CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

proactive

Results 176 - 200 of 434Sort Results By: Published Date | Title | Company Name
Published By: ttec     Published Date: Oct 16, 2019
Omnichannel, in its most complete definition, means taking into account individual customer needs and perspectives to create seamless customer experience within and across multiple channels. The customer is in control, which creates amazing customer experiences and reduces friction for users and the business. With a true omnichannel experience, each conversation is a continuation from the last and customers don’t have to reiterate their problems multiple times to multiple people. It provides better insights into a customer’s next action, and it enables more personalized product recommendations and proactive outreach. Through technology and analytics, brands can improve their operational efficiency, optimize their channel mix, and take advantage of lower-cost channels, all while enabling a better experience for their customers.
Tags : 
    
ttec
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Unified Infrastructure Management (CA UIM) is the only solution that provides unified analytics to proactively resolve issues. The solution’s single platform architecture delivers comprehensive infrastructure coverage so you can optimally manage hybrid IT environments and meet the needs of agile IT operations.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Unified Infrastructure Management (CA UIM) est la seule solution du marché capable de fournir des fonctions analytiques unifiées pour une résolution proactive des problèmes. Son architecture sous forme de plate-forme unique offre une couverture complète des infrastructures, afin que vous puissiez gérer de façon optimale les environnements IT hybrides et répondre aux besoins des équipes IT agiles.
Tags : 
    
CA Technologies EMEA
Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent
    
ESET
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
By thinking proactively about DDoS defense, organizations can build a comprehensive strategy to mitigate attacks. Choosing from on-premises security devices, cloud-scrubbing services, and a hybrid approach to DDoS protection allows organizations to customize their security strategy to their application architecture and business needs.
Tags : 
ddos, ddos defense, security
    
F5 Networks Inc
Published By: Dell Software     Published Date: Feb 19, 2014
In "Proactive Performance Management for Enterprise Databases," read about the inherent challenges of proactive database management, and what to look for when choosing the right management tool for your company. Get this white paper today.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices
    
Dell Software
Published By: HP     Published Date: Jul 29, 2008
This case study highlights how a leading transportation firm uses executive financial incentives to insure the highest system uptime for its customers. With the need to keep thousands of vehicles and employees on the move and process millions of daily transactions, keeping mission critical systems running is essential for financial performance.
Tags : 
mission critical, high availability, transportation, service management, itil
    
HP
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : 
trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance
    
TriGeo Network Security
Published By: Aternity     Published Date: Aug 26, 2011
This whitepaper provides insight, best practices, and recommendations for monitoring the end user experience within Virtual Desktop Infrastructures (VDI).
Tags : 
aternity, vdi, real end user experience, fpi, frontline performance intelligence, virtual desktop infrastructure, application performance, user productivity
    
Aternity
Published By: Aternity     Published Date: Sep 29, 2011
Published by Aternity, the paper includes 8 real-world cases detailing how Aternity empowers SAP customers with a user-centric approach to proactive IT management.
Tags : 
aternity, sap, application performance, it management, training, real-time, desktop management
    
Aternity
Published By: Aternity     Published Date: Apr 10, 2012
View these new on-demand videos and quickly see how a user-centric approach to proactive IT management can optimize performance, eliminate business disruptions, and increase user productivity.
Tags : 
aternity, technology, performance management, technology platform, it management, performance optimization, business technology
    
Aternity
Published By: Aternity     Published Date: Jul 20, 2012
Forrester Research projects that by 2016, 350 million employees will have smartphones, prompting businesses to drastically increase spending on mobile projects to meet the flexibility demands of increasingly tech-savvy employees. This exclusive resource describes how businesses can support mobile technologies from virtual desktops to application development with comprehensive end-user experience (EUE) management tools. Find out how this platform proactively detects performance and availability issues to help IT professionals troubleshoot and improve application performance for end-users.
Tags : 
technology, mobile, management tools, end-user experience, eue, application performance, smartphones, business technology
    
Aternity
Published By: M86 Security     Published Date: Feb 08, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm
    
M86 Security
Published By: CollabNet     Published Date: Mar 31, 2012
By gaining timely visibility into build and test results, development teams can be more proactive in dealing with defects, and project teams gain vital information into each build, including which requirements have been addressed.
Tags : 
continuous integration, agile, alm, development teams, software delivery, build and test, software development
    
CollabNet
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm
    
M86 Security
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security
Published By: SpectorSoft     Published Date: Dec 12, 2013
Detect Critical Network Events with Proactive Server Monitoring
Tags : 
spectorsoft, free trial, event logs, critical network events
    
SpectorSoft
Published By: LogMeIn     Published Date: Jan 15, 2014
Today’s consumer is almost ambivalent when it comes to customer service channels; this generation of shoppers simply wants service their way. Take a look at the 2013 survey of internet shoppers.
Tags : 
logmein, live chat, e-tailing, multichannel communications, live chat best practices, channel usage, channel satisfaction, chat frequency
    
LogMeIn
Published By: Heroix     Published Date: Jan 23, 2013
Enterprises that adopt a proactive approach to IT resource capacity planning, using the most advanced methods and tools available, are ensuring that their IT environments are right-sized to enable corporate growth and improve company performance.
Tags : 
virtualization, cloud computing, network, capacity planning, resource planning, bandwidth management, distributed computing, infrastructure
    
Heroix
Published By: CDW     Published Date: Jul 11, 2013
In government, Big Data presents both a challenge and an opportunity that will grow over time.
Tags : 
cdw, big data, electronic records, cloud, cloud services, social networks, smart sensors, business intelligence
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, anti spam, anti spyware, anti virus
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Flexible, top-rated security and high performance for proactive protection across physical and virtual infrastructure.
Tags : 
hybrid data center, data center, data center security, virtualization, virtual data center, virtual machines, cloud computing, virtualized security
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, security
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search