CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

techniques

Results 301 - 325 of 424Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security, protection, epp, breach, cyberattack, operations, network, business technology
    
Cisco
Published By: McAfee     Published Date: Oct 28, 2013
Welcome to Advanced Evasion Techniques For Dummies, your guide to the security evasion techniques that have become a serious preoccupation of the IT industry.
Tags : 
hacking, malware, advanced evasion, aet, stonesoft, network security, next generation firewall, ngfw, evasion technique for dummies, mcafee, firewall, software development, it management
    
McAfee
Published By: IBM     Published Date: Sep 27, 2013
While more and more enterprises are using analytics to guide their decision-making processes, most midsize businesses continue to rely on old-fashioned decision-making techniques like trial and error. The reason for this is simple: advanced analytics solutions can be very complex and expensive to implement, leading midmarket businesses to assume that the benefits of analytics are beyond their reach. IBM has created a new analytics solution that is designed specifically with the needs of midmarket businesses in mind. The solution, IBM Analytic Answers, gives midmarket businesses the opportunity to take advantage of a sophisticated analytics platform, backed by IBM expertise, while also staying within their budgets.
Tags : 
frost & sullivan, ibm, ibm analytics, ibm analytic answers, business analytics, midsize business, analytics solution, advanced analytics, it management, data management, business technology
    
IBM
Published By: Cisco     Published Date: Jun 10, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of techniques.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, access control, anti spam, anti spyware, anti virus, mobile device management, data loss prevention
    
Cisco
Published By: Cisco     Published Date: Nov 30, 2016
Every sales professional has experienced the frustration of the follow-up to a meeting — the unanswered voice messages, wasted emails, or the “not interested” replies. Traditional follow-up techniques often fail because they don’t feel personal enough to the customer. Meanwhile, reaching out to prospects in-person isn’t always practical because on-site meeting invites may be costly or inefficient.
Tags : 
    
Cisco
Published By: McAfee     Published Date: Oct 10, 2013
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, network performance, network security, firewalls, internet security, business technology
    
McAfee
Published By: McAfee     Published Date: Nov 11, 2013
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, firewalls, hacker detection, intrusion detection, intrusion prevention
    
McAfee
Published By: Wyng     Published Date: Nov 02, 2016
Wyng Offers Insights Into top performing Digital Marketing Campaigns and Techniques.
Tags : 
emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, traditional marketing
    
Wyng
Published By: General Atomics     Published Date: Jan 13, 2015
The term “Big Data” has become virtually synonymous with “schema on read” unstructured data analysis and handling techniques like Hadoop. These “schema on read” techniques have been most famously exploited on relatively ephemeral human-readable data like retail trends, twitter sentiment, social network mining, log files, etc.
Tags : 
general atomics, big data, metadata, nirvana, hadoop, data center design and management, colocation and web hosting
    
General Atomics
Published By: Appcito     Published Date: Apr 09, 2015
Traditionally, rollout of a new software version has been a critical and painful process. In the past, new versions were implemented along with a maintenance period (i.e., service downtime), resulting in loss of business for that period. This downtime was generally acceptable when there were only a few releases a year. But now—in a more fast-paced world of hosted software-as-aservice (SaaS) solutions, increased responsiveness and daily or even more frequent releases—down times are no longer acceptable or a?ordable. Continuous Delivery is a practice used in the software industry to automate and improve the process of software delivery. It is all about adopting practices to release high-quality software fast through automation of the build, test and deployment processes.
Tags : 
saas solutions, responsiveness, cloud delivery, continuous delivery, high-quality software, deployment processes, continuous deployment, cloud applications, cloud application delivery, knowledge management, business technology
    
Appcito
Published By: Ceros     Published Date: May 15, 2015
The most engaging brands are telling great stories, using interactive content to deliver their message in a new way. Discover how to engage your brand’s audience using interactive storytelling techniques in this eBook.
Tags : 
interactive storytelling, interactive content, content marketing, content creation, brand storytelling, digital engagement, digital marketing, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, traditional marketing
    
Ceros
Published By: Cisco     Published Date: Feb 16, 2016
This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
cisco, malware, data security, analytics, global security threat, security
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
technology, infrastructure management, security, network management, network performance, productivity
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: IBM     Published Date: Nov 12, 2014
The right requirements management tool can help you bridge the gap between customers, requirements, and deliverables and build the product that meets your need. Learn about effective requirements management techniques to save time and cost of your global teams.
Tags : 
ibm, requirements, requirements management, product management, it management, data, requirements management tool
    
IBM
Published By: IBM     Published Date: May 20, 2015
Join our IBM Big Data analytics experts at this webinar for a discussion of how the right analytical techniques can broaden the possibilities of your analytics infrastructure.
Tags : 
big data, analytics, forecasting, data management, productivity
    
IBM
Published By: Act-On     Published Date: Jan 23, 2012
In this comprehensive 17-page guide from Smart Selling Tools, you will learn tips and techniques to help you:.Collect and Deliver Meaningful Lead Data .Cultivate Leads Beyond the Top of the Funnel .Uncover Opportunities Within Channels Already in Place .Create a Larger Impact with Your Email Marketing Initiatives The top 10 strategies for each category, plus a marketing tools success checklist is also included.
Tags : 
act-on, marketing, selling, tools, marketing sales, leads, lead generation, email marketing, sales
    
Act-On
Published By: OutSystems     Published Date: Jun 11, 2013
Learn how to reinvigorate your IT Department with these 3 innovative techniques that will control the cost of change, increase productivity, and help your business differentiate from the competition.
Tags : 
outsystems, application delivery, outsystems platform, enterprise applications, web applications, mobile applications, integration, development, ide, it management
    
OutSystems
Published By: Symantec     Published Date: Jan 10, 2013
In this guide, we will examine major types of threats to information security that  businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
shortcut, business, security measures, ssl, security socket layer, ssl, data management, business technology, data center
    
Symantec
Published By: Dice     Published Date: Oct 07, 2013
12 "Must-Adopt" Recruiting Techniques for Hiring Millennials
Tags : 
dice, hiring millennials, recruiting, recruiting techniques, technology talent, human resources
    
Dice
Published By: BlueHornet     Published Date: Jun 06, 2008
As you look ahead to 2008 for new opportunities to improve your email marketing efforts, we encourage you to look back for a minute, as well. Remember the “email is a courtship” metaphor and “one-to-one” techniques espoused by Seth Godin and others? Even as far back as 1999, those ideas resonated strongly with all of us because they were dead-on. Jump ahead to 2008, and it’s pretty obvious that marketers have failed to realize the potential in offering true relationship email marketing to customers.
Tags : 
email marketing, email messaging, blue hornet, bluehornet
    
BlueHornet
Published By: BlueHornet     Published Date: Jun 06, 2008
Every email marketer can use lifecycle techniques to drive greater online revenue and brand equity. Join the lifecycle email marketing experts from BlueHornet to learn which five components you should focus on to achieve the greatest success.
Tags : 
email marketing, email messaging, blue hornet, bluehornet
    
BlueHornet
Published By: Bronto     Published Date: Feb 01, 2018
What you'll learn: • Why batch-and-blast email is losing its effectiveness and the email techniques to replace it. • How techniques like user-generated content and the mining of unstructured data can boost email effectiveness. • What artificial intelligence is offering today – and what it could offer years from now. • How omnichannel merchants can leverage physical locations as part of their online strategy.
Tags : 
email, omnichannel, retail, ecommerce
    
Bronto
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search