CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

mba

Results 301 - 325 of 373Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Jan 23, 2013
A criminal industry develops. This paper explores bot evolution, its global prevalence, whos at risk, a look forward and combating bots using Global Threat Intelligence.
Tags : 
botnets, bots, defense in depth, threat prevention, advanced attacks, malware, access control, anti spam
    
McAfee
Published By: Kronos Incorporated     Published Date: Jan 23, 2013
Join Mollie Lombardi, Vice President of Aberdeen Group's Human Capital Management practice as she shares the latest research findings on how workforce management solutions can help the SMB improve productivity and business results.
Tags : 
it trends, big data, workforce management, cloud, cloud computing, hrms, small business, hris
    
Kronos Incorporated
Published By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : 
compliance, security, policy, group policy, access control, security management, desktop management
    
Lumension
Published By: Bronto     Published Date: Jan 03, 2013
While most marketers would agree that the more data we have, the better; it's important we focus on collecting the "right" data and using it sensibly to execute effective email, mobile, and social marketing campaigns.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto
Published By: FireEye     Published Date: Nov 27, 2012
Combating the Attack of Choice for Cybercriminals
Tags : 
cybercriminals, fireeye, phishing attacks, apt, advanced persistent threat, security, business technology
    
FireEye
Published By: Damballa     Published Date: Nov 13, 2012
How Advanced Malware Morphs to Remain Stealthy and Persistent
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
    
Damballa
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
    
Damballa
Published By: Lumension     Published Date: Sep 18, 2012
Using Intelligent Whitelisting to Effectively and Efficiently Combat Today's Endpoint Malware.
Tags : 
intelligent white listing, webcast, malware, windows security, business technology
    
Lumension
Published By: Lumension     Published Date: Sep 18, 2012
A Technical Paper on Lumension Intelligent Whitelisting
Tags : 
intelligent white listing, lumension, malware, endpoint, business technology
    
Lumension
Published By: Lumension     Published Date: Sep 18, 2012
Beyond Compliance: Combating Threats with Endpoint Configuration Management
Tags : 
suite, endpoint configuration, threats, compliance, lumension
    
Lumension
Published By: FireEye     Published Date: Sep 11, 2012
How to Stop Spear Phishing Attacks: Combating the Attack of Choice for Cybercriminals
Tags : 
fireeye, phishing, cybercrimicals, security, business technology
    
FireEye
Published By: Asure Software     Published Date: Sep 10, 2012
Key financial stakeholders for Lowenstein Sandler were looking for a solution for tracking employee time that would eliminate paperwork and increase efficiency and productivity. As a result, they settled on AsureForce Time & Labor Management.
Tags : 
time and labor management, human resources, payroll solutions, web-based solutions, workforce management
    
Asure Software
Published By: IBM     Published Date: Aug 07, 2012
Leading companies applying? Predictive intelligence? To proactively mitigate and manage complexity-fraught risks, while bringing value to their bottom line and their brand.
Tags : 
combating, combat, risk, predictive, intelligence, companies, applying, proactively
    
IBM
Published By: VASCO     Published Date: Jul 12, 2012
In recognizing the evolution of the authentication market and the demand for more convenient, portable, and cost-effective methods of adding security to all online applications, VASCO has embarked on a mission to add authentication on any platform, at any time, for any application. Read more to find out how to transform multi-factor authentication from "something you have" to "something you already have."
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security, access control, security policies
    
VASCO
Published By: eFax     Published Date: Jul 05, 2012
As IT managers urgently seek to reduce the fixed costs associated with running their in-house fax servers, cloud-based faxing emerges as a highly effective tool for combating the unpredictability of fluctuating infrastructure costs.
Tags : 
fax server, outsource, outsourced applications, cloud, cloud-based, affordable faxing, it costs, it budget
    
eFax
Published By: Oracle     Published Date: May 22, 2012
With the growing number of channels for consumers to connect with your products from store kiosks to mobile devices and social networks, it is increasingly important that they are experiencing the the same consistent brand experience regardless of the channels they choose. This whitepaper describes 3 customer experience features to help guide your decisions about technology, organizational structure, and internal process.
Tags : 
oracle, multichannel integration, marketing, customer experience
    
Oracle
Published By: LandslideCRM     Published Date: May 16, 2012
This whitepaper chronicles Boston Mutual Life Insurance Company, the first sales organization to embark on CRM 3.0, bypassing CRM 2.0, representing a paradigm shift in strategy, people, and technology management. We outline how this bridged approach was achieved and how your organization can do the same.
Tags : 
crm demo, crm solution, crm software, account management, contact management, opportunity management, deal management, lead management
    
LandslideCRM
Published By: Adaptive Planning     Published Date: Apr 25, 2012
In describing what forecasters are trying to achieve, Saffo outlines six simple, commonsense rules that smart managers should observe as they embark on a voyage of discovery with professional forecasters: Map a cone of uncertainty, look for the S curve, embrace the things that don't fit, hold strong opinions weakly, look back twice as far as you look forward, and know when not to make a forecast.
Tags : 
adaptive, business, finance, forecasting, business planning, budget
    
Adaptive Planning
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection, access control
    
IBM Software
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence
    
Q1 Labs
Published By: Trend Micro Inc.     Published Date: Sep 21, 2011
Fake Antivirus (AV) or rogue antivirus software has been prevalent in the market today and has affected millions of computers. This document aims to educate users on how Fake AV arrives on a computer's system and what are the available Trend Micro solutions to combat this threat.
Tags : 
tend micro, fake antivirus, technology, software, anti spyware, anti virus, application security, internet security
    
Trend Micro Inc.
Published By: Micro Focus     Published Date: Aug 17, 2011
Migrating apps to more contemporary platforms is a proven modernization strategy that reduces costs and makes IT more agile in supporting business.
Tags : 
micro, cobol, rumba, fr arbeit, rumba, server express, server express, express server
    
Micro Focus
Published By: Micro Focus     Published Date: Aug 17, 2011
Rehosting preproduction testing, while the production system stays on the mainframe, is a proven approach to reduce operating costs & improve quality
Tags : 
micro, cobol, rumba, fr arbeit, rumba, server express, server express, express server
    
Micro Focus
Published By: Micro Focus     Published Date: Aug 17, 2011
The cost savings delivered by enterprise application migration can fund business transformation projects without a net increase in IT spend.
Tags : 
micro, cobol, rumba, fr arbeit, rumba, server express, server express, express server
    
Micro Focus
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search