CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

service provider

Results 326 - 350 of 664Sort Results By: Published Date | Title | Company Name
Published By: InsideUpbg     Published Date: May 21, 2015
I. Find Exceptional Talent with Applicant Tracking and Verification Services II. Important Facts about Applicant Tracking and Verification III. Key Benefits of Applicant Tracking and Verification Services IV. Potential Drawbacks V. Top Questions to Ask Vendors VI. Capabilities to Look for in a Provider VII. Making Your Final Selection
Tags : 
    
InsideUpbg
Published By: Genesys     Published Date: Jun 19, 2019
Success is defined by the quality of your customer relationships. Outdated infrastructure hinders your ability to deliver consistent service across all channels and touchpoints. With rising customer and business demands, you might not have time to wait and see what long-term options a vendor will offer, and when. Proven, market-leading customer experience solutions let you optimize customer engagement across existing channels. And with a partner who’s focused on both innovation and your success, you can future-proof your business as it evolves. Read this executive brief to learn how to incorporate an open, stable and proven customer experience platform—and provider. Discover the advantages of a proven prescriptive migration methodology that will guide your successful customer experience transformation, including: Establishing a solid foundation for customer engagement channels and touchpoints as they emerge Extending omnichannel engagement across departments and processes outside of
Tags : 
    
Genesys
Published By: SafeNet     Published Date: Sep 08, 2010
This paper will provide insight into the top five threats to the online banking in the financial services industry and SafeNet's recommended solutions for a defense that not only provides a secure transaction environment for customers but also satisfies stringent government and industry compliance regulations.
Tags : 
safenet financial services, online banking threats, cyber attack, compliance, financial services providers, authentication, phising, application security, auditing, identity management, internet security, intrusion detection, intrusion prevention, password management, phishing
    
SafeNet
Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses, networking, security, enterprise applications
    
Webroot UK
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches.
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services, sensitive data
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
As we have said through this paper, it is no longer an either/or choice between security analytics and SIEM. Or even between insourcing and outsourcing security monitoring. You need to establish a team with complimentary capabilities, skills, and resources; then leverage each part for what it does best. It is frustrating to use a technology for something it’s not built to do, and just as frustrating to expect a service provider to do things beyond their capability — regardless of their claims during the sales cycle. So don’t do that — build your security monitoring program to give all parties the best chance of success.
Tags : 
security, analytics, siem, monitoring, skills, capabilities, outsourcing
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
The AV-TEST Institute, a leading international and independent service provider in the fields of IT security and anti-virus research, has given McAfee Endpoint Security (ENS) a Top Product Award in their latest corporate Windows7 test. AV-Test evaluated the most recent version 10.5.3 of McAfee Endpoint Security and gave it a score of 17.5 out of a possible 18. Both Usability and Protection earned perfect scores of 6 out of 6, with Performance achieving a near-perfect score of 5.5 out of 6.
Tags : 
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
    
McAfee EMEA
Published By: Plantronics     Published Date: Sep 27, 2013
There has never been a better time for small and medium businesses to start using video conferencing. Sweeping changes in technology and price decreases due to competition among service providers have made it easier than ever to get started.
Tags : 
video conferencing, video conferencing services, cloud, cloud-based video conferencing, technology, communications, wireless, business technology, telecom
    
Plantronics
Published By: Hewlett-Packard     Published Date: May 13, 2008
Learn how SARCOM, a leading IT services provider, used a virtualized HP-based SAN infrastructure linked to server blades, with point-in-time replication (full data set snapclones) and backup to tape libraries to improve storage performance, flexibility, and reliability while reducing costs and protecting data.
Tags : 
hp data protection, data protection, sarcom, virtualization, storage virtualization, virtual storage, virtual array, eva, storage, infrastructure
    
Hewlett-Packard
Published By: Marketo     Published Date: Jun 08, 2017
Read this complimentary copy of the SiriusView: Marketing Automation Platforms 2017 and learn more about Marketo’s key differentiators including its native multi-channel experience, live event management, and content recommendation functionalities. Marketo's powerful marketing automation capabilities and seamless CRM integrations are complemented by our LaunchPoint ecosystem featuring over 500 technology and service providers that offer best-of-breed solutions for today’s marketers. The full report includes: Market evaluation and analysis of 9 marketing automation platform vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying marketing automation platforms
Tags : 
automation, security process, virtualization, standardization, configuration management, it automation, circle it
    
Marketo
Published By: Jonckers Translation & Engineering     Published Date: Jul 13, 2010
Download our Localization Kit guide to learn best practices in localization kit development.
Tags : 
jonckers, localization service provider, lsp, software, graphics, documentation, action item, local area networking
    
Jonckers Translation & Engineering
Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation, identity management
    
