CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

browser

Results 1 - 25 of 138Sort Results By: Published Date | Title | Company Name
Published By: Ademero     Published Date: Oct 04, 2010
Managing accounts payable is a common practice in every commercial establishment. Whether you deal with goods or provide services, materials and supplies have to be purchased to conduct ordinary business.
Tags : 
document management, paper capture, paper scanning, workflow management, paperless office, document storage, automated workflow, retention policies
    
Ademero
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
More often than not, performance and security are thought of as two separate issues that require two separate solutions. This is mainly due to the implications posed behind various performance and security products. We typically have either security solutions or performance solutions, but rarely solutions that offer both. As technology has advanced, so have our attackers, finding newer and better ways to impact both the performance and security of a site. With this in mind, it has become even more critical to come up with solutions that bridge the gap between security and performance. But how do we do that? We need to shift the focus to what we can do at the browser by leveraging various frontend techniques, such as web linking and obfuscation, versus solely relying upon the capabilities of a content delivery network (CDN) or the origin. We can take advantage of all the new and emerging frontend technologies to help provide a secure and optimal experience for users—all starting at the
Tags : 
frontend performance, security, technology, content delivery, web linking
    
Akamai Technologies
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Common browser vulnerabilities used to execute these attacks What attackers do next to take control of the system How to catch it before the attacker moves further into your network
Tags : 
    
AlienVault
Published By: Avaya     Published Date: Mar 10, 2016
The digital revolution has happened. Commerce is changing again, unbound from prior models. Goods and services are sold and information exchanged in ways we never imagined a few years ago. Think Uber and Airbnb—digital business models like this are replacing last year’s browser-based businesses.
Tags : 
digital advertising, commerce, business optimization, content delivery, network management
    
Avaya
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
• Verwenden Sie CA Live API Creator, um funktionierende Prototypen in Stunden zu liefern. Konvertieren Sie Unternehmensanforderungen in eine funktionsfähige Software. • Nicht nur für Wireframes, sondern auch für funktionierende Systeme, Datenbanken, Logik und Benutzeroberflächen. Es ist so einfach wie eine Kalkulationstabelle und geht auch so schnell. • Beeindrucken Sie die Anwender im Unternehmen, indem Sie innerhalb von Stunden Ergebnisse liefern und Feedback zum Datenmodell und zur Logik einholen. Iterationen sind unmittelbar möglich. • Alles, was Sie benötigen, ist enthalten. Es muss keine IDE installiert oder konfiguriert werden. Verwenden Sie einfach Ihren Browser.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
• Use CA Live API Creator to deliver running prototypes in hours. Convert business requirements into working software. • Not just for wireframes, but also for running systems, databases, logic and user interfaces. It’s as simple as a spreadsheet and just as fast. • Impress your business users with results in hours to get their feedback on the data model and logic. Iterate instantly. • All you need is in the box. No IDE to install or configure. Just use your browser.
Tags : 
    
CA Technologies
Published By: Campaigner     Published Date: Jan 09, 2007
This white paper provides powerful tactics to help you grow bigger, better and more relevant opt-in lists — and turn your Web browsers into buyers.
Tags : 
opt in, opt-in, list management, email list
    
Campaigner
Published By: Campaigner     Published Date: Jan 08, 2007
Email marketing is by far the best way to attract interest in, build desire for, and generate sales of your products and services. Without a well-managed opt-in email list, you can say goodbye to your email marketing investment. This white paper provides powerful tactics to help you grow bigger, better and more relevant opt-in lists - and turn your Web browsers into buyers.
Tags : 
email marketing, opting in, opt in, opt-in, email lists, list rentals, ebusiness, return on investment
    
Campaigner
Published By: Catalyst SF     Published Date: Feb 29, 2008
This white paper has been written for executives at media publishing and content companies interested in learning about the exploding “non-streamed” or portable video market and finding out about best practices for driving revenue through advertising in this medium.
Tags : 
downloadable video, downloadable media, video, catalyst, catalyst sf
    
Catalyst SF
Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents
    
CDW Symantec
Published By: Cisco     Published Date: Jan 16, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm. Businesses that embraced the Internet in its early days gained a significant advantage over their competitors; those that did not became irrelevant very quickly.
Tags : 
digital experience, internet, perfect storm, transformative effects, technology, computers, revolution, browsers
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm.
Tags : 
cisco, akaamai, customer experience, digital customer experience, enterprise, wan, integrated solutions, optimization
    
Cisco
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Citrix     Published Date: Jul 25, 2014
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : 
app, mobile, smartphones, tablets, mobile, email, windows-based, networking
    
Citrix
Start   Previous   1 2 3 4 5 6    Next    End
Search