CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

organization management

Results 1 - 25 of 976Sort Results By: Published Date | Title | Company Name
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, compliance, colocation and web hosting
    
123Together
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop, security management, security policies, vulnerability management
    
Absolute Software
Published By: Achievers     Published Date: Jun 05, 2012
The research in this report reveals that progressive organizations look at recognition differently. Most importantly, they have a strategy for recognition that ensures alignment with business goals, organizational culture and other talent management processes. These organizations design their programs to consistently reinforce key behaviors and outcomes necessary to drive business success.
Tags : 
achievers, human resources, employee recognition, employee development, hr management, employee performance
    
Achievers
Published By: Acquia     Published Date: Aug 03, 2009
Not doing Social Publishing? You’re behind. Social technologies on the web have changed forever how organizations of all sizes interact with their customers to gather feedback, improve customer service, and protect and grow their brands. Effective web content management must now include social and community capabilities.
Tags : 
social publishing, acquia, customer service, brands, web content, social media, publishing, publish, journalism, blog, blogging, rich content, myspace, facebook, orkut, meebo, wikis, forum, tagging, twitter
    
Acquia
Published By: Adobe     Published Date: Aug 02, 2017
Adobe can help you seamlessly capture customer data, track offer performance and deepen customer relationships with more consistent and relevant offers across channels. See how our Adobe solutions work together to help you build your next best offer.
Tags : 
customer experience, insights, shared service value, consolidated services, global services division, organization optimization, travel management analytics, social analytics, accounts receivable
    
Adobe
Published By: Adobe     Published Date: Mar 16, 2016
Competition is the number one pressure faced by today’s HCM teams – by a 69% margin! Of all the pressures that contemporary HR teams face, finding and keeping quality talent ranks above everything else. As a part of that, Best-in-Class organizations need to focus on optimizing the employment experience, from hiring and onboarding, to ongoing management and transition. This report from Aberdeen explores how electronic signature solutions, as well as other digital HR technologies, can improve the employment experience throughout the journey. Read this report to learn: • Why Best-in-Class HR departments are investing in employee-friendly technologies • How digital solutions can impact employee experience, and why that matters for HR • How electronic signatures complement HRIS applications and streamline many HR processes
Tags : 
hr organizations, hris, esignature, customer management, sales effectiveness, human capital management, knowledge management
    
Adobe
Published By: Adobe     Published Date: Nov 02, 2018
Improving the customer experience is a strategic imperative for most organizations today, but delivering an engaging experience across the growing number of digital customer touch points can be a daunting challenge. Organizations must deliver responsive experiences that “play well” on smartphones, PCs, and tablets. They must publish content to installed app experiences on mobile and other connected devices, to social channels, and to email campaigns. They must manage global sites in different languages, localize the experience for different markets, and — increasingly — personalize the experience for different customer personas or segments. A modern digital experience management platform is essential for any organization hoping to make digital experience delivery a core competency. IDC interviewed organizations using Adobe Experience Manager Sites (AEM Sites) to understand the impact of the platform on their ability to create, manage, and deliver digital experiences. Study participants
Tags : 
    
Adobe
Published By: Adobe Systems, Inc.     Published Date: May 17, 2011
This paper highlights the advances in closed-loop marketing that enable measurement and optimization of digital marketing efforts. It also describes the challenges that CMOs face when pursuing digital marketing strategies and how next-generation WCM solutions help CMOs overcome those challenges.
Tags : 
adobe, cmo, digital marketing, organization transformation, chief marketing officer, customer experience management, wcm, multichannel pipeline growth, cmis
    
Adobe Systems, Inc.
Published By: ADP     Published Date: Mar 22, 2018
Your global organization’s network of human capital management (HCM) platforms is the nerve center of your entire enterprise. But passing data back and forth between disparate HCM systems has never exactly been easy. So your HR, payroll, talent, benefits and time and attendance systems, often specific to regions and countries, fire futilely across data synapses that in real-world terms leave you blind to the true state of your business.
Tags : 
    
