CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

practice management

Results 351 - 375 of 646Sort Results By: Published Date | Title | Company Name
Published By: AppDynamics     Published Date: Dec 10, 2014
Learn the 10 best practices to perfect your application performance management strategy and see how your organization can greatly improve the efficacy and reliability of your IT service delivery.
Tags : 
application performance, monitoring tools, strategic initiative, it organization, user experience
    
AppDynamics
Published By: Cornerstone OnDemand     Published Date: Feb 22, 2016
For many small to medium size companies, finding the time to proactively manage employee performance is difficult. The emphasis is more often on increasing revenues and achieving stability, especially in the early days. However, as businesses grow, the need for improving staff engagement, productivity and loyalty becomes increasingly important. It is at this critical stage that Performance Management can mean the difference between businesses that experience sustained growth and those whose momentum falters. Even when organisations are aware of the importance of Performance Management, the tendency is to carry it out in an ad hoc manner. Such methods work with a low headcount, but as this increases, more formal processes are needed. 6 Steps to Performance Management Best Practice offers a practical guide for small and medium enterprises (SMEs) that have identified Performance Management as part of their long term growth strategy. Drawing on industry research, client case studies and
Tags : 
management, productivity, performance, growth, employee, human resources
    
Cornerstone OnDemand
Published By: Mindtree     Published Date: Feb 10, 2016
Digital transformation requires a strong digital foundation for offering personalization. Consider how you want to engage and retain customers, generate more revenue or transform operations.
Tags : 
personalized marketing, personalization strategy, personalization trends, personalization solutions, personalization best practices, digital marketing strategy, digital marketing solutions, digital marketing trends, online/internet marketing strategy, online/internet marketing solutions, online/internet marketing trends, digital marketing news, online/internet marketing news, personalization news, customer experience strategy, customer experience management, customer experience solutions, buyer journey, search marketing, email marketing
    
Mindtree
Published By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector, it management, knowledge management, enterprise applications
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: May 26, 2016
Does your organization have sensitive data stored across the globe? Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
Tags : 
bitsight, data security, risk management, cybersecurity, vrm practices, risk management, security, enterprise applications, business technology
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: May 26, 2016
With this guide, you’ll never have to wonder about that again. You’ll learn: - How to nail down your presentation goals and style. - How to select metrics your board will care about. - Things to keep in mind before and after a board presentation.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications, business technology
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications
    
BitSight Technologies
Published By: Evident.io     Published Date: Nov 23, 2015
AWS is the most widely deployed public cloud infrastructure as a service (IaaS) solution in the world and is a leader in Gartner's Magic Quadrant for IaaS (see "Magic Quadrant for Cloud Infrastructure as a Service"). AWS offers a large number of built-in security capabilities (see Note 1), and questions on the proper practices for securing workloads in AWS are increasing.1 AWS is a not a "consumer grade" IaaS cloud. It is a market leader, with a portfolio of security capabilities and security ecosystem partners unmatched by other IaaS providers. However, simply moving existing workloads to AWS without rethinking security tools, processes and system management will result in workloads that are less secure than they were when located within enterprise data centers. Conversely, a properly managed and secured workload in AWS will be at least as — and, in most cases, more — secure than in an enterprise data center.
Tags : 
security, best practices, web services, amazon, workload, aws, data centers, enterprise, cloud, infrastructure, it management, enterprise applications
    
Evident.io
Published By: DocuSign     Published Date: Mar 23, 2016
Download this complimentary Ombud analyst report which examines best practices for leveraging DocuSign’s Digital Transaction Management solution for CIA compliance and the impact such technologies are already having on forward-thinking Fortune 500 companies.
Tags : 
    
DocuSign
Published By: CDW - APC     Published Date: Apr 07, 2016
Poor rack cable management has proven to many data center operators to be a source of downtime and frustration during moves, adds and changes. It can also lead to data transmission errors, safety hazards, poor cooling efficiency, and a negative overall look and feel of the data center. This paper discuses the benefits of effective rack cable management, provides guidance for cable management within IT racks including high density and networking IT racks, which will improve cable traceability and troubleshooting time while reducing the risk of human error.
Tags : 
data management, business practices, data center. data application, rack cable management, data center
    
CDW - APC
Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
The world is increasingly digital, with interactions and experiences delivered to a variety of users across a range of locations and devices. The modern workplace should follow users wherever they roam, deliver a superior experience, and drive productivity. Hewlett Packard Enterprise helps companies deliver rich digital and mobile experiences to users, including employees, customers, and guests, by extending their capabilities in app development, mobile connectivity, and collaboration.
Tags : 
productivity, best practices, business intelligence, business management, it management, enterprise applications, data management, business technology
    
CDW-HPE Servers
Published By: Lyft     Published Date: May 06, 2016
Business travelers in the U.S. will take close to 500 million trips in 2016. That means, every day, nearly 40,000 people are booking ground transportation¹. Meanwhile, a stream of devices and applications are emerging to help travelers get to their destinations in more efficient, safe, and affordable ways. This constantly-changing landscape can leave your team lost, fighting other business travelers for space and trying to keep up with the best apps. And lost is the last place your team should be, especially when they’re traveling for work.
Tags : 
best practices, business optimization, business management, mobile, transportation
    
