CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

web app

Results 151 - 175 of 999Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Aug 08, 2018
Watch this webinar replay with representatives from Workday and San Mateo County of California to learn about government organizations moving administrative applications to the cloud. Learn best practices for funding, planning, and implementing cloud applications and the benefits of a system that provides a single source of data across all departments.
Tags : 
government, cloud, cloud applications, implementation
    
Workday
Published By: DocuSign UK     Published Date: Aug 08, 2018
HR is all about serving your people, whether they are shiny new recruits or lifetime employees. But all too often, outdated and cumbersome paper-based processes get in the way of those goals. Discover how HR departments are using electronic signatures to streamline the on-boarding experience, increase employee satisfaction, and focus staff away from mundane tasks. Watch this webinar and discover how eSignatures can help you: - Simplify the new hire process: NDAs, offer letters, background checks and on-boarding - Streamline compensation and benefits: comp plans, stock option grants, and benefit plan notices - Reduce admin overheads: holiday requests, contractor agreements, and internal approvals - Ensure compliance: ISO compliance, new hire check-offs and audit support
Tags : 
    
DocuSign UK
Published By: Workday     Published Date: Aug 07, 2018
The HR strategy at Zappos may be highly unorthodox, but it’s working. This webinar, sponsored by Workday, explores how Zappos transformed its HR experience by entrusting employees, recruiting talent that understands the company’s culture, and more.
Tags : 
zappos, hr experience, company culture
    
Workday
Published By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
"Digital transformation is putting tremendous pressure on IT security. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough. Get the CISO POV in this on-demand webcast and learn how to: • Minimize the attack surface • Expand visibility of assets beyond the perimeter • Enhance security practices to accommodate more dynamic IT environments"
Tags : 
cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
    
Tenable
Published By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
    
BlackLine
Published By: AWS     Published Date: Aug 06, 2018
Learn more Salesforce and Amazon Web Services at http://amzn.to/2zhcn1v. Building and releasing cutting-edge applications quickly can be difficult when you lack proper tooling and integrated customer data. Salesforce Heroku delivers a cloud-native, developer-friendly platform that streamlines application development by integrating formerly siloed customer data and removing the burden of infrastructure management, allowing developers to focus their attention solely on creating customer-centric applications. Join the upcoming webinar to hear how the Financial Times builds customer-driven applications with faster cycle times with Heroku and AWS.
Tags : 
    
AWS
Published By: XpertHR     Published Date: Aug 02, 2018
When it comes to managing the risk of sexual harassment claims, today’s headlines and news stories make it abundantly clear that it’s not just what you’re doing today that may create risk—but what you’ve done, or haven’t done, in the past. XpertHR’s recent Sexual Harassment Survey revealed a wide range of responses from employers hoping to tackle the issue in 2018. New and vastly varying federal and state laws challenge HR professionals to remain on top of regulatory requirements related to policies, training and other compliance issues. XpertHR’s webinar, “Coming Soon: 50 States, 50 Sexual Harassment Training Laws,” will help you ensure you’re prepared, compliant and poised to act appropriately amid a growing number of regulations and continually emerging claims. Get tips from expert attorneys who will help you get up-to-date on: ? New training requirements for private sector employers in New York and varying requirements in other states ? Why high-quality harassment training i
Tags : 
sexual harassment, compliance training, #metoo, harassment training, harassment claim, compliance, harassment, employee management
    
XpertHR
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Most companies would love to move enterprise applications to the public cloud and cut the costs, complexities, and limitations of current infrastructure. Major public cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud have done well in enabling web, mobile, and content applications in the cloud. These are cloud-native applications designed to use cloud “object” storage, and object storage is very popular for use cases such as backup and disaster recovery. However, enterprise applications typically require “block” storage. Although native cloud block storage exists, it has several shortcomings, particularly around reliability, durability, and lack of data mobility. So, enterprise applications have largely stayed on-premises or in private clouds. Now there’s an innovative new way to move enterprise applications to the public cloud while actually reducing risks and tradeoffs. It’s called multicloud storage, and it’s an insanely simple, reliable, secure w
Tags : 
    
