CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

servers

Results 226 - 250 of 1087Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Cohesity     Published Date: Apr 24, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: May 04, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments. There has to be a simpler, more cost-effective way to keep your data safe. This is the problem that Cohesity is designed to solve, with an entirely new approach to data protection. Download this solution brief to learn more about Cohesity and its advantages!
Tags : 
    
Cohesity
Published By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM APAC     Published Date: May 14, 2019
If anything is certain about the future, it’s that there will be more complexity, more data to manage and greater pressure to deliver instantly. The hardware you buy should meet today’s expectations and prepare you for whatever comes next. Power Systems are built for the most demanding, data-intensive, computing on earth. Our cloudready servers help you unleash insight from your data pipeline — from managing mission-critical data, to managing your operational data stores and data lakes, to delivering the best server for cognitive computing. With industry leading reliability and security, our infrastructure is designed to crush the most data-intensive workloads imaginable, while keeping your business protected. - Simplified Multicloud - Built-in end-to-end security - Proven Reliability - Industry-leading value and performance
Tags : 
    
IBM APAC
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
When most people think of denial of service (DoS) attacks, they think of the large pipe-saturating distributed denial of service (DDoS) attacks aimed at the network layer. However, attacks on website or application availability are not just volumetric in nature. Many attacks are designed to cause resource exhaustion somewhere in the application stack, the application servers, middleware, or back-end database.
Tags : 
    
F5 Networks Inc
Published By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : 
web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
    
Sophos
Published By: Cloud Direct     Published Date: Jan 17, 2018
Clearly, data centre modernisation can achieve a wide variety of business benefits for an equally wide variety of organisations. Data centre modernisation programmes are also far reaching. They reach way beyond the desire to merely reduce costs. They add significant business value, and often become the essential cornerstone of digital transformation. When starting on your own path towards modernisation, it’s vital to recognise that your success depends on making use of advanced public cloud services that sit at the vanguard of enterprise technology’s capabilities. If they don’t, you risk not being able to gain access to a world of new possibilities.
Tags : 
applications, data, run time, middleware, operating system, virtualisation, servers, storage, networking
    
Cloud Direct
Published By: Cloud Direct     Published Date: Jan 17, 2018
Azure Site Recovery replicates your on-premises physical servers and virtual machines to Azure. If an outage occurs in your primary location, you failover to the DRaaS platform within minutes and your applications and workloads will be available. When normal operations resume, you can failback to your primary location. For added reassurance, Cloud Direct is a Microsoft Gold Partner. This means in addition to our own 24/7 support, we also benefit from direct access to Microsoft support for a range of hosting scenarios – including SQL Server, Exchange and SharePoint.
Tags : 
business, cloud solutions, data centre, smb, systems, technical
    
Cloud Direct
Published By: Pure Storage     Published Date: Mar 15, 2018
Organizations do everything they can to maintain business continuity, as this significantly impacts their competitiveness and profitability. The cost of downtime is enormous; depending on the industry, organizations lose hundreds of thousands to millions of dollars for every hour of downtime from lost productivity and revenue, missed opportunities, and loss of reputation and customers. When ESG surveyed organizations about their downtime tolerance for primary production servers or systems, 51% reported that they could tolerate high priority applications being down for less than an hour, and 29% could tolerate high priority applications having less than 15 minutes of downtime.1
Tags : 
    
Pure Storage
Published By: IBM     Published Date: Aug 08, 2016
Open Source application developer platforms aren't "free." Download the Total Economic Impact Of Migration From Open Source Application Servers to IBM WAS Liberty, a Forrester Consulting Total Economic Impact Study commissioned by IBM to learn how WAS Liberty can deliver 122% ROI, reduced infrastructure costs by $350K and improved developer productivity by 12% over open source alternatives.
Tags : 
ibm, middleware, application infrastructure, open source application servers, ibm was liberty, cloud, enterprise applications, cloud computing, business technology
    
IBM
Published By: IBM     Published Date: Nov 17, 2016
Open Source application developer platforms aren't "free." Download the Total Economic Impact Of Migration From Open Source Application Servers to IBM WAS Liberty, a Forrester Consulting Total Economic Impact Study commissioned by IBM to learn how WAS Liberty can deliver 122% ROI, reduced infrastructure costs by $350K and improved developer productivity by 12% over open source alternatives.
Tags : 
ibm, middleware, application infrastructure, open source application servers, ibm was liberty, cloud, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Nov 17, 2016
This IDC Business Value Executive Brief leverages IDC's research into the value of cloud-based application development and integration solutions, including solutions such as IBM WebSphere Application Server (WAS) on cloud.
Tags : 
ibm, middleware, cloud ibm, middleware, application infrastructure, open source application servers, enterprise applications, open source, business technology
    