Lyft
Published By: Cyphort     Published Date: Jun 28, 2016
Thanks to its convenience, online shopping has become a major trend over the last few years and lets face it, it’s here to stay. With the rise of online shopping, marketing experts capitalized on this new avenue to advertise their products. Now your friends nudge you on Facebook to buy a product they love and Google suggests a friendly place across the street where you can get your car fixed. It’s become hard to browse even a few pages without running into an ad and because of this increases, malware experts also saw a new avenue of attack - Malvertising.
Tags : 
downloads, best practices, network management, solutions, technology, advertising
    
Cyphort
Published By: Cyphort     Published Date: Jun 28, 2016
Computer viruses have plagued personal computers since the original Brain virus began infecting boot sectors in 1986. Originally, these early viruses were annoying, but fundamentally benign in nature. However, once the initial concept of malicious propagating code became established, the actors creating viruses became more sophisticated in their approach. Ultimately, the results of a successful infection were more significant and the impact on an enterprise more severe.
Tags : 
technology, security, best practices, solutions, network management
    
Cyphort
Published By: Cyphort     Published Date: Jun 28, 2016
We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks. We surveyed 597 IT and IT security practitioners in the U.S. who have responsibility for directing cybersecurity activities and/or investments within their organization. All respondents have a network-based malware detection tool or are familiar with this type of tool.
Tags : 
technology, security, best practices, solutions, network management, detection, protection, software compliance
    
Cyphort
Published By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: LogRhythm     Published Date: Dec 20, 2016
For security analysts, a flow of security alerts is an inevitable consequence of the digital age. Moreover, as alerts can signal business-impacting incidents, the enterprise’s security staff cannot be complacent. Staff must be relentless in gathering logs, setting alert parameters, assessing alert severity, and then prudently responding to incidents with countermeasures.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: LogRhythm     Published Date: Feb 07, 2017
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: 15five     Published Date: Jul 17, 2019
Learn best practices for choosing performance management software and advice for getting everyone at your company excited for this critical piece of HR Tech: • How to identify HR pain points • A list of sample questions for your Needs Assessment • Conducting your due diligence • A framework to analyze HR solution options • Six steps to gain executive buy-in
Tags : 
    
15five
Published By: 15five     Published Date: Jul 17, 2019
The best practices for managing employees evolves at a break-neck pace. In 2019, the key distinction for performance management strategies is to focus on the whole employee. This ranges from physical, emotional, and mental well-being to facilitating their personal and professional development. To help you gain a deeper understanding of new trends, we assembled this list of top trends to help you create or refine your employee performance management strategy this year, including: • Developing trust with your employees • The value of people analytics • Individualized support • Learning & development • Diversity & inclusion
Tags : 
    
15five
Published By: Qualys     Published Date: Nov 05, 2013
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented. This checklist of best practices will save you time and help you understand what to look for when selecting a VM, whether you have a dozen systems or a million.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security, internet security, intrusion detection, intrusion prevention, security management, vulnerability management
    
Qualys
Published By: VMware AirWatch     Published Date: May 18, 2016
A Google Trends search for “BYOD” reveals it is a fairly new term, appearing in news publications for the first time in late 2011. BYOD is one part of a much larger, deeper-rooted trend: The consumerization of IT, which can be traced back to the early 2000s. Around that time, most everyone had a personal computer, which enabled them to work from home after hours – and to realize the benefits of using the devices that they had carefully chosen and were comfortable using, rather than the corporate devices their IT departments had issued them. BYOD and the consumerization of IT continued to grow as devices became cheaper and more connected. Where IT leaders were once solely concerned with reining in all the unapproved devices accessing the corporate network, a recent Intel and readwrite report that shows 49 percent of U.S. IT managers “strongly agree that BYOD improves worker productivity.” The next era of BYOD has arrived, and IT departments are thinking about it as a strategic value-ad
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management, platforms, project management
    
VMware AirWatch
Published By: Kaseya     Published Date: Aug 27, 2010
Register and attend this webinar and also receive a complimentary copy of Kaseya's Industry Alert entitled, "Top Ten IT Systems Management Pain Points" compiled from our interactions with thousands of customers worldwide.
Tags : 
kaseya webinar, it systems management, it automation, best practices, enterprise management
    
Kaseya
Published By: AcquireWeb     Published Date: Jan 22, 2007
This article addresses one of the biggest challenges associated with e-mail marketing programs – establishing meaningful contact with customer targets in order to increase sales, while protecting and enhancing your brand. It illustrates that successful e-mail marketing designed to drive sales and build brands requires adopting a methodology that includes more precise prospect targeting, better permission-based models, a better overall consumer experience and better quality lists.
Tags : 
email marketing, best practices, permission marketing, brand management, direct marketing, newsletter design, acquireweb, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
    
AcquireWeb
Published By: IBM     Published Date: Jul 09, 2009
Value-driven product management is a repeatable process based on industry best practices that uses subjective and objective criteria to deliver successful products. This paper explains how assessment, alignment, achievability, accessibility, agility and accountability, the six key concepts of value-driven product management, can be applied to create a repeatable process for developing successful products.
Tags : 
ibm, telelogic, product success, value-driven, product management, assessment, alignment, achievability, accessibility, agility, accountability, enterprise applications
    
IBM
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search