage employee identities. This white paper from Ping Identity addresses how IT can simplify identity management and maintain enterprise security.
Tags : 
it simplification, get rid of passwords, saas, applications, ping, it management, enterprise applications, data management
    
Ping Identity
Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM
Published By: Auth0     Published Date: May 12, 2016
An online game such as Marks and Spencer’s holiday Pass The Parcel campaign is in many ways, the worst case authentication scalability demand. The viral nature of the game generates massive numbers of registration and login events through both social providers and through username/password as eager players open presents and engage their friends to play. The game builds a huge audience of active players that remain active for the entire promotion while recruiting even more players, each of whom must register and then login to play, often multiple times per day.
Tags : 
auth0, authentication, scalability, marks and spencers, authentication demand, business technology
    
Auth0
Published By: Auth0     Published Date: May 12, 2016
Let’s be honest: If you’re just using one or two social providers for a simple web application, without needing a username/password database yourself, or any other more elaborate features, it is easy enough to DIY. By all means, leverage the basic authentication libraries you can find in any open source framework, and be done with it.
Tags : 
auth0, identity management, web application, framework, developer, business technology
    
Auth0
Published By: IBM     Published Date: Feb 26, 2016
"When it comes to customer service, millennials have little patience and incredibly high expectations. In the United States, this segment's buying power will surpass that of any other single generation in 2017. Are you ready to meet these demands? IBM Watson Engagement Advisor goes far beyond the conventional call center automation mandate of controlling operational costs - it empowers customers to serve themselves however and whenever suits them best. Whether it's troubleshooting their account, getting advice on which products to buy, or resetting their password, Watson Engagement Advisor is available 24x7 through any device to get to the heart of customers’ needs, faster. "
Tags : 
ibm, watson engagement advisor, analytics, customer service
    
IBM
Published By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : 
device management, security management, mobility, application security, management solutions, internet security, vulnerability management, mobile device management
    
Centrify
Published By: Juniper Networks     Published Date: Feb 18, 2015
Get expert advice on how to keep your private cloud secure with our Top 10 Considerations Slideshow. If you are looking to build a secure foundation for your private cloud infrastructure, this slideshow offers important considerations for securing your private cloud environment.
Tags : 
cloud, private cloud, security, password, virtualization, cloud computing, infrastructure, infrastructure management
    
Juniper Networks
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
    
Absolute Software
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
    
Bitium
Published By: Symantec     Published Date: Apr 02, 2015
The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?
Tags : 
heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
    
Symantec
Published By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the world’s largest business law firms.Michael and his team oversee the firm’s meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLA’s 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each person’s role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, “right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. It’s a win-win.”
Tags : 
sales
    
Seamless
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software
Published By: IBM     Published Date: Mar 04, 2009
The complexity and number of logons employees must manage on a daily basis are increasing sources of frustration and lost productivity. The time wasted entering, changing, writing down, forgetting and resetting passwords might be in small increments, but they are frequent and add up to a significant consumption of employee time. When employees are locked out because they’ve forgotten their passwords, they cannot perform their jobs.
Tags : 
"ibm, tivoli asset manager, password loss, employee time management, esso", human resource technology, workforce management software, employee performance management
    
IBM
Published By: IDFocus     Published Date: Aug 21, 2009
In the Identity Management space, there are 3 leading applications: Web access control, single sign-on, and password management. The document also describes two alternative approaches to combining these solutions.
Tags : 
password management, identity management, access management, iam, identity and access management, single sign on, single sign-on, access control
    
IDFocus
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search