CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

advanced

Results 1 - 25 of 1077Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC Storage     Published Date: Jun 10, 2019
Die Automobilindustrie befindet sich mitten in einer hart umkämpften Übergangsphase, deren letztendliches Ziel darin besteht, innerhalb eines Jahrzehnts vollständig autonome oder „fahrerlose“ Fahrzeuge zu realisieren. Die Größenordnung und Intensität, mit der OEMs und Tier1-Lieferanten Innovationen auf den Markt bringen und gleichzeitig Kosten eindämmen, Risiken mindern, die Produktkomplexität managen und die Compliance aufrechterhalten müssen, bedeuten eine große Herausforderung. Die Entwicklung von Fahrerassistenzsystemen (Advanced Driver Assistance Systems, ADAS), die die Sicherheit von Insassen, Fahrzeugen und Straßen verbessern sollen, bringt revolutionäre Anforderungen an die Engineering-IT-Infrastruktur mit sich–insbesondere für Speicher, bei dem selbst Entry-Level-Kapazitäten in Petabyte gemessen werden. In diesem Whitepaper werden die Infrastruktur-herausforderungen erkundet, vor denen OEMs und Tier1-Lieferanten bei der Entwicklung und Validierung vonADAS-Technologien steh
Tags : 
    
Dell EMC Storage
Published By: IBM     Published Date: Nov 20, 2015
Discover how proficient your organization is at using advanced analytics to transform the way you do business. Take the assessment.
Tags : 
ibm, energy, utilities, analytics, business technology
    
IBM
Published By: Carbon Black     Published Date: Nov 26, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a Kaspersky Lab customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these issues, then your endpoint security products may actually be creating more problems than they solve. Ask these questions and find out for yourself.
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
Published By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
sharepoint, microsoft, workflow, it management
    
K2
Published By: Infor     Published Date: Mar 03, 2017
The goal of warehouse operations is perfect order fulfillment: to deliver exactly the items a customer ordered, on time and with optimal efficiency. The warehouse module of an enterprise resource planning (ERP) solution can help smaller warehouses achieve this goal. But ERP warehouse modules have limitations that can make it smarter for companies with more complex operations to turn to the added capabilities of an advanced warehouse management system (WMS).
Tags : 
enterprise resource planning, erp, erp solutions, enterprise applications
    
Infor
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: TIBCO Software     Published Date: Aug 20, 2019
“How will we use all the data from the smart grid?”
Tags : 
greater efficiency, demand forecasting, advanced analytics, smart meters, predictive analytics, data security
    
TIBCO Software
Published By: Magento     Published Date: Feb 13, 2018
Commerce is permanently altering the way B2B businesses work- from customer acquisition to customer retention, and from order fulfillment to building a relationship with customers. From our experience of working with B2B companies across industries, we have curated a list of 11 most common obstacles to B2B eCommerce success, including: Thinking About eCommerce In Isolation Ignoring Customer Experience No Advanced Analytics Failure Maintain and Improve Systems
Tags : 
    
Magento
Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks, security
    
Dell SecureWorks
Published By: NAVEX Global     Published Date: Oct 18, 2016
This report is an excellent starting point for organisations committed to benchmarking and improving programme effectiveness. To leverage more advanced benchmarks, NAVEX Global offers custom benchmarking options as part of our Integrity DiagnosticsTM and Integrity MetricsTM report service. These services allow you to get apples-to-apples benchmarking for your organisation based on your industry, company size, or other defining factors.
Tags : 
    
NAVEX Global
Published By: Adecco     Published Date: Sep 27, 2017
With the unemployment average decreasing across the nation and new jobs continually evolving, long-term growth projections are promising for the IT industry. As the tech industry booms, so does the tech job market. We took a deep dive into the latest annual job market data from Bureau of Labor Statistics to better understand how both the nation and the IT sector advanced and what this means for the future of tech.
Tags : 
    
Adecco
Published By: LogRhythm     Published Date: Jun 19, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
siem, gartner, magic, quadrant, analytics
    
LogRhythm
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: McAfee APAC     Published Date: Jun 25, 2019
i. How automation and integration can work together to unify people, process, and technology. The security community has begun to embrace automation as a solution to handling tedious, repetitive tasks, allowing skilled staff to focus on more strategic and advanced endeavors. As destructive threats continue to increase, automation balances machine-based analysis with human-based domain knowledge to help organizations achieve optimal workflows in the face of staff shortages and alert fatigue. This SANS survey explores some of the misconceptions and facts around automation and how it can become a natural extension of individuals and teams trying to do their day jobs more effectively.
Tags : 
    
McAfee APAC
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral, research
    
CA Technologies
Published By: SalesNexus     Published Date: Sep 23, 2010
Small businesses often minimize the importance of advanced CRM features. It's tempting to select very basic, simple and inexpensive CRM solutions for your small business.
Tags : 
small business crm, web based crm, hosted crm, small business marketing, crm for small business
    
SalesNexus
Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
Organisations that modernise IT with hyper-converged systems from Dell EMC achieve operating and cost efficiencies, allowing them to invest more in innovation, says IDC. Start your IT Transformation with Dell EMC hyper-converged systems. Simplify IT and see real results. Competing in today’s digital economy requires companies to innovate from the infrastructure out. Look for advanced technologies like VxRail and VxRack hyper-converged systems to lower costs, boost revenue and accelerate workloads — so you can set aside more funds for innovation. Start your IT Transformation with Dell EMC hyper-converged systems powered by Intel® Xeon® processors.
Tags : 
    
Dell EMC & Intel
Published By: SAS     Published Date: Mar 06, 2018
For data scientists and business analysts who prepare data for analytics, data management technology from SAS acts like a data filter – providing a single platform that lets them access, cleanse, transform and structure data for any analytical purpose. As it removes the drudgery of routine data preparation, it reveals sparkling clean data and adds value along the way. And that can lead to higher productivity, better decisions and greater agility. SAS adheres to five data management best practices that support advanced analytics and deeper insights: • Simplify access to traditional and emerging data. • Strengthen the data scientist’s arsenal with advanced analytics techniques. • Scrub data to build quality into existing processes. • Shape data using flexible manipulation techniques. • Share metadata across data management and analytics domains.
Tags : 
    
SAS
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, cloud computing, data center design and management
    
Coyote Point Systems
Published By: Websense     Published Date: Jul 08, 2014
This paper provides 5 essentials for protecting against advanced persistent threats (APTS)
Tags : 
apts, understanding apts, apt security strategy, anti spam, anti spyware, anti virus, hacker detection, internet security, intrusion detection, intrusion prevention, web service security
    
Websense
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises, networking, security
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search