CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

sage

Results 326 - 350 of 932Sort Results By: Published Date | Title | Company Name
Published By: MessageLabs     Published Date: Jul 16, 2009
What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of computers and the interconnections of the network against innocent businesses to make money. Learn more today!
Tags : 
messagelabs, email security, web security, virus, spam, spyware, phishing
    
MessageLabs
Published By: SAP     Published Date: Jul 18, 2016
After Minnesota rolled out a cloud-based set of productivity tools that included instant messaging and video, growth among state agency users quadrupled and the number of cross-agency messages and videos increased by nearly 350,000 in just 2 years. There is a large-scale shift underway across the country where hardware infrastructure, platforms and software are being unbundled and moved out of government’s traditional area of operation. Download the thought leadership paper to learn more about what this shift entails, the benefits it will bring and how CIOs can prepare for its impact.
Tags : 
    
SAP
Published By: Reactivity     Published Date: Aug 21, 2009
The vast majority of IT professionals and business people agree that security is the leading concern for SOA and XML messages and most quickly realize that SSL is limited by not providing content security, auditability or reliability. This paper will discuss how to extend SOA beyond the perimeter through high performance.
Tags : 
soa, web services, xml, service oriented architecture, service-oriented architecture, soa security, xml security, security performance, reactivity, data management, web service security
    
Reactivity
Published By: IBM     Published Date: Aug 20, 2015
Every day, emails flood our inbox: tasks are left undone, messages go unanswered, and meetings overwhelm us. Why does work have to be such hard work? The truth is, it doesn’t have to be.
Tags : 
mail, clarity, collaboration, innovation, network, productivity
    
IBM
Published By: Lookout     Published Date: Dec 09, 2016
Many federal agencies claim they don't have a BYOD program. This survey of federal employees, however, says something different. Get data on personal device usage at work, who's breaking the rules, and more.
Tags : 
    
Lookout
Published By: Port25 Solutions     Published Date: Mar 09, 2012
The PowerMTA Management Console (PMC), v1.0, is a newly released web based enterprise and a scalable software solution. PMC allows for the centralized configuration, monitoring, and reporting of multiple PowerMTAT installations.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent, it management, data management, infrastructure, design and facilities
    
Port25 Solutions
Published By: Sage     Published Date: Nov 28, 2017
You already know that Salesforce is the world's leading customer relationship management solution. But did you also know that you can transform this already-powerful tool into a complete business management and accounting solution? Learn more about Sage Business Cloud Financials - the accounting solution built for business leaders who want to manage their entire business in the Salesforce cloud. Download the ebook today.
Tags : 
    
Sage
Published By: Adobe     Published Date: Dec 07, 2017
As a creative leader, your job involves a lot more than bringing concepts to life. You’ve got a team to manage, and a pile of clients to keep happy. You’ve got content to ideate, assets to build, and campaigns to manage— and it all needs to be delivered on time and on brand. Ideally, your team would concept and shoot every asset to perfectly merge imagery and message for every deliverable. But business deadlines and budgets don’t always allow time for careful creativity—and 62 percent of creative marketers say creating original imagery requires time and effort their team can’t afford.
Tags : 
    
Adobe
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
If you’re a small-to-midsized business (SMB), you know that you’re operating in a fast-paced, ever-changing business environment. Customers want their demands met instantly, and increasing competition multiplies the pressure you’re under. If you can’t deliver, you can be sure somebody else will. Fortunately, the technology landscape is changing the way you do business. Mobility, social media, and Big Data are leveling the playing field and making it possible for companies like yours to access more sophisticated technology, reach bigger audiences, target their messages, and innovate in their offerings. Yet nothing has changed the landscape so much as the cloud.
Tags : 
business environment, business management, social media, information technology, data security
    
Hewlett Packard Enterprise
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, firewall, it management
    
Palo Alto Networks
Published By: Secure Passage     Published Date: Sep 29, 2010
Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity
Tags : 
firewall, firewall management, network security management, firewall migration, compliance, it security
    
Secure Passage
Published By: IBM APAC     Published Date: Jul 09, 2017
In a recent report, Aberdeen's research suggests that Hadoop usage could be a catalyst for an enhanced and well-rounded data strategy. Read on to find out more.
Tags : 
hadoop, big data, data strategy
    
