CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

rpos

Results 201 - 225 of 433Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Tags : 
trend micro, enterprise security, forrester, roi, total economic impactt, web security, vendor management savings, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, internet content security, smart protection network
    
Trend Micro Inc.
Published By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : 
mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app, app security, secure network
    
CDW
Published By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : 
mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor, mcafee risk & compliance, security, it management, data management, business technology, data center
    
McAfee
Published By: Teradata     Published Date: Apr 30, 2014
In the past decade, banks have applied a vast array of strategies to attract new customers—free checking, high interest savings, low interest mortgage, cash deposits, and product give-a-ways. Many offers were bundles with credit, either in the form of a new credit line or in the form of low interest on transferred credit balances. The purpose is to attract new customers who bring new account balances. Although successful in attracting new customers, those customers usually brought small balances. It didn’t matter if each account’s balance was small. The sum of these small account balances would be a very large amount. This new amount could be leveraged into loans and hence profits. – Download our whitepaper today!
Tags : 
teradata, marketing, data driven marketing, connecting to customers, higher revenue, customer experience
    
Teradata
Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Viavi Solutions
Published By: Aruba Networks     Published Date: Jul 03, 2013
The purpose of this paper is to provide a level of guidance towards the migration to 802.11ac.
Tags : 
802.11ac, mobile technology, migration, 5ghz
    
Aruba Networks
Published By: Nimble Storage     Published Date: Oct 28, 2013
Improvements in scalability, availability, performance, and functionality of midrange storage systems have blurred the boundaries between network-attached, midrange, and high-end storage systems. This Magic Quadrant will help IT leaders understand storage vendors' strategies and market strengths.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint, storage
    
Nimble Storage
Published By: VMware, Inc     Published Date: Dec 05, 2013
Executive Summary: In November 2012, Vmware Commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Vmware vCenter Site Recovery Manager (SRM). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the VMware vCenter Site Recovery Manger on their organizations. Please download the white paper to learn more.
Tags : 
vmware, roi, return on investment enterprises, vmware vcenter site recovery manager, forrester consulting. srm, networking, it management, knowledge management, enterprise applications, storage, data management, disaster recovery, business technology, data center, data loss prevention
    
VMware, Inc
Published By: Compass Datacenters     Published Date: Jul 07, 2015
The purpose of this white paper is to describe the provider thinking and product elements that must be addressed to change the data center selection process from one that is tactical to one that is strategic in nature.
Tags : 
data center, it decision making, data center operators, it management, data loss prevention
    
Compass Datacenters
Published By: Cisco     Published Date: May 15, 2015
The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco, infrastructure, migration, network management, network performance
    
Cisco
Published By: CenturyLink     Published Date: Jan 02, 2015
This report summarizes testing of CenturyLink Cloud Hyperscale compute instances in April 2014. Compute instances from Amazon Elastic Compute Cloud (EC2), Rackspace Cloud, as well as non-Hyperscale CenturyLink Cloud instances were included in testing for comparison purposes. CenturyLink engaged CloudHarmony to conduct this testing and provide independent performance analysis and comparisons of these services. This report summarizes the results of this testing.
Tags : 
centurylink, hyperscale testing, cloud, amazon elastic compute cloud, rackspace cloud, cloudharmony, it management, data center
    
CenturyLink
Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility, business technology
    
LogRhythm
Published By: iShares by BlackRock     Published Date: Jun 15, 2018
While the accumulated knowledge of a portfolio manager should not be undervalued, a move toward more systematic instrument selection could ultimately enhance fund returns. This material is provided for educational purposes only and is not intended to constitute investment advice or an investment recommendation within the meaning of federal, state, or local law. Investing involves risk, including possible loss of principal. This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. Prepared by BlackRock Investments, LLC, member FINRA. BlackRock, Inc. is not affiliated with The Economist. 530180
Tags : 
business technology, finance
    
iShares by BlackRock
Published By: EMC     Published Date: Sep 11, 2014
This paper focuses on Data Domain Boost and the many benefits it provides compared to doing traditional backups. Its purpose is to explain the technical and business reasons why DD Boost will change the way you do backups.
Tags : 
data domain boost, ddb, backups, data protection, data backup, benefits of ddb, emc
    
EMC
Published By: EMC     Published Date: Sep 11, 2014
This paper focuses on Data Domain technology leadership and differentiation and why it matters to you. The purpose of this paper is to explore the technical and financial reasons why Data Domain systems are ideal for backup and archiving in your environment.
Tags : 
data domain technology, benefits of data domain, backup and archiving emc
    