Okta
Published By: Sprint     Published Date: Oct 15, 2010
As businesses increasingly demand mobile options for employees, Sprint has introduced a service for wholesale providers called Wholesale Mobile Integration (WMI), which integrates wireless and office telephones on the same phone number.
Tags : 
sprint wholesale, wireless integration, business communication, mobile phone, wholesale mobile integration, voip
    
Sprint
Published By: EMC Corporation     Published Date: Dec 01, 2014
The following paper opens with the evolution of the Software-Defined Data Center and the challenges of heterogeneous storage silos in making the SDDC a reality. It continues by introducing EMC ViPR Software-Defined Storage and details how it enables enterprise IT departments and service providers to transform physical storage arrays into pools of virtual shared storage resources enable the delivery of innovative data services across arrays.
Tags : 
data center, software-defined storage, enterprise it departments, virtual shared storage
    
EMC Corporation
Published By: Aria Systems     Published Date: Dec 19, 2012
The following questions were posed by Aria Systems to Debra Osswald, research vice president of IDC's Communications Service Provider (CSP) Operations program, on behalf of Aria Systems customers.
Tags : 
saas, billing, subscription, management
    
Aria Systems
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications, data management, business technology
    
Intralinks
Published By: NetApp     Published Date: Dec 17, 2013
When your industry’s revenue projections flatten, how can you break away and continue to grow? Learn how Orange Business Services leveraged NetApp storage to reinvent their company by becoming a cloud services provider and exceeded their revenue goals of zero to €500 million by 2015.
Tags : 
storage, it services, cloud computing, public cloud, hybrid cloud, best practices, technology, data management, multiple cloud, security
    
NetApp
Published By: Salesforce.com     Published Date: Feb 12, 2014
It has been said that you can’t manage what you can’t measure, and you must measure what really matters. New service delivery models for IT service management, such as software as a service (SaaS), as well as emerging communications channels for support that include social media, will require some changes to the way you traditionally measure the effectiveness of your services. That’s why you should reexamine your service metrics as you begin to rely more heavily on SaaS, social media, and a more services-oriented approach to IT delivery.
Tags : 
social media, metrics, it service management, cloud platform, collaboration, it service management, saas, it help desk, productivity, it assistance, remedy force bmc, salesforce, employee performance, service management, cloud computing, content management
    
Salesforce.com
Published By: Windstream     Published Date: Apr 03, 2014
Choosing the right type of cloud depends on the needs of your organization. Learn how security, control, customization, elasticity and cost determine what kind of cloud best fits your business as well as what to look for in a service provider.
Tags : 
windstream, convergence, mobility, unified communications, mobile enterprise, private clouds, hybrid cloud, cloud computing, data center design and management
    
Windstream
Published By: XO Communications     Published Date: Apr 13, 2015
Hosted VoIP may appeal to companies that don't want to invest scarce resources in operating their own internal telephony system. However, given the primary role of voice communications for business, companies have to ensure that a provider's service wil meet day-to-day needs and provide excellent reliability. Download this complimentary eBook to discover the six questions that companies must ask and answer before they migrate to a hosted VoIP provider. It also provides insight into how to calculate the cost of a hosted service and whether potential customers will want to add collaboration capabilities to the voice service.
Tags : 
    
XO Communications
Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn six reasons why XO UCaaS is the right hosted solution for your business: - Lower your 'total cost of ownership' - Business continuity assurance - Eliminates obsolescence - Always the right size - Focus your IT team on business performance - Empower a fully distributed and mobile workforce
Tags : 
xo ucaas, unified communications, hosted service provider, it management, mobile workforce
    
XO Communications
Published By: Staples     Published Date: Jun 01, 2017
Device as a service (DaaS) is a complete, constant, and comprehensive service that covers the entire lifecycle of your business devices. While you're the one using it to get your work done, the device itself remains the property of your DaaS provider who maintains it, services, supports, and owns full responsibility for its lifetime performance. DaaS allows you to pay for only what you use. Read this white paper to learn how DaaS can benefit your operations, lower your costs, reduce your stress, and increase your productivity and profitability.
Tags : 
staples business advantage, budgeting, service
    
Staples
Published By: KPMG     Published Date: Nov 07, 2016
Seemingly unrelated events can conspire to harm your business when you rely on far-flung networks of suppliers, vendors, and service providers. Read “The Butterfly Effect” to learn how global organizations can address the threat of third party disruption in today’s economy.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends, enterprise applications
    
KPMG
Published By: ThousandEyes     Published Date: Aug 04, 2017
Steve Loyd, VP of Engineering Ops, uses ThousandEyes to gain visibility in application health and Internet service provider (ISP) performance.
Tags : 
network performance, infrastructure improvement, internet performance, health application
    
ThousandEyes
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search