CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

web environment

Results 51 - 75 of 161Sort Results By: Published Date | Title | Company Name
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Visibility and control of endpoint devices are critical to securely manage your workloads in the Amazon Web Services (AWS) environment. Ideally, teams want to gain real-time visibility and control without having to deploy an additional agent onto the Amazon Elastic Compute Cloud (Amazon EC2) instance. They want a tool that allows them to span physical, virtual and cloud environments of their existing on-premises endpoints and Amazon EC2 instances. CrowdStrike® Falcon Discover™ platform allows you to identify unauthorized systems and applications in real time and quickly remediate issues, ensuring the integrity of your data. Download this datasheet to learn the key benefits of cloud-native CrowdStrike Falcon Discover, including: • Visibility and control over their endpoints whether they are running on-premises or as Amazon EC2 instances • The ability to scale easily to match the dynamic nature of Amazon EC2 instances "
Tags : 
    
AWS - ROI DNA
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"CrowdStrike® Falcon Discover™on Amazon Web Services (AWS) helps you ramp up to the speed of DevOps, delivering advance endpoint protection through automated real-time protection, visibility and control, and more. Watch our on-demand webinar. You’ll see how CrowdStrike Falcon Discover can help your security analysts implement more effective triage and response actions; set up strong baseline security policies for your team; and more. Along with these topics, the webinar covers: Learning about the shared responsibility model: Find out moreabout how this model helps everyone stay more secure and what steps you should take. Learning best practices for CrowdStrike Falcon Discover: Choose the right baseline configuration and environmental guidelines for your team."
Tags : 
    
AWS - ROI DNA
Published By: Cloud Sherpas     Published Date: Oct 08, 2015
Watch this webinar replay to explore common retail uses cases for Google Apps for Work in detail and discover how adopting these solutions can help you create a more collaborative environment for your organisation.
Tags : 
apps for retail, google for work, consumer experiences, knowledge management, enterprise applications, business technology
    
Cloud Sherpas
Published By: Trend Micro     Published Date: May 03, 2018
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft® Azure™ and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being challenged to evolve their security practices to adapt to this new architecture. Trend Micro Hybrid Cloud Security, powered by XGen™, takes a blended approach. It combines multiple cross-generational threat defense techniques for protecting hybrid environments. When one technique isn’t effective against a given threat, another will step in to eliminate the threat.
Tags : 
    
Trend Micro
Published By: Arcserve     Published Date: Jul 26, 2010
Using the CA Wily Application Performance Management (APM) solution consisting of CA Wily Introscope® and CA Wily Customer Experience Manager™, JN Data better manages Web applications through faster diagnosis of problem root causes in its customers' heterogeneous environments.
Tags : 
ca technologies, jn data, web application management, ca wily, application performance management, apm, customer experience manager, virtual server network, application development time, web development
    
Arcserve
Published By: Riverbed     Published Date: Oct 17, 2012
Microsoft SharePoint is a collaboration tool used in enterprises. Read this white paper to learn about the optimizing a web-based SharePoint environment and how to address the requirements across the technology stack to deliver ROI for the business.
Tags : 
microsoft sharepoint, enterprise applications, connectivity, it infrastructure, business technology
    
Riverbed
Published By: Gigaom     Published Date: Oct 31, 2019
This free 1-hour webinar from GigaOm Research brings together experts in Kubernetes and microservices, featuring GigaOm analyst Jon Collins and a special guest from Weaveworks, Steve George. The discussion will focus on how to ensure that a Kubernetes-based target environment delivers the expected benefits, both initially and over time. Kubernetes has emerged as a de-facto platform for deploying container-based microservices. While this approach holds much promise, enterprises need to start on the right foot to not build up problems for later. So, how can you build a Kubernetes-based strategy that delivers both now and in the future? In this 1-hour webinar, you will discover: What is the opportunity and challenge presented by Kubernetes-based microservices delivery? How to ensure the right elements of strategy, to maximize effectiveness while minimizing risk? What might a staged approach look like, depending on w
Tags : 
    
Gigaom
Published By: Xangati     Published Date: May 20, 2015
The goal for organizations with eCommerce Web sites, application developers and IT infrastructure managers is to deliver a successful end-user experience. Xangati can help you scale environment and succeed in reaching that goal.
Tags : 
e-commerce, e-commerce web applications, citrix netscaler adc, web server, web application infrastructure, it administrator, it infrastructure, web application performance, it management
    
Xangati
Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 25, 2019
What you'll learn in this webinar: Simplify the move from legacy commercial databases or niche database solutions to Amazon Web Services (AWS) with help from experts in database migration and automation software solutions from mLogica. Watch our webinar to hear how you can transform your legacy environment to an AWS cloud-native infrastructure by migrating to Amazon Aurora. Using mLogica’s fully automated, self-learning mLogica Database Migration Studio, and consultancy service, you can modernize your databases and applications without disrupting your daily operations. Join our webinar to learn how: mLogica helped TicketSocket unify and simplify its data and gain efficiencies of cost and scale You can move enterprise, mission-critical complex databases to AWS You can break free of commercial licensing obligations
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 26, 2019
What you'll learn in this webinar: When you migrate your databases and applications from Oracle to Amazon Aurora, you can take advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS) to optimize your operations so you can focus on innovation. Clckwrk analyzes your existing database environment and creates a plan to embrace an elastic, scalable, cloud-native database solution that can grow with your business and help you eliminate the exorbitant costs of commercial database licenses. Watch this webinar to learn how: You can accelerate your migration off Oracle databases to Amazon Aurora with minimized disruption to your business You can leverage refactor code to work in your new database Clckwrk can help you establish a unique migration strategy for your needs, supported by a consultation practice that covers discovery to implementation
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 29, 2019
What you'll learn in this webinar: Optimize your operations by taking advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS). Migrate your Oracle applications and databases to AWS and get all the benefits of the cloud. Migrating mission-critical Oracle databases and applications to the cloud is complex and you may feel locked into your platform. Amazon Aurora provides commercial-grade database performance and availability at a fraction of the cost. Apps Associates—an AWS Partner Network (APN) Partner and Oracle expert—can migrate enterprise workloads to the cloud, freeing customers to focus on higher-value initiatives. Watch this webinar to learn how to: Run your entire Oracle database and application environment on the cloud Take advantage of lower IT costs on the cloud and reduce your Total Cost of Ownership (TCO) Leverage Amazon Aurora to help satisfy your company’s cloud-first mandate, improve security, and reduce risk
Tags : 
    