EMC
Published By: RES Software     Published Date: Apr 08, 2013
RES Software, éditeur leader de solutions de poste de travail dynamique, annonce le déploiement de sa solution de gestion des environnements de travail au sein de la compagnie aérienne Europe Airpost. Europe Airpost, est l’une des principals compagnie aérienne française. Elle est membre du groupe international de services aériens ASL Aviation.
Tags : 
    
RES Software
Published By: E-SignLive by Silanis     Published Date: Oct 23, 2013
In this case study from Ombud Open Research, you will learn how US Bank is using electronic signature technology to streamline account openings and SMB loans. With e-signatures deployed across more than 3,000 branches, US Bank is leveraging both the Silanis on-premise e-signature solution and the Silanis cloud e-signature service for different processes. As a result, they have achieved operational efficiencies, improved customer experience and increased top-line revenue. The bank is currently e-signing 460,000 documents each week – a number that will continue to grow as US Bank’s initial implementation of electronic signatures is currently being re-purposed across the entire organization.
Tags : 
banking, account openings, financial services, finance
    
E-SignLive by Silanis
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Machine learning offers the depth, creative problem-solving capabilities, and automation to help security organizations gain significant ground against attackers. It’s a powerful tool for processing massive amounts of data for the purpose of malware classification and analysis, especially for unknown threats. Through supervised learning, human researchers can continually develop new training models that expand the understanding and competency of machine learning systems.
Tags : 
analytics, security, problem solving, creative, data, researching, malware
    
McAfee EMEA
Published By: HP     Published Date: Aug 03, 2009
The usual cure for exploding file volumes is to add more general purpose file servers. That strategy eventually leads to server sprawl, which brings with it more management complexity, stranded disk capacity, wildly differing storage utilization rates and slower file access. Network-attached storage (NAS) appliances can add file serving capacity that's more easily managed, shareable, more scalable and more efficient than a sprawl of general purpose servers. Read this online article to learn about three basic considerations that can help simplify your NAS buying decision.
Tags : 
nas, network-attached storage, servers, storage
    
HP
Published By: SRC,LLC     Published Date: Jun 01, 2009
To mine raw data and extract crucial insights, business decision‐makers need fast and comprehensive access to all the information stored across their enterprise, regardless of its format or location. Furthermore, that data must be organized, analyzed and visualized in ways that permit easy interpretation of market opportunities growth, shifts and trends and the business‐process changes required to address them. Gaining a true perspective on an organization’s customer base, market area or potential expansion can be a challenging task, because companies use so many relational databases, data warehouse technologies, mapping systems and ad hoc data repositories to gather and house information for a wide variety of specialized purposes.
Tags : 
src, enterprise, enterprise applications, convergence, compared, counted, combined, reorganized, analyzed, visualized, mapped, database, gis, geographic business intelligence, data independence, etl, csv, delimited text file, mdb (both for microsoft access, esri personal geodatabase
    
SRC,LLC
Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation, identity management
    
Okta
Published By: Aberdeen Group     Published Date: Sep 11, 2012
The purpose of this paper is to introduce the cloud computing adoption framework from IBM and make it available for use by any organization looking for a standardized frame of reference for cloud computing discussions.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, cloud adoption, business technology, data center, cloud computing
    
Aberdeen Group
Published By: Aberdeen-IBM     Published Date: Sep 12, 2012
The purpose of this paper is to introduce the cloud computing adoption framework from IBM and make it available for use by any organization looking for a standardized frame of reference for cloud computing discussions.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, cloud adoption, application integration, business technology
    
Aberdeen-IBM
Published By: Zerto     Published Date: Nov 02, 2012
Zerto has introduced a virtual-aware, software-only, tier-one, enterprise-class replication solution purpose-built for virtual environments. Read on to learn how this gives a new approach to business continuity and disaster recovery
Tags : 
zerto, business data, business continuity, data recovery, disaster recovery, it management, data management, business technology, data center
    
Zerto
Published By: Clarabridge     Published Date: Dec 03, 2013
The purpose of this white paper is to provide a five step “roadmap” that organizations can use to transform their marketing organization into a Center of Customer Experience Excellence.
Tags : 
clarabridge, optimizing customer experience, voice of the customer, customer engagement, data source, voc program, customer behaviors, operationalize voc, customer relationship management, crm, social media program, interacting with customers, product and service problems, respond quickly, customer satisfaction, customer loyalty
    
Clarabridge
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search