CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information access

Results 1 - 25 of 199Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Grab a cup of coffee and tune in to hear Alan Meirzon, Director – Chief Information Security Office at Deutsche Bank share his experience using Cisco Umbrella. Alan discusses how his team uses Umbrella as the first line of defense against threats on the internet. He shares best practices and the outcomes his team has seen using DNS-layer security to protect users wherever they access the internet. View this video to hear security best practices and lessons learned from Alan, a security veteran.
Tags : 
    
Cisco Umbrella EMEA
Published By: ttec     Published Date: Jul 24, 2019
The pace of automation in the contact center is accelerating as it moves from IVR and routing to artifi cial intelligence and bots. With the digitization of contact center operations, the status quo is being upended. Technological advances in robotic process automation (RPA), AI, and machine learning (ML) for both customer and employee interactions are literally changing the face of customer care. Simple, repetitive tasks don’t need a person to do them anymore. Chatbots and self-service knowledgebases put the control in customers’ hands to resolve their own issues quickly. Information from across the business can more easily be accessed, integrated, and analyzed to streamline backoffi ce and customer-facing functions. Companies are creating digital worker factories that leverage AI and ML to improve their business.
Tags : 
    
ttec
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
US ground forces handle massive amounts of information and data while working under unpredictable conditions. These conditions don’t always allow military intelligence analysts access to a technologically reliable way to share information.  AI can help develop a comprehensive intelligence picture and a true sense of cognitive situational understanding (CSU). These technologies can help analyze the massive amounts of data the military receives. And because AI programs are constantly adding new capabilities and tools, they can help the military prepare for the battlefield of the future. Read how. 
Tags : 
    
Group M_IBM Q2'19
Published By: Epicor     Published Date: May 21, 2019
Enterprise resource planning (ERP) software is the backbone of modern manufacturing information systems, enabling the digital transformation that’s changing operations and customer expectations. As the movement toward a digital workplace evolves, your ERP system must keep pace. Epicor commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) of deploying Epicor ERP. Several manufacturers using Epicor ERP found: • Faster access to data and improved real-time visibility enabled better decision-making • Improved multi-company operational efficiency • Increased competitiveness with faster turnaround of customer quotes and improved pricing accuracy • Increased versatility with the Epicor ERP cloud offering • Access to deep expertise in manufacturing best practices Read the study to find out how else Epicor ERP has helped manufacturers.
Tags : 
    
Epicor
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: Salsify     Published Date: Mar 15, 2019
With over 10,000 SKUs across two divisions and multiple brands, seasonal and home decor manufacturer and distributor The Gerson Companies needed a better way to organize product market data and expand across hundreds of retailers. After investing in product experience management, the company was able to centralize product information in Salsify and empower its network of independent retailer with the data needed to sell successfully online. Featuring: Orin Borgelt, Chief Technology & Sales Officer Learn more about the step-by-step approach The Gerson Companies team took to take control of their data and increase sales on the digital shelf: Build a centralized, flexible, and accessible source of production information to arm all divisions of Gerson with the most up-to-date product inventory. Meet requirements for retailers. The Gerson Companies uses Salsify to syndicate product information across the digital shelf for their B2C divisions. Develop a new sales channels: Gerson uses Sa
Tags : 
    
Salsify
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel® such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. To find out more on how Cisco can help with these challenges download this white paper today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Sage EMEA     Published Date: Jan 29, 2019
Transform your finance operations into a strategic, data-driven engine Data inundation and information overload have burdened practically every largescale enterprise today, providing great amounts of detail but often very little context on which executives can act. According to the Harvard Business Review,1 less than half of an organisation’s structured data is actively used in making decisions. The burden is felt profoundly among finance executives, who increasingly require fast and easy access to real-time data in order to make smart, timely, strategic decisions. In fact, 80% of analysts’ time is spent simply discovering and preparing data, and the average CFO receives information too late to make decisions 24% of the time.2
Tags : 
    
