CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

security infrastructure

Results 401 - 421 of 421Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Oct 07, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Intel® Xeon® Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Intel® Xeon® Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. New Possibilities Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Organizations have to move forward towards strategic approaches to enabling that integration, in support of the Extended and Connected Enterprise.
Tags : 
access management, identity federation, it strategies, security, infrastructure
    
IBM
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Confidence in the cloud is growing—and more companies than ever are looking to entrust their content management to a solution that is deployed in the cloud. A new survey conducted by IDG Research explores the rapidly expanding trend of companies moving their critical content and data storage to the cloud. Download the report to discover what your industry peers are saying about the cloud today and how, in the next year, everything could change.
Tags : 
cloud, solutions, ecm, onbase, hyland, data, availability, encryption, compliance, security, platform, content, management, information, on-premise, infrastructure, future
    
OnBase by Hyland
Published By: Juniper Networks     Published Date: Jun 29, 2017
The ongoing success of 7ticks depends on having an IT infrastructure that adapts and scales to unforgiving reliability, performance, and transparency requirements. To support the torrid growth of data, 7ticks needed to expand the IP/MPLS network connecting its data centers to 40 Gbps—and have an immediate path to 100 Gbps and beyond. Within its data centers, 7ticks needed network and security solutions that would keep pace—and would simplify service management and support automation. “Our biggest challenge is performance at scale,” says Scott Caudell, founder of the 7ticks business and vice president of IT infrastructure at Interactive Data. “IT is our business. The 7ticks infrastructure helps customers get a lower time to market and faster execution speeds at a cost that’s sustainable for their businesses.”
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Juniper Networks
Published By: Google     Published Date: Aug 09, 2017
This document gives an overview of how security is designed into Google’s technical infrastructure. This global scale infrastructure is designed to provide security through the entire information processing lifecycle at Google.
Tags : 
cloud, cloud computing, security, infrastructure
    
Google
Published By: Google     Published Date: Aug 09, 2017
This document gives an overview of how security is designed into Google’s technical infrastructure. This global scale infrastructure is designed to provide security through the entire information processing lifecycle at Google.
Tags : 
cloud, cloud computing, security. infrastructure
    
Google
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Intel® Xeon® Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
    
Dell and VMWare
Published By: Dell Server     Published Date: Aug 08, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
Dell Server
Published By: Turbonomic     Published Date: Nov 12, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how t
Tags : 
    
Turbonomic
Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. To find out more on how Cisco can help with these challenges download this white paper today.
Tags : 
    
Cisco Umbrella EMEA
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Rackspace     Published Date: May 28, 2019
Tokio Marine Life Insurance Singapore (TMLS), an established general and life insurance firm, and subsidiary of the first insurance company in Japan, Tokio Marine Holdings, envisioned an e-services portal to improve user experience by providing a single platform for all customer interactions. For its infrastructure and environment development, the insurer engaged the professional managed security and managed public cloud services of Rackspace, to help with the optimization of its Azure cloud platform, as well as to ensure that the migration is compliant to Singapore’s strict regulations on public cloud use by financial services institutions. The new portal that went live recently had Rackspace instrumentally involved in its building, running, managing and optimizing for the Azure cloud, including a best-practice infrastructure design with the latest resiliency and security features. Building on the success of this year-long project, a future collaboration to tap Rackspace’s PCI DSS
Tags : 
    
Rackspace
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17     Next   End
Search