ADP
Published By: ADP     Published Date: May 23, 2018
Your global organization’s network of human capital management (HCM) platforms is the nerve center of your entire enterprise. But passing data back and forth between disparate HCM systems has never exactly been easy. So your HR, payroll, talent, benefits and time and attendance systems, often specific to regions and countries, fire futilely across data synapses that in real-world terms leave you blind to the true state of your business.
Tags : 
    
ADP
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : 
sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans, wireless security, wireless lan, wireless lans, vulnerability management, security policy, security policies, airdefense, sarbanes oxley compliance
    
AirDefense
Published By: Akamai Technologies     Published Date: Oct 31, 2017
Before organizations can address their bot challenges, they need the ability to detect the many types of bots interacting with their websites and web applications on a daily basis. Bots come in many shapes and sizes, ranging from simple scripts to sophisticated automation tools, and continuously evolve over time. As detection technologies improve, so too do the technologies available to bot operators as they update their bots to evade the latest detection mechanisms. When evaluating a bot management solution, organizations should consider its detection technologies and their effectiveness against the current and future bot landscape, while maintaining the lowest possible level of false positives and negatives.
Tags : 
bot manager, bot interaction bot detection
    
Akamai Technologies
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
More agile and mobile ways of working need more agile and flexible networks. Wave 2 Wi-Fi, powered by ALE, delivers the capabilities needed to create future-ready organizations. Alcatel-Lucent OmniAccess® Stellar WLAN is optimized for Wave 2 infrastructures, with a distributed intelligence architecture, simplified management and support.
Tags : 
performance, iot readiness, simplicity, user centricity, analytics capability, unified management
    
Alcatel Lucent Enterprise
Published By: Alert Logic     Published Date: Jun 12, 2014
Log management is an organizational requirement that extends beyond simple data collection. Today’s compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Tags : 
log management, log collection, log solutions, log storage, security logs, it management, enterprise applications
    
Alert Logic
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions, security, it management
    
Alert Logic and Sungard Availability Services
Published By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 05, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: ALL ICT Ltd     Published Date: Mar 26, 2008
The aim of this document is to assist organizations protecting their assets – tangible and intangible – through a Security Management Program. This program provides a holistic, hands-on, and consistent approach for securing the organization against serious security breaches, such as data leakage, while providing the organization with the required flexibility to adapt itself to the business needs and to remain competitive in the market.
Tags : 
allict, all ict, security management, security, network security, intrusion prevention
    
ALL ICT Ltd
Published By: Allscripts     Published Date: Apr 23, 2015
In this paper, you will learn the challenges facing organizations using yesterday’s Practice Management systems, and discover why capitalizing on the latest technology is easier—and much more rewarding—than you might think.
Tags : 
revenue cycle, healthcare, practice management, technology, allscripts, financial processes
    
Allscripts
Published By: Alteryx, Inc.     Published Date: Sep 06, 2017
Organizations that want to apply consistent data management, governance and security practices across their organization can learn a lot from Ford Motor Company. Data-driven decision making led Ford Motor Company to perfect the vehicle assembly line in 1913. A century later, Ford had more than 4,600 data sources, and a wide range of analytical tools, methods, and processes in use throughout the company, and needed a more strategic approach to decision-making.
Tags : 
    
Alteryx, Inc.
Published By: Amazon Web Services     Published Date: Oct 09, 2017
Today’s organizations are tasked with managing multiple data types, coming from a wide variety of sources. Faced with massive volumes and heterogeneous types of data, organizations are finding that in order to deliver insights in a timely manner, they need a data storage and analytics solution that offers more agility and flexibility than traditional data management systems. Data Lakes are a new and increasingly popular way to store and analyse data that addresses many of these challenges. Data Lakes allow an organization to store all of their data, structured and unstructured, in one, centralized repository.
Tags : 
cost effective, data storage, data collection, security, compliance, platform, big data, it resources
    
Amazon Web Services
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search