Sage EMEA
Published By: Mimecast     Published Date: Dec 20, 2018
Your corporate email is a vital repository of critical business information. In the age of the cloud and mobility, empowering users accessing that information quickly and efficiently can’t be an afterthought. You may think you can get by with your old email archive, but your organization and your employees will suffer without the latest technology. Learn more in this TechTarget whitepaper Email Archiving: It’s Time for an Update. Download now to get the facts about: How archaic email archives slow down productivity and increase IT help desk burdens Why return-on-investment for old archiving solutions hurt your bottom line Ways poor e-discovery capabilities leave you vulnerable in legal challenges
Tags : 
    
Mimecast
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Mobile. It’s where things are going in life and in business. Your coworkers and customers are 2-5 times more likely to access information on their phone than their PC.* This ebook explores the mobile trends that are transforming how business gets done. Plus, it offers real-world examples of how companies like yours are using the new accessibility to their advantage. Get those forms and approvals on those phones and tablets! Imagine NDAs, invoices, project proposals, purchase orders, time sheets, RFPs, permissions, reviews, signoffs – you know, those tiresome paper pushing processes – all accessible, transferable, reviewable, approvable, and actionable via any digital device."
Tags : 
    
DocuSign UK
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
    
MobileIron
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. The age of perimeter-only security is over. Find out more today about how Cisco can help.
Tags : 
    
Cisco Umbrella EMEA
Published By: SAS     Published Date: Oct 03, 2018
Because terrorists and other criminals are already using technology to carry out their missions, intelligence professionals need to access all available, appropriate information, to extract important elements and process, analyze and disseminate it quickly to keep ahead of potential threats. The scale, complexity and changing nature of intelligence data can make it impossible to stay in front without the aid of technology to collect, process and analyze big data. This paper describes a solution for how this information can be quickly and safely shared with access based on a user's organizational responsibilities and need to know.
Tags : 
    
SAS
Published By: VMware     Published Date: Oct 02, 2018
The journey towards upgrading IT infrastructure is fraught with buzzwords and misinformation. In this special report, Gartner identifies the key challenges faced by infrastructure and operations leaders and provides strong recommendations for optimizing IT costs and investments. Submit the form to access the report and discover the ‘seven deadly sins’ I&O leaders must avoid in order to capture efficiency gains and produce strategic, outcome-driven results.
Tags : 
    
VMware
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
    
Group M_IBM Q418
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Zendesk Ltd     Published Date: Sep 11, 2018
Customers have caught on that support interactions are getting better. When they reach out, they’ve come to expect an instant response that says “we’re here for you”. When they want information, it’s expected to be accurate, up-to-date, and easily accessible. Essentially, they come to expect efficiency during support interactions. As a result, businesses are becoming more cognizant of their self- service offerings. Customers want to be left feeling empowered; it’s even better when they can do so on their own. Self-service saves time for agents, cuts down on organizational costs, and leaves the customer with a positive outlook of a brand. This eBook delves into how AI can enhance your customer self-service offerings with automatically-generated knowledge bases, content cues for your service agents, and chatbots.
Tags : 
customer service, customer experience, artificial intelligence, chatbots, self-service
    
Zendesk Ltd
Published By: Splunk     Published Date: Aug 21, 2018
SIEM (security information and event management) software offers a lot of promise, but legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Organizations today require access to analytics-driven SIEMs that combine a big data platform that is optimized for machine data with advanced analytics, threat detection, monitoring tools, incident response tools and multiple forms of threat intelligence. Download your complimentary copy of “The Six Essential Capabilities of an Analytics-Driven SIEM” and learn how to dramatically improve your security posture, advanced threat detection and incident response.
Tags : 
    
Splunk
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: Dell     Published Date: Aug 08, 2018
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. In July 2017, Dell commissioned Forrester to conduct a study of the 21st century workforce and how their new habits, attitudes, and workstyles are reshaping the world of work. With more personas in a single organization to cater to, businesses are failing to deliver against workforce demands. To get their tasks done, workers are circumventing security policies to get what they want, in their moment of need. Organizations have to understand the different behaviors across
Tags : 
    
Dell
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search