Hewlett Packard Enterprise
Published By: MuleSoft     Published Date: Jul 13, 2018
"IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: -Best practices for modernizing legacy SOA web services -How to think about re-architecting monolithic applications into microservices -The role that APIs play in driving an effective legacy modernization strategy -The bank’s legacy modernization strategy, and how they used Anypoint Platform"
Tags : 
    
MuleSoft
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Forrester has published the results of its research evaluating the 10 most significant web application firewall (WAF) vendors on 33 important criteria. Akamai is proud to be recognized as one of three Leaders in WAFs, with top rankings in both the current offering and strategy categories.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies
Published By: Reputation.com     Published Date: Jun 29, 2018
Creating competitive advantage starts with a sound digital strategy. In a 2017 survey of healthcare consumers across the U.S. from a representative range of demographic groups, we found that 88% of consumers begin their search for healthcare providers online. Consumers rely on search engines and review sites to steer their decisions about where to go for care. What consumers read about you online heavily influences their decision-making. Your reputation is defined at every touchpoint a potential patient has with your doctors and organization on the web — from the doctor or location listing, to patient rating and reviews, to finding the right doctor and reading profiles on your website. Done well, online reputation management (ORM) enables your providers to generate a high volume of representative reviews from the “silent majority,” while providing valuable insights to improve patient experience, make operational improvements and drive new patient appointments.
Tags : 
    
Reputation.com
Published By: Box     Published Date: Jun 22, 2018
There’s more to your content than you might think. Beyond the differences of enterprise vs. web vs. cloud content management, new changes in intelligent machine-to-machine apps are reinventing the content management market. In this expert e-guide, we explore a flexible, API-led approach to cloud-based content management and collaboration. Learn about a platform designed to enable you to: • Power content with machine learning and metadata • Drive intelligent capabilities like smart search • Modernize content-based processes • And more
Tags : 
    
Box
Published By: Tenable     Published Date: Jun 19, 2018
CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
Tags : 
cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
    
Tenable
Published By: Applause Israel     Published Date: Jun 19, 2018
APPLAUSE CASE STUDY ACCELLION THE INCREASING IMPORTANCE AND COMPLEXITY OF DIGITAL EXPERIENCES Maintaining a strong digital presence is critical as digital experiences are now the front door for your brand. Websites, mobile apps, and connected devices are all different ways for you to connect with your customers on a deeper level, and foster a stronger relationship of trust and loyalty. While you now have a wide-open avenue to reach customers more effectively, you also need to account for a whole new level of complexity, especially in the mobile space. Millions of people can download the same mobile app and have entirely unique experiences. This is a result of how fragmented the digital world has become. ScientiaMobile counted 45,000 different device profiles on the market today, and estimates that this rate of fragmentation will only increase heading into the future. On top of this variability is the wide range on contexts in which your customers can be relying on your mobile app to wo
Tags : 
    
Applause Israel
Published By: Applause Israel     Published Date: Jun 19, 2018
study by UPS and comScore found that 53% of shoppers who don’t use retailers’ mobile apps state it’s because they like using the website better. These shoppers see no benefit from installing these apps, as they provide an inferior experience with no added benefits. Looking at the Apple and Google Play App Stores, a large amount of retailers have apps with very few reviews, and some don’t even have a mobile app. Another problem is the performance of retail apps. 61% consumers expect an app to load in under 4 seconds according to research by Dynatrace. In its study, only one retailer made it under that threshold. And that is just purely opening the app. What is the experience once consumers get past that point?
Tags : 
    
