CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

risk management

Results 301 - 325 of 682Sort Results By: Published Date | Title | Company Name
Published By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
courion, access risk management, cloud based environment, mobile, data loss prevention, security, data management, data center
    
Courion
Published By: Safenet     Published Date: Oct 11, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management, ethernet networking, wide area networks, encryption, network security appliance
    
Safenet
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security and risk management leaders should know that while IDPSs are being absorbed by firewall placements at the perimeter, they give the best protection. They're also responding to pressure from uptake of other threat defense solutions, and providing credible internal and cloud placement options.
Tags : 
magic quadrant, intrusion, detection, prevention, systems, cloud, internal
    
McAfee EMEA
Published By: MuleSoft     Published Date: Jun 27, 2019
MuleSoft’s Government Cloud is an industry-leading FedRAMP-compliant cloud environment for building and deploying APIs and integrations with Anypoint Platform. MuleSoft’s US Federal Risk and Authorization Management Program (FedRAMP) compliant-solution enables government agencies to build and secure connections between their applications and citizen data. Download this whitepaper to learn: How MuleSoft’s Government Cloud enables agencies to increase project delivery speed by 3x. Why FedRAMP compliance reduces on-premises infrastructure costs. How government agencies can develop, deploy, manage, and monitor integrations and APIs in the cloud to rapidly expand cloud services.
Tags : 
    
MuleSoft
Published By: Oce Business Services     Published Date: Mar 24, 2008
IDC has found a direct correlation between effective document management and improved business performance. Yet recent research reveals that half of organizations rate their document process management processes as ineffective. This best-practices paper gives you insight into how you can reduce costs, increase productivity, mitigate risk and enhance business performance through the strategic outsourcing of document lifecycle management.
Tags : 
document management outsourcing, document process management, document lifecycle management, outsourcing document management, document management best practices, document process, document, oce, océ, océ, knowledge management, sarbanes oxley compliance
    
Oce Business Services
Published By: Oce Business Services     Published Date: Mar 24, 2008
Effective records management has never been more crucial to meeting corporate governance, risk management and operational mandates. Yet half of enterprises lack a fully implemented records management program. Download this white paper to learn how strategic outsourcing can help you mitigate risks, apply best practices, meet compliance mandates and improve overall records management ROI.
Tags : 
oce, records management, knowledge management, compliance
    
Oce Business Services
Published By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Symantec.cloud     Published Date: Feb 12, 2010
Understand the legal issues if you do not conduct a risk assessment before creating your AUP.
Tags : 
messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment, information security, business continuity management, compliance, business continuity, policy based management, security policies
    
Symantec.cloud
Published By: Okta     Published Date: Feb 24, 2015
This report outlines the future look of Forrester’s solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2015 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.
Tags : 
identity and access management, security and risk, extended enterprise, it trends, business agility, identity management
    
Okta
Published By: Western Union Business Solutions     Published Date: Jan 01, 2001
Learn currency risk management strategies that can help your business survive and thrive in China and other international markets. This 45 minute Webinar is a must-see if you are business leader whose organization is impacted by China's economy.
Tags : 
foreign exchange, risk management, china, international markets, chinese economy, international, global, business, economies, western union, personal finance, investing, small business, finance
    
Western Union Business Solutions
Published By: Kaseya     Published Date: Mar 12, 2015
Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.
Tags : 
automated management systems, software management, it automation, financial institutions, regulatory compliance, security management, software patches, audit violations, network performance management, compliance, infrastructure
    
Kaseya
Published By: RSA     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
data loss, prevention, risk management, dlp, governance, framework, security, data management
    
RSA
Published By: Wyng     Published Date: Jan 13, 2016
The explosion of User Generated Content, or UGC, has drastically shifted the way people interact with brands. And as brands turn to UGC in place of their brand produced content, there are new risks that come with the rewards. To help mitigate these potential legal issues, we have developed a guide with everything you need to know about rights management.
Tags : 
search marketing, email marketing, website development, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, e-commerce, traditional marketing, sales
    
Wyng
Published By: Rsam     Published Date: Apr 28, 2016
Healthcare enterprises are under more scrutiny than ever to demonstrate compliance. With more than 5,000 suppliers, this FORTUNE 50 company needed to automate and streamline their vendor risk management program. Learn why they selected Rsam and the results of their successful implementation.
Tags : 
rsam, fortune 500, vendor risk management, healthcare enterprise, compliance, data management
    
Rsam
Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
rsam, vendor risk management, enterprise, risk assessment, security
    
Rsam
Published By: Rsam     Published Date: Apr 28, 2016
Join Rsam and Tom Garrubba, the Senior Director of Shared Assessments, as they discuss how to develop a game plan for vendor risk that aligns with OCC 2013-29.
Tags : 
rsam, occ, vendor risk, risk management, networking
    
Rsam
Published By: Delta Risk     Published Date: Jun 07, 2016
Recent high profile, high impact cyber breaches at some of the largest financial institutions in the United States have highlighted the fact that boards of directors need to take an active role in the management of cyber risk. This Viewpoint offers the Delta Risk perspective on how boards should engage in the management of cyber security risks, stressing four priority activities.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: KPMG     Published Date: Nov 07, 2016
Seemingly unrelated events can conspire to harm your business when you rely on far-flung networks of suppliers, vendors, and service providers. Read “The Butterfly Effect” to learn how global organizations can address the threat of third party disruption in today’s economy.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends, enterprise applications
    
KPMG
Published By: KPMG     Published Date: Nov 07, 2016
Can a better demand-driven supply chain positively impact the bottom line? The future belongs to the new customer. Customer experience is becoming undeniably more important, yet many companies lack responsive and agile supply chains that can continually adjust to fluctuating customer requirements. Read more.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends
    
KPMG
Published By: KPMG     Published Date: Nov 07, 2016
Manufacturers are gunning for growth and plan to put significant investment into R&D and new markets in order to achieve their ambitions. But without overall market growth, competition will be fierce. Read more.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends
    
KPMG
Published By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Interactive Intelligence     Published Date: Jan 10, 2011
Contact centers face a tall order: Deliver stellar service and real-time response to customers, and still get more out of the workforce without risking burnout and turnover. Lori Bocklund is president of Strategic Contact, and Rachel Wentink is the senior director of Product Management for Interactive Intelligence, and when they discuss how to optimize agent performance and offer outstanding service, it's worth reading.
Tags : 
interactive intelligence, strategic contact, quality monitoring, wfm, workforce maangement, workforce management software
    
Interactive Intelligence
Published By: Trend Micro SPN     Published Date: Jun 15, 2009
Power to the people? Managing technology democracy in the Workplace. A Trend Micro sponsored report by the Economist Intelligence Unit.
Tags : 
trend, trend micro, economist intelligence unit, security, risks, technology democracy, cio, cto, team, human resources management, eiu, technology director, risks, security management, employee performance, productivity, employee performance management
    
Trend Micro SPN
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search