CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

password

Results 51 - 75 of 216Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
More and more people are using their personal devices to work from home, but are they secure enough? With the proper preparation, your laptop or smartphone can actually help improve security. Read our white paper for 5 easy tips to work securely on your personal device: Where to store your files to avoid data theft or loss Why those pesky update notifications are too important to ignore How often you should change your passwords, really
Tags : 
data security, personal device, security tips, passwords
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
streamline sharing, data security, customer service, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : 
data security, passwords, password protection, data vulnerability
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password-protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data security, data encryption, file sharing, mobility, customer service
    
Citrix ShareFile
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : 
mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information, steal information, secure data, secure passwords, security breaches, broken privacy, reputational damage, cyber-security, business closures, business security, insider rights, threat environment, security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: Entrust Datacard     Published Date: Jun 09, 2017
Security professionals attribute more than 63% of confirmed breaches to weak, default or stolen passwords. Analysts say more than 80% of all confirmed breaches involve privileged credentials. And the average cost of a data breach totals more than $3.8M. Almost every story reporting statistics like these concludes with “the password is dead.” The world clearly must move on from passwords in the battle to protect data – or at least attempt to phase them out.
Tags : 
    
Entrust Datacard
Published By: SailPoint     Published Date: Feb 08, 2011
This guide is designed to help ensure a successful identity governance strategy can move your organization toward sustainable compliance, reduced risk, improved service levels and lower operational costs.
Tags : 
sailpoint, identity governance, compliance, risk management, access management, password management, reporting and analytics, identity management
    
SailPoint
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification, cloud security, cloud based security saas security, strong authentication, fingerprint, full disk encryption, single sign-on, cloud management
    
DigitalPersona UK
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure — especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
    
MobileIron
Published By: SecureAuth     Published Date: Sep 07, 2017
How SecureAuth is eliminating passwords while improving security and user experience
Tags : 
    
SecureAuth
Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin
Published By: SpyCloud     Published Date: Mar 30, 2018
Because of widespread password reuse, Account Takeover (ATO) attacks have become an extremely lucrative business for cybercriminals. Organized crime rings are performing ATO attacks at a massive scale by leveraging botnet-infected armies to attempt credential-stuffing attacks against various web and mobile applications. Cyber criminals exploit compromised accounts for financial gain by pilfering financial or personally identifiable information (PII) directly or by selling access to these accounts on underground markets. Download our report to understand: The Underground economy driving these attacks The tools criminals are using to automate ATO Remediation Strategies to prevent ATO in your organization
Tags : 
    
SpyCloud
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: Centrify     Published Date: May 26, 2016
Many organizations are turning to multi-factor authentication (MFA) or two-factor authentication (2FA) to reduce the risk of stolen passwords. This paper examines best practices for deploying MFA
Tags : 
authentication, multi-factor authentication, threat protection, cyber attacks, hacker detection, identity management, security management
    
Centrify
Published By: ESET     Published Date: Sep 07, 2011
Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.
Tags : 
eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus, wireless, access control, anti virus, authentication, encryption, internet security, password management, security management, security policies
    
ESET
Published By: Verizon     Published Date: Nov 14, 2013
Learn the seven most common flaws with password use by individuals and companies and how Multifactor Authentication will make your systems more secure while cutting costs and avoiding inconveniences.
Tags : 
verizon, infrastructure security, multifactor authentication, it management
    
Verizon
Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on, access control, application security, authentication, identity management, intrusion prevention
    
Imprivata
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search