CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

risk and compliance

Results 1 - 25 of 191Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Oct 30, 2019
Midmarket firms face many of the same data center security risks as their enterprise counterparts with far fewer resources at their disposal to mitigate them. Downtime, data theft, and regulatory non-compliance all pose existential threats to these organizations and as they drive for continuous innovation and advantage in an increasingly competitive landscape, they must ensure valuable data and IT assets are secure, protected, and available at all times. How can midmarket organizations succeed in the face of these challenging market dynamics? This Research Insights report shows that the success organizations have enjoyed varies greatly, and further that organizations enjoying the greatest success demonstrate a clear organizational commitment to prioritizing security and operate fundamentally more secure data center environments. Download this report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: SailPoint Technologies     Published Date: Oct 21, 2019
Azure Active Directory has become an attractive target for malicious activity. Find out how identity governance can dramatically reduce your risk and increase compliance
Tags : 
    
SailPoint Technologies
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
    
Oracle
Published By: Dell EMC Storage     Published Date: Mar 27, 2019
The automotive industry is in the midst of a highly competitive transitional period, with the ultimate goal of fully autonomous or “driverless” vehicles likely to be realized within a decade. The scale and intensity at which OEMs and Tier 1 suppliers must bring innovations to market – while containing costs, mitigating risks, managing product complexity and maintaining compliance – is challenging. The emergence of Advanced Driver Assistance Systems (ADAS), designed to enhance passenger, vehicle and road safety, introduces disruptive requirements for engineering IT infrastructure – particularly storage, where even entrylevel capacities are measured in petabytes. This paper will explore the infrastructure challenges facing OEMs and Tier 1 suppliers in developing and validating ADAS technologies, and propose a storage solution that is optimized for such workloads, delivering high performance, high concurrency and massive scalability.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC     Published Date: Mar 27, 2019
The automotive industry is in the midst of a highly competitive transitional period, with the ultimate goal of fully autonomous or “driverless” vehicles likely to be realized within a decade. The scale and intensity at which OEMs and Tier 1 suppliers must bring innovations to market – while containing costs, mitigating risks, managing product complexity and maintaining compliance – is challenging. The emergence of Advanced Driver Assistance Systems (ADAS), designed to enhance passenger, vehicle and road safety, introduces disruptive requirements for engineering IT infrastructure – particularly storage, where even entrylevel capacities are measured in petabytes. This paper will explore the infrastructure challenges facing OEMs and Tier 1 suppliers in developing and validating ADAS technologies, and propose a storage solution that is optimized for such workloads, delivering high performance, high concurrency and massive scalability.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 10, 2019
Security leaders have been in front of boards and executive committees long enough to know that security metrics that simply portray statistics from monitoring tools, or count the number of malware attacks, add relatively little value to strategy and budget decisions. Protecting sensitive customer and company data shouldn’t be just a compliance obligation, it should be a business imperative. This is exactly why the right technology partners will help push security, risk, and compliance objectives forward. In March 2019, Dell commissioned Forrester Consulting to evaluate the evolving security trends and technology needed to protect and enable employees. Our study found that empowering employees while adhering to security protocols improves employee productivity. Forrester conducted an online survey of 887 senior business and IT decision makers to explore this topic. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Dell     Published Date: Oct 24, 2014
The cloud, virtualization, and virtual desktop infrastructure (VDI) help make IT's life easier — and the whole organization more agile — but each of these features also presents serious security challenges. Although there is no one-size-fits-all solution to managing security in the enterprise 2.0 world, the enhanced security features and user-centric offerings in Microsoft Windows Server 2012 make security a much more comfortable proposition for IT. Read this technology brief to learn how Windows Server 2012 helps to mitigate risks and streamline compliance, as well.
Tags : 
virtualization, vdi, it compliance, it security
    
Dell
Published By: Collaborative Consulting     Published Date: Jan 15, 2014
When a pharmaceutical company discovered its risks under the new Patient Protection and Affordable Care Act, it turned to Collaborative to comb and consolidate its data. The result: compliance and insight into new business opportunities, too, through a company-wide business data warehouse and enhanced business intelligence.
Tags : 
collaborative consulting, data, data warehouse, complicane, risk management, business intelligence, consolidation, infrastructure
    
Collaborative Consulting
Published By: FICO     Published Date: Aug 27, 2012
This white paper provides a step-by-step guide to ensuring success with your business rules management project. You'll learn the components of a successful business rules management project.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
    
FICO
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Gain control of your organization’s records, proactively maintain regulatory compliance and, most importantly, protect your firm from legal risk and exposure by reading an important whitepaper on best practices for administering a successful program.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic records, electronic records management, document imaging, document imaging services
    
Canon Business Process Services
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure, infrastructure management
    
Blue Coat Systems
Published By: SAP     Published Date: Nov 12, 2015
The survey conducted by Loudhouse Research of 1,010 executives with responsibility for governance, risk and compliance (GRC) in their organizations found increasing risk and regulation complexity is now the biggest pressure on organizations’ GRC functions.
Tags : 
risk, risk management, governance risk and compliance, grc, regulation complexity, finance
    
SAP
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: NAVEX Global     Published Date: Aug 18, 2016
In 2015, NAVEX Global partnered with an independent research agency to survey ethics and compliance professionals with responsibility for administering training across their organizations. The goal was to determine their top priorities and challenges. The findings represent responses from 677 individuals responsible for ethics and compliance programs.
Tags : 
compliance programmes, compliance, ethics, compliance programme, risks, ethics and compliance programme, risk areas, security management
    
NAVEX Global
Published By: Equinix EMEA     Published Date: May 22, 2019
This playbook outlines how insurance companies can evolve their business architectures to meet user demand, reduce risk and comply with regulations. Insurers’ employees, partners and customers are increasingly interacting at the digital edge, where commerce, population centers and digital ecosystems intersect. A distributed interconnection platform at the digital edge allows insurance companies and ecosystem participants to accelerate their transformation and effectively compete with increasingly nimble challengers.
Tags : 
    
Equinix EMEA
Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data, it management, knowledge management
    
Aternity
Published By: SambaSaftey     Published Date: Mar 15, 2019
Collaboration among compliance safety, and risk DS Services, a distributor of leading beverage brands to residential and business customers, employs more than 3,500 drivers nationwide. Tracking its drivers – and ensuring they’re qualified to be behind the wheel – isn’t easy. “Reviewing motor vehicle records (MVRs) can take weeks, as every state reports violation information differently,” says Jason Gay, DOT compliance administrator for DS Services. “I was spending 12 to 15 hours a week on paperwork alone. It was time to simplify the process.” DS Services originally turned to SambaSafety to help reduce paperwork and increase efficiency; however, by incorporating continuous driver monitoring into its safety program, DS Services is able to impact its business in . other positive ways.
Tags : 
    
SambaSaftey
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm, cloud computing
    
Dyn
Published By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
    
CA Technologies
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search