CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

sso

Results 126 - 150 of 1920Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Jul 29, 2019
What you'll learn in this webinar: Optimize your operations by taking advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS). Migrate your Oracle applications and databases to AWS and get all the benefits of the cloud. Migrating mission-critical Oracle databases and applications to the cloud is complex and you may feel locked into your platform. Amazon Aurora provides commercial-grade database performance and availability at a fraction of the cost. Apps Associates—an AWS Partner Network (APN) Partner and Oracle expert—can migrate enterprise workloads to the cloud, freeing customers to focus on higher-value initiatives. Watch this webinar to learn how to: Run your entire Oracle database and application environment on the cloud Take advantage of lower IT costs on the cloud and reduce your Total Cost of Ownership (TCO) Leverage Amazon Aurora to help satisfy your company’s cloud-first mandate, improve security, and reduce risk
Tags : 
    
AWS
Published By: Backupify     Published Date: Jul 15, 2013
Backing up onsite data is considered a “best practice.” The same should apply to backing up your Google Apps data. This paper will help you determine the ROI of choosing a backup service by helping you understand the replacement costs associated with your SaaS data.
Tags : 
roi, google apps, backup solution, saas data
    
Backupify
Published By: Bahrain EDB     Published Date: Nov 23, 2016
This KPMG report looks at the typical costs associated with setting up and operating a manufacturing business in Bahrain, compared to the costs in other Gulf Cooperation Council (GCC) countries. It covers company format>on; land rental and construction; utilities; manpower; visas and labor; and ports and commerce.
Tags : 
gulf, gcc, bahrain, saudi arabia, uae, manufacturing, logistics, fmcg, food, industrial services, aluminium, steel, trading, construction, cost, business, comparison, fdi, investment, abroad
    
Bahrain EDB
Published By: Basho     Published Date: Apr 07, 2015
Did you know that the total amount of data will reach 44 zettabytes by 2020 and that 80% of that data will be unstructured data? Are you ready for all of this unstructured data? More importantly, do you know how to turn it into a competitive advantage? Learn about the challenges that come with unstructured data and how to deal with those challenges in our latest publication “Meeting the Challenges of Unstructured Data” In this Whitepaper you’ll learn: What is driving the growth in unstructured data The challenges associated with managing unstructured data How companies are capitalizing on the opportunities that unstructured data presents to save money, time, and create new market opportunities
Tags : 
basho, unstructured data, competitive advantage, new market opportunities, managing unstructured data, it management, data management
    
Basho
Published By: Basho     Published Date: Apr 07, 2015
bet365 is one of the world’s leading online gambling groups with over 14 million customers in two hundred countries. Recently, bet365 chose Riak, the NoSQL distributed database to ensure scalability and reliability for their site. Get a better understanding of how to choose the right database solution directly from Dan Macklin, Head of Research and Development at bet365. Join us for this On Demand webinar to learn about: • bet365's evaluation process • The business and technical challenges addressed • Triumphs achieved by migrating to Riak • Lessons learned and Dan Macklin's advice for anyyone evaluating their database requirements Download to watch this On-Demand webinar to learn why Riak chose bet365.
Tags : 
basho, riak, database infrastructure, bet365, unstructured data, it management, data management
    
Basho
Published By: BatchBlue Software     Published Date: Mar 27, 2009
Even though you may not be familiar with the term “social media”, chances are you’ve heard about it or maybe even are using it to communicate in your personal life. But is social media successfully making the crossover from personal pastime to business tool? This blue paper outlines the different types of tools in the social media toolkit and proposes ways they can be used to promote your brand, communicate with your customers and help grow your business.
Tags : 
social media, matternow, communications, brand management, media toolkit, marketing communications, myspace, youtube, facebook, social networking, internet advertising, linkedin, twitter, blogs, weblogs, microblogging, pownce, flickr, del.icio.us, dig
    
BatchBlue Software
Published By: Bazaarvoice     Published Date: Jul 12, 2011
By making ticket-buying social, Ticketmaster connects with and empowers their customers. Learn how Ticketmaster leverages social to interact with customers and drive new sales.
Tags : 
bazaarvoice, ticketmaster, social shopping, social media, social commerce, social futurist, customer interaction
    
Bazaarvoice
Published By: Beqom     Published Date: Jun 12, 2019
Get the overlooked lessons that will help you go digital successfully HR and sales leaders are challenged to streamline the compensation process while attracting and retaining top talent, supporting business strategy, and maintaining regulatory compliance. Fill out the form to instantly download our free eGuide and learn where the most successful digital compensation transformations get it right.
Tags : 
    
Beqom
Published By: Berkshire Associates     Published Date: Aug 30, 2010
Does your workforce have a social media policy established? According to a study commissioned by Robert Half Technology, an IT staffing company, "Fifty-four percent of U.S. companies say they've banned workers from using social networking sites like Twitter, Facebook, LinkedIn, and MySpace, while on the job."
Tags : 
social media, human resources
    
