CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

roxy

Results 1 - 25 of 32Sort Results By: Published Date | Title | Company Name
Published By: Menlo Security     Published Date: Nov 12, 2019
"Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach. Identified by Gartner as ""one of the single most significant ways to reduce web-based attacks,"" remote browser isolation has become an important line item in IT budgets around the world. But not all Isolation is created equal. With so many offerings how do you weed through the noise? Learn: - Why remote browser isolation technology adoption is on the rise - Key use cases for Isolation that should be evaluated - 3 critical requirements when selecting a practical browser isolation solution"
Tags : 
    
Menlo Security
Published By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : 
bitgravity, video delivery, legacy cdns, network architecture, internet video, file management, total cost ownership, proxy cache, bandwidth management, infrastructure, traffic management
    
BitGravity
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
Cloud computing is rapidly entering an entirely new phase – one destined to prove far more transformative and disruptive than the initial phase of cloud deployment. Cloud is driving a comprehensive transformation of digital assets in organizations of all stripes as IT decision-makers begin to view the emerging cloud construct as a proxy for the transformation of IT itself.
Tags : 
    
Hewlett Packard Enterprise
Published By: Symantec     Published Date: Jul 09, 2017
This paper provides a brief recap of the functionality provided by web proxies, why proxy architecture is still a vital building block for a comprehensive web defense, and how web proxies can work with other solutions such as next-gen firewall (NGFW) to deepen the organization’s defenses against advanced web-based threats.
Tags : 
cybercrime, swg, secure web gateway, firewall, security., threat and vulnerability management
    
Symantec
Published By: Bazaarvoice     Published Date: Oct 15, 2012
By 2017, Millennials - currently in their mid-teens to mid-30s - will have more spending power than any generation. And they're the proxy for all consumers, so capturing them helps you capture everyone else, too.
Tags : 
bazaar voice, social media, marketing, mobile marketing, internet marketing, consumer input, consumer behavior
    
Bazaarvoice
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We liked that Umbrella’s intelligent proxy would give us granular protection without the performance impact of a traditional web proxy.” - Torben Olsen, Corporate Information Security Manager, Lundbeck
Tags : 
    
Cisco Umbrella EMEA
Published By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft, governance, grid computing, infrastructure
    
ZScaler
Published By: ZScaler     Published Date: Nov 21, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft
    
ZScaler
Published By: Two Sigma     Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for analyzing multi-asset portfolios and derived from returns of broad, liquid asset class proxy indexes. This lens is intended to be: • Holistic, by capturing the large majority of cross-sectional and time-series risk for typical institutional portfolios; • Parsimonious, by using as few factors as possible; • Orthogonal, with each risk factor capturing a statistically uncorrelated risk across assets; • Actionable, such that desired changes to factor exposure can be readily translated into asset allocation changes. Finally, we discuss methods for constructing and assessing the Two Sigma Factor Lens that can be extended to produce additional risk factors for new sub-assetclasses or cross-sectional risks that may not currently be captured by the lens.1 This factor lens, and our ongoing work to expand it, form the foundations of the VennTM platform.
Tags : 
    
Two Sigma
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a technology company with globally dispersed locations addressed concerns about Web security. These included an increasing number of mobile workers, numerous malware infections on its network, and the legal and financial risks of employees accessing inappropriate material on the Internet.
Tags : 
cascade, microtech, security, maleware protection, web proxy, reduced, workload, benefits, business technology
    
Webroot UK
Published By: F5 Networks Inc     Published Date: Aug 15, 2013
Between the proliferation of mobile devices and the ever increasing amount of content on the web, DNS usage has seen a huge increase in recent years. Meanwhile, DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. For organizations confronting these growth and security challenges, F5’s new full proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing.
Tags : 
domain name system, dns, infrastructure, global, local, cloud load balancing, dns systems, dns infrastructure, mobile devices, security, cloud load balancing, dns solutions, data center, network architecture, network management, network security, servers, traffic management
    
F5 Networks Inc
Published By: Avi Networks     Published Date: May 23, 2019
With growing adoption of container ecosystems, Kubernetes and OpenShift are becoming easy and popular choices for enterprises today. This webinar will look at the bigger picture by exploring all the components necessary to deploy a production-ready container-based application. Register to watch this webinar to: Review how containers and microservices have changed traditional application delivery Take a deeper look into application service deployment considerations in Kubernetes Understand the 'North-South' and 'East-West' nature of microservices Learn how the Avi fits into this ecosystem - working either alongside or replacing Kube-proxy To register to watch this webinar, simply fill out the form on this page.
Tags : 
    
