CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

trust services

Results 1 - 25 of 95Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Aug 30, 2019
The financial services industry is one of the largest and most sought-after targets for attackers. This particular industry revolves around trust and security, and because of this, these elements are quite often the key focal point for criminals. Successful attacks can quickly translate into the dissemination of massive amounts of personal information and monetary gains by the attacker. Criminals targeting the financial services industry do so by leveraging various attack surfaces, such as people, processes, applications, or systems. Regardless of where the financial institutions are located in the world, staying aware of the forefront of new attack trends is imperative for keeping their systems and customers safe. Understanding the ecosystem of attacks, how different layers interact, and the booming economy spawned by it gives financial services organizations the edge they need.
Tags : 
    
Akamai Technologies
Published By: Automation Anywhere APAC     Published Date: May 17, 2019
Much has already been said and written about the infiltration of robotic process automation (RPA) and intelligent automation (IA) technologies into the workforce. In truth, it’s taken the corporate world a while to test, trust and commit to automation at work. To understand how far APAC/ANZ markets have advanced towards acting on these opportunities, the Shared Services and Outsourcing Network (SSON) surveyed the market and found that across the region corporations were forward thinking in building for scale, trusting technology and recognising the need to incorporate robotics into both IT infrastructure and enterprise strategy. This report explains how enterprises across APAC/ANZ are staying ahead of the global wave of RPA, the most popular solutions they are choosing, who the preferred consultants or 'integrators' are, the challenges, and how the digital workforce is being integrated into the human one.
Tags : 
    
Automation Anywhere APAC
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Much has already been said and written about the infiltration of robotic process automation (RPA) and intelligent automation (IA) technologies into the workforce. In truth, it’s taken the corporate world a while to test, trust and commit to automation at work. To understand how far APAC/ANZ markets have advanced towards acting on these opportunities, the Shared Services and Outsourcing Network (SSON) surveyed the market and found that across the region corporations were forward thinking in building for scale, trusting technology and recognising the need to incorporate robotics into both IT infrastructure and enterprise strategy. This report explains how enterprises across APAC/ANZ are staying ahead of the global wave of RPA, the most popular solutions they are choosing, who the preferred consultants or 'integrators' are, the challenges, and how the digital workforce is being integrated into the human one.
Tags : 
analyst, artificial intelligence, intelligent automation, rpa
    
Automation Anywhere APAC
Published By: AWS     Published Date: Aug 23, 2018
AWS supports healthcare organizations with HIPAA Eligible Services and the AWS Healthcare Compliance program. AWS products and services are being used by many customers that handle electronic patient health information (PHI) to build solutions that meet HIPAA and HITRUST regulatory requirements for cloud-based workloads. In this webinar, you’ll learn how AWS HIPAA Eligible Services can help you build secure workloads to handle PHI in compliance with HIPAA and HITRUST standards. AWS Healthcare experts will be joined in this webinar by AWS Partner Network (APN) Partners ClearDATA and Cloudticity.
Tags : 
    
AWS
Published By: AWS     Published Date: Aug 15, 2018
Earning and keeping your customer’s trust is one key to long-term success. In today’s digital world, your customers expect product and service innovations at an increasingly rapid pace. At the same time, customer privacy and data security are under close scrutiny. These trends help to explain why organizations are migrating to Amazon Web Services (AWS): to benefit from the agility, scalability, and security that it offers. AWS has always put cloud security first. This security-centric approach not only helps you more effectively protect your data on AWS, but can also help you meet security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 15, 2018
"To provide trusted identities and secure transactions to your customers, you want a flexible, scalable monitoring solution that offers a unified view on the Amazon Web Services (AWS) cloud. Learn how Entrust Datacard can help your organization quickly identify, resolve, and prevent issues by using a cloud-native platform to deliver seamless customer experiences every time. Watch our on-demand webinar and gain valuable insights into: • How to use a DevOps approach to monitoring • The best practices to scale your monitoring solutions • How Entrust Datacard monitors trace, syslog and metric data from sources like Amazon CloudWatch, Application Load Balancer, and Amazon Aurora"
Tags : 
    
AWS
Published By: Centrify Corporation     Published Date: Apr 13, 2018
A Zero Trust approach to security requires a combination of Identity Services to deliver identity assurance, trusted endpoints, conditional policy and least privilege. This guide identifies the specific capabilities you need within four key areas of identity and helps you compare capabilities across major vendors with respect to Application Services, Endpoint Services, Infrastructure Services and Analytics Services.
Tags : 
    
