CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

trust services

Results 26 - 50 of 95Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Every day more businesses are using the cloud to get work done. And for good reason. With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses— just like yours—to get work done from any device, any time. Read this eye-opening e-book to find out: Why 79% of businesses trust the cloud How business-class cloud services use high-level encryption tech to protect every file and document Why 79% of IT pros say it’s people, not technology, that cause security gaps.
Tags : 
cloud, cloud security, encryption, security, mobility
    
Citrix ShareFile
Published By: Datastax     Published Date: Apr 04, 2017
Banks are at an inflection point. According to a recent research by Viacom, 1 in every 3 U.S. consumers are open to switching banks in the next 90 days. Financial services companies need to break through the competition to gain customer trust and loyalty. Building a 360° view of the customer can help banks grow customer retention and loyalty, upsell high margin products and provide compelling interactions. However, this is no easy task as complexity increases when retail banks engage their customers across multiple channels and financial products. Gaining visibility into every customer interaction, across your business silos, and with every engagement channel is critical to making the right decisions to deliver amazing customer experiences. This white paper examines the challenges Financial Services Institutions (FSIs) face when building a 360° view of the customer to transform their customer experience and how to overcome them.
Tags : 
datastax, competition, personalization, customer loyalty
    
Datastax
Published By: DataStax     Published Date: Mar 10, 2017
Banks are at an inflection point. According to a recent research by Viacom, 1 in every 3 U.S. consumers are open to switching banks in the next 90 days. Financial services companies need to break through the competition to gain customer trust and loyalty. Building a 360° view of the customer can help banks grow customer retention and loyalty, upsell high margin products and provide compelling interactions. However, this is no easy task as complexity increases when retail banks engage their customers across multiple channels and financial products. Gaining visibility into every customer interaction, across your business silos, and with every engagement channel is critical to making the right decisions to deliver amazing customer experiences. This white paper examines the challenges Financial Services Institutions (FSIs) face when building a 360° view of the customer to transform their customer experience and how to overcome them.
Tags : 
    
DataStax
Published By: Lightower     Published Date: Jan 26, 2017
Lightower's comprehensive suite of fiber-based solutions is trusted by over 40% of Fortune 500® companies with their mission critical networking needs. And with over 33,000 route miles of all-fiber network and over 22,000 service locations, Lightower provides the custom connectivity services to ensure optimal application and business performance. Watch our video to discover the industries Lightower serves and learn how the Lightower Limitless Network at the center of everything you do.
Tags : 
    
Lightower
Published By: Cisco     Published Date: Dec 21, 2016
When it comes to placing your missioncritical systems and applications in the cloud, do you know what’s behind the scenes? Do you know if your data is secure? Who do you trust? This edition of Unleashing IT highlights the best of the best: The strategies and Cisco Powered services providers that deliver on the promise of enterprise-class clouds.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
To better understand the benefits, costs, and risks associated with Cisco TrustSec, Forrester interviewed two companies. Company A is an organization that provides senior housing for over 22,000 residents in the US. This organization used Cisco TrustSec to provide highly secure segmented mobile network services to its residents. Company B is an international packaging and paper group company experiencing rapid growth. It used Cisco TrustSec as an innovative solution to quickly integrate the infrastructure of new acquisitions into its own and standardize security architecture across its wide area network (WAN) globally. While the case study will talk about the experiences of these two companies, the financial analysis focuses on the impact that Cisco TrustSec had on one organization.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
To better understand the benefits, costs, and risks associated with Cisco TrustSec, Forrester interviewed two companies. Company A is an organization that provides senior housing for over 22,000 residents in the US. This organization used Cisco TrustSec to provide highly secure segmented mobile network services to its residents. Company B is an international packaging and paper group company experiencing rapid growth. It used Cisco TrustSec as an innovative solution to quickly integrate the infrastructure of new acquisitions into its own and standardize security architecture across its wide area network (WAN) globally. While the case study will talk about the experiences of these two companies, the financial analysis focuses on the impact that Cisco TrustSec had on one organization.
Tags : 
    
Cisco
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: Salesforce     Published Date: Jan 15, 2016
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices, knowledge management, enterprise applications, human resource technology, business technology
    
Salesforce
Published By: Salesforce     Published Date: Dec 29, 2015
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices, knowledge management, enterprise applications, data management, human resource technology, business technology
    