IBM APAC
Published By: Forcepoint     Published Date: Apr 19, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control, anti spam, anti spyware, anti virus, application security, internet security
    
Forcepoint
Published By: Oracle     Published Date: Sep 30, 2019
In the past, B2B transactions occurred in face-to-face meetings as a sales professional worked a product demo, business luncheon, or boardroom presentation to influence a customer – and close the deal. Today, however, B2B stakeholders perform much of their product and service research online. In fact, 93 percent of B2B buying starts with online searching, according to a Pinpoint Market Research study. This research occurs long before a customer engages with sales. As your prospects research and evaluate your offerings, they leave behind valuable clues to their intent. Understanding these clues – cracking the code – can help you tailor your messages to them, thereby providing them a more tailored, relevant experience. As a result, business-savvy marketing and sales departments have embraced marketing automation platforms, so their respective teams can work together on one common platform, reach B2B customers online, and drive revenue. Marketing automation platforms automate repetitive
Tags : 
    
Oracle
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
"The way we work has changed. More users are working remotely, satellite offices are connecting directly to the internet, and SaaS app usage is on the rise. How can your security technology keep up with all of these changes? A new category of products is emerging - the secure internet gateway. Built to solve the security challenges of today's mobile, cloud-enabled enterprise, the secure internet gateway is a critical component to securing today’s workforce. View the infographic to understand the five primary reasons for the rise of this category. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Adobe     Published Date: Jun 26, 2019
Email marketing still work really well. But the world of email is changing. The inbox is fragmented like never before. Messages have to be more relevant, delivered at the right time, and still be considered important enough to read. If any of the signs in this piece sound familiar, it may be time for your organization to put a plan in place to move from ‘sending emails’ to developing a marketing automation program that meets the needs of your customers better.
Tags : 
    
Adobe
Published By: IBM     Published Date: Jan 06, 2016
In Aberdeen's recent "An Asset for HR in the Age of the Candidate," we learned that there isn't a one-size-fits-all, pre-hire assessment approach to fit in with every company's talent acquisition process. However, there are universal steps that can be taken to optimize its usage to be as fruitful as possible.
Tags : 
ibm, optimization, pre-hire, talent acquistion, recruitment, productivity, financial management, recruiting software/services, employee performance management
    
IBM
Published By: Aruba Networks     Published Date: Jul 03, 2013
802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly. Whether you are an early adopter who has already started planning, or like several organizations, unsure of your next step, download this five step guide to help you prepare and plan for a successful migration to an 802.11ac WLAN.
Tags : 
migrate, 802.11ac, mobile users, device, upgrade, reliability
    
Aruba Networks
Published By: SDL Web Content Management Solutions     Published Date: Jul 06, 2010
In today's connected world, a well managed Web presence is essential for any organization to achieve business success. The internet provides unprecedented opportunities for border-free communication. Many organizations use the internet to reach worldwide audiences. These organizations need to balance centralized messages and branding with localized content and contributions. SDL Tridion's BluePrinting technology allows you to create this balance.
Tags : 
sdl tridion, blueprinting, communication, localization, multidimensional communication, network management, content management
    
SDL Web Content Management Solutions
Published By: Sage FAS Fixed Assets     Published Date: Apr 11, 2011
The goal of this white paper is to help you learn about best practices for fixed asset management and suggest tips for implementing a successful inventory process.
Tags : 
sage fas, fixed asset inventory, disaster recovery, sarbanes-oxley act, accounting solution, asset inventory process, ghost assets
    
Sage FAS Fixed Assets
Published By: Sage     Published Date: Mar 26, 2014
Do you often find yourself daydreaming about a perfect fixed assets management solution?
Tags : 
sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning, reporting, quality assurance, sarbanes oxley compliance
    
Sage
Published By: Dell Storage     Published Date: Mar 06, 2012
This paper discusses eight must have Dell Compellent technologies that combine to create new levels of efficiency and flexibility while cutting cost now and in the future. Find out more NOW!
Tags : 
fluid, data, data storage, storage, data center, flexibility, compellent, efficiency, future, enterprise data, lifecycle, adapt, architecture, storage virtualization, modular hardware, enterprise storage, automation, investment, dynamic, provisioning
    
Dell Storage
Published By: Sage Software     Published Date: Apr 24, 2019
Understanding food and beverage manufacturing compliance and traceability.
Tags : 
    
Sage Software
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search