Centrify Corporation
Published By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : 
cisco, trustsec, tei, total economic impact, network, networking, wireless
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
When it comes to placing your missioncritical systems and applications in the cloud, do you know what’s behind the scenes? Do you know if your data is secure? Who do you trust? This edition of Unleashing IT highlights the best of the best: The strategies and Cisco Powered services providers that deliver on the promise of enterprise-class clouds.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
To better understand the benefits, costs, and risks associated with Cisco TrustSec, Forrester interviewed two companies. Company A is an organization that provides senior housing for over 22,000 residents in the US. This organization used Cisco TrustSec to provide highly secure segmented mobile network services to its residents. Company B is an international packaging and paper group company experiencing rapid growth. It used Cisco TrustSec as an innovative solution to quickly integrate the infrastructure of new acquisitions into its own and standardize security architecture across its wide area network (WAN) globally. While the case study will talk about the experiences of these two companies, the financial analysis focuses on the impact that Cisco TrustSec had on one organization.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
To better understand the benefits, costs, and risks associated with Cisco TrustSec, Forrester interviewed two companies. Company A is an organization that provides senior housing for over 22,000 residents in the US. This organization used Cisco TrustSec to provide highly secure segmented mobile network services to its residents. Company B is an international packaging and paper group company experiencing rapid growth. It used Cisco TrustSec as an innovative solution to quickly integrate the infrastructure of new acquisitions into its own and standardize security architecture across its wide area network (WAN) globally. While the case study will talk about the experiences of these two companies, the financial analysis focuses on the impact that Cisco TrustSec had on one organization.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Every day more businesses are using the cloud to get work done. And for good reason. With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses— just like yours—to get work done from any device, any time. Read this eye-opening e-book to find out: Why 79% of businesses trust the cloud How business-class cloud services use high-level encryption tech to protect every file and document Why 79% of IT pros say it’s people, not technology, that cause security gaps.
Tags : 
cloud, cloud security, encryption, security, mobility
    
Citrix ShareFile
Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
Download this whitepaper to learn 5 reasons why a white-labeled cloud partnership makes sense. 1) Maintain and evolve your brand 2) Gain all of the skill sets and infrastructure of a cloud organization, without building them from the ground up 3) Be the trusted advisor to your customers 4) Wrap unique services around the cloud platform and drive additional value to your customers 5) Launch into the world of consumption-based revenue and drive a long-term run rate
Tags : 
    
Concerto Cloud Services
Published By: DataStax     Published Date: Mar 10, 2017
Banks are at an inflection point. According to a recent research by Viacom, 1 in every 3 U.S. consumers are open to switching banks in the next 90 days. Financial services companies need to break through the competition to gain customer trust and loyalty. Building a 360° view of the customer can help banks grow customer retention and loyalty, upsell high margin products and provide compelling interactions. However, this is no easy task as complexity increases when retail banks engage their customers across multiple channels and financial products. Gaining visibility into every customer interaction, across your business silos, and with every engagement channel is critical to making the right decisions to deliver amazing customer experiences. This white paper examines the challenges Financial Services Institutions (FSIs) face when building a 360° view of the customer to transform their customer experience and how to overcome them.
Tags : 
    
DataStax
Published By: Datastax     Published Date: Apr 04, 2017
Banks are at an inflection point. According to a recent research by Viacom, 1 in every 3 U.S. consumers are open to switching banks in the next 90 days. Financial services companies need to break through the competition to gain customer trust and loyalty. Building a 360° view of the customer can help banks grow customer retention and loyalty, upsell high margin products and provide compelling interactions. However, this is no easy task as complexity increases when retail banks engage their customers across multiple channels and financial products. Gaining visibility into every customer interaction, across your business silos, and with every engagement channel is critical to making the right decisions to deliver amazing customer experiences. This white paper examines the challenges Financial Services Institutions (FSIs) face when building a 360° view of the customer to transform their customer experience and how to overcome them.
Tags : 
datastax, competition, personalization, customer loyalty
    
Datastax
Published By: Dell EMC     Published Date: May 29, 2015
EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together - This Analyst Report addresses the challenge of managing and administering both on-premises private cloud and off-premises public cloud models together. The EMC Enterprise Hybrid Cloud solution simplifies deployment of a hybrid cloud operating model, enabling IT to become a broker of trusted cloud services sourced from on-prem private clouds and off-prem public clouds, enabling IT to support the ever-expanding set of workloads their business requires.
Tags : 
cloud service, applications, workload, big data, software, hardware, portal, productivity
    
Dell EMC
Published By: Dell EMC     Published Date: Jul 27, 2015
EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together - This Analyst Report addresses the challenge of managing and administering both on-premises private cloud and off-premises public cloud models together. The EMC Enterprise Hybrid Cloud solution simplifies deployment of a hybrid cloud operating model, enabling IT to become a broker of trusted cloud services sourced from on-prem private clouds and off-prem public clouds, enabling IT to support the ever-expanding set of workloads their business requires.
Tags : 
enterprise hybrid cloud, cloud solutions, it solutions, private cloud, hybrid cloud operating model, cloud services
    
Dell EMC
Published By: Dell Software     Published Date: Oct 03, 2013
A CIO’s Guide: Building Business Trust with Application Performance Monitoring, a white paper prepared by EMA, highlights the benefits of an APM solution in delivering quality services and helping IT organizations build track records of operational excellence. Download it today.
Tags : 
management solution, mobile applications, performance monitoring, apm, dell foglight, technology, knowledge management, enterprise applications
    
Dell Software
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Entrust Datacard     Published Date: Nov 10, 2009
This white paper examines the elements that comprise a high quality PKI and the advantages of outsourcing to Entrust Managed Services PKI.
Tags : 
pki, digital certificates, hosted certificates, managed services pki, managed certificates, authentication, digital signature, entrust
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security. Entrust IdentityGuard Cloud Services provide digital certificate and identity management solutions that bring together all certificate services, tools and security under a single cloud-based service. It’s a simple, strong and easy solution to issue and manage identities through their lifecycle via the cloud.
Tags : 
entrust, digital certificates, cloud services, identity management, security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials
Tags : 
entrust, identityguard, smart credentials, certificate based security, security, pki software, cloud, networking
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Certificate Discovery & Management Solution
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Securing Mobile Identities & Devices
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
Entrust Datacard
Start   Previous   1 2 3 4    Next    End
Search