Salesforce
Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
Download this whitepaper to learn 5 reasons why a white-labeled cloud partnership makes sense. 1) Maintain and evolve your brand 2) Gain all of the skill sets and infrastructure of a cloud organization, without building them from the ground up 3) Be the trusted advisor to your customers 4) Wrap unique services around the cloud platform and drive additional value to your customers 5) Launch into the world of consumption-based revenue and drive a long-term run rate
Tags : 
    
Concerto Cloud Services
Published By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.
Tags : 
entrust ssl certificates, security, security application, ssl certificates, ssl certificate management, entrust certificate services, access control, application security, authentication, identity management, security management, security policies
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.
Tags : 
entrust ssl certificates, security, security application, ssl certificates, ssl certificate management, entrust certificate services, access control, application security, authentication, identity management, security management, security policies
    
Entrust Datacard
Published By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : 
cisco, trustsec, tei, total economic impact, network, networking, wireless
    
Cisco
Published By: Juniper Networks     Published Date: Oct 19, 2015
Interactive Data is a trusted leader in financial information, delivering a comprehensive set of products and services designed to meet the needs of the front, middle, and back offices at some of the largest and most well-known institutions around the world.
Tags : 
market, data, operations, scale, infrastructure, productivity
    
Juniper Networks
Published By: IBM     Published Date: Oct 06, 2015
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
ibm, services provider, services provider selection, it organizations, it service providers, reduce cost, technology innovation, top ten criteria, it management, wireless, data management
    
IBM
Published By: Dell EMC     Published Date: Jul 27, 2015
EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together - This Analyst Report addresses the challenge of managing and administering both on-premises private cloud and off-premises public cloud models together. The EMC Enterprise Hybrid Cloud solution simplifies deployment of a hybrid cloud operating model, enabling IT to become a broker of trusted cloud services sourced from on-prem private clouds and off-prem public clouds, enabling IT to support the ever-expanding set of workloads their business requires.
Tags : 
enterprise hybrid cloud, cloud solutions, it solutions, private cloud, hybrid cloud operating model, cloud services
    
Dell EMC
Published By: Dell EMC     Published Date: May 29, 2015
EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together - This Analyst Report addresses the challenge of managing and administering both on-premises private cloud and off-premises public cloud models together. The EMC Enterprise Hybrid Cloud solution simplifies deployment of a hybrid cloud operating model, enabling IT to become a broker of trusted cloud services sourced from on-prem private clouds and off-prem public clouds, enabling IT to support the ever-expanding set of workloads their business requires.
Tags : 
cloud service, applications, workload, big data, software, hardware, portal, productivity, project management, service management, cloud computing
    
Dell EMC
Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl, security
    
Symantec
Published By: Polycom     Published Date: Mar 13, 2015
The Dominion Group of Companies offers clients a wide range of professional services, including investment advising, trust services, wealth management, and insurance. Based in Virginia Beach, Virginia, the company has three main offices as well as independent affiliate offices in multiple locations throughout the United States. Dominion is a small but growing company, currently employing 40 people. A recent opportunity for expansion of the trust side of the business required Dominion to branch out from its Virginia Beach headquarters, opening an office in Florida and relocating one of the firm’s principals to that location. A top priority during that transition was maintaining effective communication, despite the distance, to limit any disruption to existing client services and workflows.
Tags : 
investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
Polycom
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, business technology
    
Entrust Datacard
Published By: GeoTrust     Published Date: Oct 06, 2014
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the same, and choosing the right CA is critical to running and maintaining a safe and trusted online business. This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Tags : 
certificate authority, web security, security landscape, online service, trusting relationship, certificate authorities, security
    
GeoTrust
Published By: Entrust Datacard     Published Date: Jul 21, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security.
Tags : 
identity guard, cloud services, trust foundation, communication, transactions, information security, cloud-based service, solution, security, wireless
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : 
identity guard, cloud service, smart credentials, authentication, multipurpose, technology, usb token, mobile, security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
As various types of digital certificates are introduced to an organization, they become more difficult to track and manage — particularly if they’re issued from different certification authorities.
Tags : 
identity guard, cloud service, certificate discovery, management solution, security, data management
    
Entrust Datacard
Start   Previous    1 2 3 4    Next    End
Search