IBM
Published By: Cisco     Published Date: Jun 25, 2015
This paper will help you get started with Software Defined Architecture in Several ways, depending on where you are in your journey.
Tags : 
sdn, cisco, cisco aci, software defined architecture, automation, networks, servers, security, network architecture, network management, security management, productivity, virtualization, infrastructure
    
Cisco
Published By: Avaya     Published Date: Jan 15, 2014
Avaya Aura Communication Manager is a vital component of an industry best-in-class redundant server solution that can support the available uptime today’s businesses demand. Do you demand more in your server solution?
Tags : 
avaya, communication manager, server solution, business demand, high availability, avaya aura, virtualized environments, high level performance, linux software, remote core servers, linux-based software, duplicate servers, survivable core, communication, it management, servers, data center
    
Avaya
Published By: CA WA 2     Published Date: Oct 01, 2008
Data Center Automation enables you to manage change processes, ensure configuration compliance and dynamically provision servers and applications based on business need. By controlling complexity and automating processes in the data center, your data center becomes more adaptive and agile. Effective Data Center Automation lets you leverage virtualization, manage capacity, and reduce costs and also helps reduce energy usage and waste.
Tags : 
it automation, ca wa 2, ca wa, data center automation, datacenter automation, configuration, server hardware, servers
    
CA WA 2
Published By: IBM     Published Date: Jul 13, 2012
The IBM Data Center Study found that only 21% of data centers are highly efficient. The study evaluated efficiency in servers, storage, networking, facility and data center operations to determine the best practices of the most efficient data centers.
Tags : 
ibm, smarter data, data center, best practices, technology, storage, servers, networking, network management, network performance, access control, business technology
    
IBM
Published By: Red Hat     Published Date: Oct 23, 2014
The business case for standardizing on Red Hat infrastructure solutions Read this IDC whitepaper to discover the quantifiable business benefits that standardizing on Red Hat® infrastructure has delivered organizations like yours. You'll learn how customers using Red Hat Enterprise Linux® and Red Hat's system management product, Red Hat Satellite: • Quickly recover up-front subscription costs. • Experience higher ratios of servers and users per administrator. • Significantly reduce annual downtime.
Tags : 
quantifiable benefits, infrastructure, management product, higher ratios, reduce annual downtime, networking, it management, enterprise applications
    
Red Hat
Published By: Red Hat     Published Date: Dec 15, 2015
If one technology has changed how companies have done business over the past decade, it’s server virtualization. Virtualization has allowed IT to “run faster and jump higher,” offering IT capabilities that are not available with physical servers. While server virtualization is continuing to advance, organizations are still not embracing virtualization whole-heartedly—perhaps not fully convinced that the benefits outweigh the challenges.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Dec 15, 2015
A truly hybrid IT infrastructure should support any and all workload types, letting applications run optimally on their own natural footprints or environments, whether bare-metal servers, scale-up virtualization, Infrastructure-as-a-Service (IaaS), or Platform-as-a-Service (PaaS), from either private or public clouds. It should not be a singular environment that (unsuccessfully) attempts to handle all types of workloads, nor should it consist of separate IT infrastructures that cannot communicate with each other. The Red Hat® portfolio provides the open hybrid IT fabric required to seamlessly enable both traditional (stateful) and new, agile, cloud-native (stateless) workloads.
Tags : 
    
Red Hat
Published By: HP     Published Date: Feb 02, 2015
In response to accelerating business demands and the need for internal IT to remain competitive with external sources (i.e., public clouds), business and IT managers alike realize they need to transform their IT environments. IDC is seeing enterprise IT move away from unmanageable virtualized systems, siloed servers, storage, information, and processes to embrace more integrated infrastructures that enable cloud-based technologies.
Tags : 
    
HP
Published By: HP     Published Date: Feb 02, 2015
The Colonial Companies is one of the largest mortgage loan servicers in the United States. Facing rapid expansion, the company needed to update an aging infrastructure that was not enterprise-ready. HP and partner OnX provided an HP Converged Infrastructure comprising HP networking solutions, servers, and storage. Benefits include rock-solid uptime, enterprise-class scalability, and simplification of IT processes and maintenance.
Tags : 
    
HP
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search