Avi Networks
Published By: Riverbed     Published Date: Feb 26, 2015
While powerful and beneficial, the Citrix XenApp environment can present new challenges to IT departments when troubleshooting application performance issues. Citrix acts as a proxy for backend applications, making it difficult to get end-toend visibility of transactions and to identify and troubleshoot end-user experience problems
Tags : 
troubleshooting, application performance issues, application management, enterprise application, application virtualization technology, application security
    
Riverbed
Published By: Trilibis Mobile     Published Date: Aug 14, 2012
Smartphones and tablets are overtaking web traffic. Read about "mobile first" strategy and learn best practices for overcoming the challenges of developing mobile websites and hybrid apps in a rapidly evolving market.
Tags : 
mobile web, mobile strategy, trilibis, hybrid apps, mobile first, smartpath, html5, mobile design, mobile development, mobile websites, msite, adaptive design, responsive design, proxy site, tablets, best practices, javascript, mobile apps, native apps, web app
    
Trilibis Mobile
Published By: Trilibis Mobile     Published Date: Oct 02, 2012
Univision achieves cross-platform content parity and a stellar mobile user experience by utilizing over 100 integration points to deliver its content across 90+ unique mobile sites, making it the most comprehensive Hispanic mobile portal.
Tags : 
mobile web, mobile strategy, tribilis, tribilis mobile, hybrid apps, mobile first, smartpath, html5, mobile design, mobile development, mobile websites, msite, adaptive design, responsive design, proxy site, tablets, best practices, javascript, mobile apps, apps
    
Trilibis Mobile
Published By: Cisco     Published Date: Jan 12, 2016
Network readiness is an important factor in any new IT project at companies both large and small. New applications seem to require more bandwidth than the applications that they replace. These applications can also bring in new users, sometimes by the thousands. In some cases, the network services and/or capacity are not ready for these changes, and the IT rollout suffers. This guide covers the following topics: bandwidth, wireless, firewalls, content filtering, proxy servers, and others.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education, networking, security, it management, wireless
    
Cisco
Published By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : 
ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp, tablets, it systems, endpoint device growth, symnatec, integration, cisos, wireless, data management, business technology, data center
    
CDW Symantec
Published By: SmoothWall     Published Date: Jun 03, 2009
Proxy abuse is an increasingly pervasive problem in schools. It only takes one anonymous proxy to put a gaping hole in your network security. Using a web filtering solution that doesn't block proxies is the equivalent of putting a big bolt on your front door but leaving the back door wide open.
Tags : 
smoothwall, web filtering, anonymous proxies, anonymizers, proxy abuse, ssl proxies, web content filtering, school web filtering, access control, anti spam, anti spyware, anti virus, application security, encryption, firewalls, phishing, ssl
    
SmoothWall
Published By: Vision Critical     Published Date: Jun 23, 2009
Roxy, global designer, producer and distributor of clothing and accessories, needed a way to connect with teenage girls on an ongoing basis to help produce, design and advertise their clothes.  Roxy decided to find style mavens – girls who are the trend setters among their peers – and instead of doing ad-hoc focus groups of 20-30, they created an online community of over 900 girls.
Tags : 
roxy, online community, customer voice, customer data, crm, cost savings, vision critical, marketing research, market research, feedback, trial, customer, brand tracking, longitudinal studies, testimonials, advertising, communication, testing, community, style squad
    
Vision Critical
Published By: BitGravity     Published Date: Apr 22, 2008
This white paper outlines the limitations of proxy cache networks, presents the attributes and benefits of an ideal solution, and suggests that BitGravity has designed a content delivery system that addresses the needs in marketplace at an affordable price.
Tags : 
cdn, cdns, content delivery, content delivery network, content delivery networks, akamai, limelight, panther express, on demand video, vod, video on demand, stream, streaming, video streaming, video hosting, brightcove, bright cove, live broadcasting, move networks, streaming media
    
BitGravity
Published By: ThreatMetrix     Published Date: Jan 21, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably—while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers, verification technology
    
ThreatMetrix
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers, verification technology, security, anti spam, anti spyware, anti virus, firewalls, hacker detection, identity management, intrusion detection, intrusion prevention, security management
    
ThreatMetrix.
Published By: McAfee     Published Date: Nov 12, 2014
This white paper guides you through the pros and cons of direct vs. transparent proxies and makes recommendations that will help you secure your company and your users more effectively.
Tags : 
secure web gateway, direct or transparent proxy, security, it management
    
McAfee
Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Previous   1 2    Next    
Search