CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

personal data

Results 1 - 25 of 240Sort Results By: Published Date | Title | Company Name
Published By: Pure Storage     Published Date: Oct 09, 2018
Digital technology is so intrinsic to our personal lives that we barely think about the fitness trackers and smartphones that are as much a part of us as the clothing we wear. For organizations, the shift to digital is more disruptive and the stakes far higher. Digital transformation has been high on the executive agenda for a few years and, for many, harnessing data has become a significant force for value and revenue creation. Agility has emerged as an organizational superpower as businesses grapple with change and uncertainty in their own customer bases and in the global political and economic landscape. IT has been thrust into the spotlight as the unwitting hero of the story – tasked with delivering on the digital vision, implementing all manner of applications and building firm infrastructure foundations to support the latest digital initiatives. In an increasingly on-demand world, it is this final point that often gets overlooked in the rush for the next shiny new technologies. E
Tags : 
    
Pure Storage
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
Cylance
Published By: Mindfire     Published Date: May 07, 2010
In this report, results from well over 650 real-life cross-media marketing campaigns across 27 vertical markets are analyzed and compared to industry benchmarks for response rates of static direct mail campaigns, to provide a solid base of actual performance data and information.
Tags : 
mindfire, response rates, personalized cross-media, marketing campaign, personalization, personalized urls, purls, performance data, conversion, marketing roi, direct mail campaign, multi channel marketing, integrated marketing campaign, lead generation, campaign management, tracking and measurement, reports and analytics, marketing dashboard
    
Mindfire
Published By: SAP     Published Date: May 18, 2014
Big data and personal data are converging to shape the internet’s most surprising consumer products. they’ll predict your needs and store your memories—if you let them. Download this report to learn more.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications, data management
    
Commvault
Published By: SAS     Published Date: Jan 17, 2018
The Connected Customer is an individual who is intimately connected to the data, outcomes, decisions, and staff associated with any relationship to an organization. This intensely personal connection is not just a matter of the most recent transaction, but represents a combination of connected data, connected analytics, and collaborative decisions associated with improving the customer’s relationship with the organization over time. In this report, Blue Hill explores the key traits associated with supporting the Connected Customer through the Internet of Things, and provides guidance on why the Internet of Things will be essential across the general business landscape.
Tags : 
    
SAS
Published By: Oracle     Published Date: Feb 24, 2015
Data is the fuel of all marketing activities. Customers and prospective buyers are savvy, empowered, and carry high expectations for personalization across all interactions. Without the right data—at the right time—as well as the most effective strategies in place to manage our data sources, our communications and offers are dead on arrival. A one-size-fits-all approach to marketing is not a sound tactic—it’s a marketing fruitcake that no one wants to receive. It’s time to get down with data to delight your audience and provide them with the personal experiences they deserve. Read the marketing essentials guide now.
Tags : 
data center design and management, business technology, data center
    
Oracle
Published By: DataStax     Published Date: Mar 10, 2017
Today’s customers expect a seamless, intelligent and personalized experience that operates at the speed of the cloud and is continuously available regardless of location or platform. To deliver an optimal customer experience that will enable you to stay ahead of competitors you need a distributed, responsive and intelligent architecture which is only possible when the right database is in place. Read this eBook to learn how your database technology decisions can affect your ability to deliver either a transformational customer experience or a lackluster, dissatisfying encounter that benefits your competitors, not your bottom line.
Tags : 
    
DataStax
Published By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
    
DataStax
Published By: Adobe     Published Date: Aug 30, 2017
Marketing leaders will find a host of new vendors in this year's Magic Quadrant for multichannel campaign management. Vendors are focused on integrating machine learning, personalization and ad tech capabilities into big data foundations for deeper customer engagement.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 27, 2018
Vendors from advertising, marketing automation and analytics are racing to deliver personalized digital marketing at scale. Marketing leaders need a system that can integrate and coordinate data and activities across channels, devices and contexts, continuously and in real time.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
2017 Trends in Financial Services and Insurance: Customer is Priority The FSI sector is progressing with a digital, data-driven, marketing mentality, all centered around prioritizing customer experience and taking a more personal approach. The 2017 Digital Trends in Financial Services and Insurance compiles the information shared by over 800 FSI respondents to see what opportunities and obstacles are shaping the future of FSI. Read this report and find out: How data and personalization drive digital transformation How fintech is leading the FSI chase Tips to help future-proof your FSI business
Tags : 
    
Adobe
Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware, anti-virus, software, protection, solutions
    
Dell
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Infor     Published Date: Jan 03, 2011
For CDS Global, Infor CRM Epiphany Interactive Advisor is being used to create real-time customer profiles based on historical, personal, and contextual data. Using a combination of real-time analytics and business rules, the data is analyzed to identify the highest-impact offers in real time so that the CSR can make an attractive offer during the call.
Tags : 
infor, cds global, interaction advisor, real-time customer profile, analytics and business rules, crm solution, customer relationship management
    
Infor
Published By: Infor     Published Date: Jan 06, 2011
For CDS Global, Infor CRM Epiphany Interactive Advisor is being used to create real-time customer profiles based on historical, personal, and contextual data. Using a combination of real-time analytics and business rules, the data is analyzed to identify the highest-impact offers in real time so that the CSR can make an attractive offer during the call.
Tags : 
infor, cds global, interaction advisor, real-time customer profile, analytics and business rules, crm solution, customer relationship management
    
Infor
Published By: Adobe     Published Date: Nov 25, 2013
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.
Tags : 
it management environment, document integration, document security, mobile, mobile apps, personal devices, define data, mobile workforce, enterprise networks, sensitive documents, productivity ecosystem, lockdown, document solutions, cloud, cloud-based, hybrid it, enterprise mobility, networking, security, productivity
    
Adobe
Published By: Oracle     Published Date: Feb 28, 2018
Le divisioni IT hanno utilizzato IaaS per liberare il personale da compiti ripetitivi quali la manutenzione dell’hardware e l’aggiornamento del software. Ma non sempre sono stati sfruttati i possibili vantaggi correlati al processo di adozione. Quasi un quarto delle aziende (il 22%) sostiene che se dovesse ripetere l’implementazione di IaaS, utilizzerebbe strumenti per la migrazione automatica. Oracle Ravello, ad esempio, permette alle aziende di trasferire automaticamente i carichi di lavoro dai data center esistenti alle piattaforme cloud senza costose o rischiose modifiche.
Tags : 
sfruttare, vantaggio, competitivo, sviluppare, innovazione
    
Oracle
Published By: Oracle     Published Date: Mar 01, 2018
Le divisioni IT hanno utilizzato IaaS per liberare il personale da compiti ripetitivi quali la manutenzione dell’hardware e l’aggiornamento del software. Ma non sempre sono stati sfruttati i possibili vantaggi correlati al processo di adozione. Quasi un quarto delle aziende (il 22%) sostiene che se dovesse ripetere l’implementazione di IaaS, utilizzerebbe strumenti per la migrazione automatica. Oracle Ravello, ad esempio, permette alle aziende di trasferire automaticamente i carichi di lavoro dai data center esistenti alle piattaforme cloud senza costose o rischiose modifiche.
Tags : 
sfruttare, vantaggio, competitivo, sviluppare, innovazione
    
Oracle
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search