Berkshire Associates
Published By: Berkshire Associates     Published Date: Aug 30, 2010
Most economists believe 2010 is not the year of recovery, but it is without question a better year than the prior. As the economy begins to grow, hiring will increase. What will you do then if you do not prepare now?
Tags : 
recruitment
    
Berkshire Associates
Published By: Berkshire Associates     Published Date: May 09, 2011
Berkshire's white paper examines the different compliance needs in the Manufacturing, Healthcare, and Finance Industries
Tags : 
affirmative action, manufacturing, finance, health care, compliance, human resources, ofccp
    
Berkshire Associates
Published By: BillingPlatform     Published Date: Apr 18, 2019
Digital transformation, typically associated with front-office changes like sales and marketing, has begun to revolutionize billing practices for forward-leaning enterprises. This infographic highlights the importance of evolving your billing for the digital economy. Discover the 4 survival tactics offered by cloud-based billing platforms.
Tags : 
    
BillingPlatform
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, networking, it management, wireless, knowledge management, enterprise applications, access control, phishing, software compliance, business technology, cloud computing
    
Bitium
Published By: Bitium     Published Date: Jan 22, 2014
Selecting the right single sign-on solution (SSO) for your organization can be a daunting task. Competing solutions offer varying levels of application support, management overhead, and potentially confusing (and counter- productive) cost structures. But the upside in terms of improved security, manageability and user productivity enhancements provided by the right SSO solution can be dramatic. The questions contained within are intended to help you collect and organize the critical information you need to make a well-informed decision for your organization. Please use them as a guide during your due diligence and vendor selection process. Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, it management, enterprise applications, access control, business technology, cloud computing
    
Bitium
Published By: BlackBerry     Published Date: Apr 13, 2010
In recent years, law firms have enjoyed remarkable financial returns due to a strong global economy, free flowing capital and a high level of demand for legal services. Law firm revenues and profits continued to be strong, even during the dotcom bust, the post 9/11 slowdown and the increasing cost of associate recruitment and retention. This success could be partly explained by the growth imperative in law firms: they must continue to grow, either by acquisition, or by recruiting laterals or associates, because law firm economics correlates size with profits. And many firms grew rapidly in the past several years.
Tags : 
blackberry, law, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 03, 2009
Companies that are interested in securing their mobile workers and preventing unauthorized access to important company resources need to implement an enterprise wireless security strategy. Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Tags : 
blackberry, mobile applications, mobile security, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Aug 10, 2009
In recent years, law firms have enjoyed remarkable financial returns due to a strong global economy, free flowing capital and a high level of demand for legal services. Law firm revenues and profits continued to be strong, even during the dotcom bust, the post 9/11 slowdown and the increasing cost of associate recruitment and retention. This success could be partly explained by the growth imperative in law firms: they must continue to grow, either by acquisition, or by recruiting laterals or associates, because law firm economics correlates size with profits. And many firms grew rapidly in the past several years.
Tags : 
blackberry, altman weil, law, legal, research in motion, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Jul 22, 2010
Unified Communications (UC) integrates multiple communications modalities and adds presence features to allow workers to communicate and collaborate more effectively with co-workers, customers and suppliers. Learn about the cost, productivity and reachability issues associated with increased enterprise mobility and the benefits and future directions of Mobile UC.
Tags : 
blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, fmc, telecom, touchpoint
    
BlackBerry
Published By: BlackBerry     Published Date: Aug 02, 2010
There is a communications revolution occurring in hospitals today. With highly mobile staff members and the increasing use of smartphones, new ways to share and act on information abound. Yet despite these technology changes, the need for fast, accurate messaging remains crucial to maintain patient safety at all times.
Tags : 
blackberry, healthcare, hospitals, smartphones, pda, mobile workers, mobile staff, integration, wifi, bes
    
BlackBerry
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
Even if one minute a day is lost to productivity drains because of PC horsepower allocation to security scans and remediation, the cost over a year across a medium-sized enterprise adds up quickly. A 10,000 employee operation would face over $10M in direct productivity losses alone. As an early trigger for expensive PC hardware refresh is an onslaught of help desk calls, many companies find that they can actually extend the hardware refresh cycle out another 12–24 months simply by employing a security solution that does not tax the PC as heavily. The indirect costs associated with brand reputation and opportunity losses add untold thousands of dollars per year as well. Further, some institutions under green initiatives monitor power consumption related to security measures favor solutions that use less energy. As such, forward-thinking enterprises are looking beyond the software license fees when evaluating security software alternatives.
Tags : 
system, resource, impact, testing, cylance
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
BlackBerry Cylance commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying CylancePROTECT and CylanceOPTICS. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed a representative customer currently using CylancePROTECT and CylanceOPTICS. Read the Forrester TEI report to learn more about the customer’s benefits, along with the overall ROI that was achieved.
Tags : 
    
BlackBerry Cylance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search