AWS
Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices, security, business technology
    
LogRhythm
Published By: Riverbed     Published Date: Nov 02, 2016
In its quest to increase agility and reliability, IT is adopting cloud services and related technologies like PaaS, micro-services, and containers to rapidly deliver applications that scale to real-world conditions. Application topology is often transient and unpredictably interrelated with countless other applications and services. This poses a serious challenge for performance monitoring since most techniques are still rooted to tiers or servers. During this webinar, discover: • The benefits and challenges of deploying apps across hybrid environments • Techniques that expose major, but often undiagnosed problems • Real-world examples where major performance issues were resolved"
Tags : 
    
Riverbed
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security, real-time targetin engine, service packs, it infrastructure, patching, auditing, it management, business technology, data center
    
Dell Software
Published By: Dell Windows Server     Published Date: Jan 16, 2009
The Windows Server 2008 OS promises to supercharge enterprise computing by providing a solid foundation to support critical workloads and deliver rich Web-based experiences—all in an exceptionally secure, industry-standard operating environment. Dell smoothes the way by providing business-ready platforms optimized for Windows Server 2008 together with Structured Solution Designs to make the migration flexible, simple, and green.
Tags : 
dell, microsoft windows server 2008, structured solution designs, windows migration, platforms
    
Dell Windows Server
Published By: NetApp     Published Date: Dec 12, 2013
This informative paper explores a partnership that extends how you can leverage the scalability and reliability of Amazon Web Services—in its own right, as backup, as a test/dev environment, or as an innovative extension of your  on premises IT infrastructure. Read on to learn more.
Tags : 
private cloud, virtualization, technology, best practices, enterprise cloud, netapp, cloud deployments, storage
    
NetApp
Published By: Oracle Service Cloud     Published Date: Mar 24, 2016
Despite the array of new technologies enabling customer contact across web and mobile channels, most serious interactions still have to pass through an agent in order to be resolved. Enterprises can push customers toward self-service, but in the end, people often still need to talk to other people. This means that, even in the best of circumstances, the customer experience is highly dependent on the capabilities of the agent manning the phones. That person needs more than skills and a beneficial temperament; they require a software environment that provides maximum space for flexibility, problem solving, and intuitive task switching.
Tags : 
oracle, service cloud, customer interaction, customer support
    
Oracle Service Cloud
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications, virtualization, vulnerabilities, it spending, security spending, malware writers, cybercriminals, anti-malware, it environment, virus detection, software protection, security, it management
    
Kaspersky Lab
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
This webcast will describe the new features of TSM 6.1 and will recommend strategies for assessing your current environment, upgrading to 6.1 and how to maximize the monitoring benefits. We will include lessons learned and advice for avoiding pitfalls.
Tags : 
ibm, tivoli, storage manager, tsm, data management, assessment, remote administration, conversion, remote access, remote network management
    
Mainline Information Systems
Published By: Red Hat     Published Date: Jul 14, 2010
This use case introduces Red Hat solutions that you can use to build a world-class web application infrastructure. Learn best practices that will scale as your company grows and find out how to increase your productivity while reducing costs.
Tags : 
red hat, web app infrastructure, productivity, web application environment, enterprise linux, open source, enterprise virtualization, jboss enterprise middleware, infrastructure
    
Red Hat
Published By: NetApp     Published Date: Aug 19, 2010
Maximize Efficiency and Availability with Hyper-V R2 and NetApp. View this on-demand Webcast to learn how you can increase resource utilization, streamline management, and maximize uptime in your Microsoft environment.
Tags : 
netapp, virtualize sharepoint, sql server, hyper-v r2, microsoft environment, roi, green computing
    
NetApp
Published By: NetApp     Published Date: Aug 19, 2010
View this on-demand webcast to gain insight into design considerations and deployment best practices for SharePoint in a virtualized environment.
Tags : 
netapp, hyper-v, virtualize sharepoint, storage, server investment, deployment best practices, microsoft, data storage, remote blob, rbs, backup, data recovery
    
NetApp
Published By: IBM     Published Date: Dec 03, 2008
Discover the IBM System x3650, a highly available and expandable, rack-dense, 2U dual-socket SMP server, ideal for application serving in Web environments. This product guide gives an overview of the x3650, as well as key features and specifications of this flexible, reliable, and simple-to-manage server.
Tags : 
intel, system x, system x3550, x3550, rack, rack-mounted, server, ibm x-architecture, low-foltage, xeon processors, quad-core, ibm, ibm system x3650, rack-dense, socket smp sevrer, product guide x3650, storage
    
IBM
Published By: IBM     Published Date: Feb 03, 2010
This white paper is intended to provide service providers with IBM's point of view on the power of collaboration in a Web 2.0 environment and to introduce a new IBM solution that can help telecoms to use collaboration as a tool for enabling innovation.
Tags : 
ibm ep, empowering people, service provider, collaboration, web 2.0 environment, innovation factory, telecommunication, web services
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search