Applause Israel
Published By: Rokt     Published Date: Jun 18, 2018
In search of the moment when consumer engagement is at its highest, brands have chosen to focus on search and social media. But – as this study proves – the rush of retail therapy is no myth, with the process of shopping making consumers considerably happier and more receptive than other online activities. This report explores the mindset individuals experience when shopping – the Transaction MomentTM. As uncovered in this research, this mindset presents a much sought after and undiscovered opportunity in digital customer acquisition. It has been well documented that the thrill of making a purchase causes a rush1 of dopamine, resulting in a powerful sense of achievement that leaves consumers open to buy again. This conclusion is supported by Rokt analytics — which reveals consumers are up to 7x more likely to engage with related offers in the Transaction Moment. This report and findings are relevant to many in the marketing and e-commerce industry. Whether the objective is to acquire
Tags : 
transaction marketing, digital marketing, website monetization, consumer engagement, happy, moment, rokt
    
Rokt
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Forrester Research     Published Date: Jun 11, 2018
There’s an alarming digital divide within many companies. Marketers are developing nimble software to give customers an engaging, personalized experience, while IT departments remain focused on the legacy infrastructure. The front and back ends aren’t working together, resulting in appealing websites and apps that don’t quite deliver. We’ve arrived at this misalignment for understandable reasons. Previously, most chief information officers (CIOs) were hired to digitize and bring order to companies’ internal systems and processes. They saw websites as marketing channels and were happy to let chief marketing officers (CMOs) oversee that province of technology. They had, and still have, plenty to do just to keep internal operations running smoothly. Marketers soon got into the habit of developing not just content, but also software programs to better reach and transact with customers. But now that websites and apps are becoming cornerstones of the business, the stakes are too high to al
Tags : 
cio, marketers, business, digital, customers
    
Forrester Research
Published By: IBM     Published Date: Jun 04, 2018
"Today’s business users want to use all types of data to create compelling, shareable visualizations. But charts and graphs alone may not convey all the information, especially when they are part of a complex series. An audience can best understand analytic results when those results tell a story that connects all the pieces together. The right visuals can also reinforce the lessons buried in the data. Stories are powerful mechanism to communicate with people. Stories stick and make insights actionable, so it goes without saying that storytelling is a very powerful (soft) skill. In this webinar, you'll learn how to effectively apply storytelling best practices to get your message across. Especially in the world of BI, it is getting more and more important to effectively communicate business results. Watch this webinar to learn how to use IBM Cognos Analytics to: · Create the important elements of a good story · Put the data in context · Select the best type of ch
Tags : 
data analytics, data storytelling, business intelligence
    
IBM
Published By: IBM     Published Date: Jun 04, 2018
"What would you do if you didn’t have to rely on disparate analytics solutions to meet the needs of business users while following the rules of IT? View this 'Charting Your Analytical Future' webinar to learn about a world of innovation and independence for users that does not limit the confidence and controls of IT. With the cognitive-guided self-service features available in IBM business analytics solutions, more users than ever before can get the answers they need. Next-generation business analytics capabilities make it possible to access relevant data, prepare it for analysis and understand performance. But it doesn’t stop there. Users can package the results in a visually-appealing format and share them throughout the organization. Don’t miss this opportunity to hear how you can: * Benefit from advanced analytics without the complexity * Operationalize insights and dashboards from a collection of trusted data sources * Tell your story with rich visualizations and geospati
Tags : 
business analytics, analytics solutions
    
IBM
Published By: Cisco EMEA     Published Date: Jun 01, 2018
It’s time to make working together what it should be—intuitive. Cisco Webex Teams enables teams to meet, create and communicate continuously on a single easy-to-use platform. Tools adapt, so teams don’t have to. The same page? Everyone is on it, no matter what device or apps they like to use or where they are. Innovation and work keep moving forward, even after a meeting ends. And everyone enjoys an exceptional experience safeguarded by enterprise-grade security no matter how big the business scales.
Tags : 
cisco, webex, collaboration
    
Cisco EMEA
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search