CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information management

Results 251 - 275 of 683Sort Results By: Published Date | Title | Company Name
Published By: Global Software     Published Date: Aug 13, 2018
Streamlining the close process is the new imperative for many financial executives in order to keep pace with the speed of information coming from various mediums. When financial information is released weeks after the period end, the risk is that this information is perceived and received as old news and less relevant for management decision making. This amplifies the perception of the finance department acting as the “back office” and just another cost center inside the organization.
Tags : 
financial, executives, management, organization
    
Global Software
Published By: Deltek     Published Date: Jul 10, 2019
Having real-time access to engagement information via a cloud-based, integrated, information infrastructure is critical in delivering high-value, on time engagements that always delight clients. So why do so many consulting firms fail in this area, that they constantly advise clients on? Enjoy a complimentary copy of ProjectManagement.com’s new white paper on how an effective information infrastructure will ensure client excellence. Author Andy Jordan, consulting firm owner and industry expert, reveals the 5 ways to exceed client expectations and how consulting firms can leverage technology to achieve client excellence. Download the white paper today!
Tags : 
    
Deltek
Published By: McAfee     Published Date: Feb 06, 2013
Read about the top five issues McAfee customers face with security information and event management (SIEM) and see corresponding use cases and customer case studies.
Tags : 
big security data, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected, anti spam, anti spyware, anti virus, application security, auditing, authentication, compliance, disaster recovery, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention
    
McAfee
Published By: Human Capital Institute     Published Date: May 16, 2014
Your employees are also online consumers of information and entertainment. You can maximize enterprise learning by applying practices from the new generation of information delivery, while keeping the best of the old-school approaches.
Tags : 
hci, human capital institute, enterprise learning, information delivery, corporate learning, strategic learning, center for creative leadership, employee development, employee learning, peer networking, peer-based learning, consumer-employees, on-demand learning, mobile learning, streaming content, adobe systems, macy’s inc., performance management, talent development, synchronous training
    
Human Capital Institute
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications, enterprise applications, java, virtualization, infrastructure
    
Oracle
Published By: IBM     Published Date: Oct 12, 2015
This IBM-commissioned profile of government information management professionals examines the challenges of dealing with the increase in digital and unstructured content as well as the roles that shared capture service and improved case management.
Tags : 
ibm, forrester, digital, engagement, forrester technology, information management, software development, it management, knowledge management, enterprise applications, business technology
    
IBM
Published By: OneLogin     Published Date: Oct 24, 2017
From the information provided in the interviews, Forrester has constructed a Total Economic Impact (TEI) framework for those organizations considering investing in OneLogin. The objective of the framework is to identify the benefits, costs, flexibility, and risk factors that affect the investment decision. Forrester employed four fundamental elements of TEI in modeling OneLogin: benefits, costs, flexibility options, and risks. Forrester took a multistep approach to evaluate the impact that OneLogin can have on the Organization (see Figure 2). Specifically, we: › Interviewed OneLogin marketing, sales, and product management personnel, along with Forrester analysts, to better understand the value proposition for OneLogin. › Conducted an in-depth interview with the Organization’s senior application engineer and its supervisor of IT security to obtain data with respect to costs, benefits, and risks. › Constructed a financial model representative of the interviews using the TEI metho
Tags : 
    
OneLogin
Published By: The TriZetto Group     Published Date: Aug 01, 2011
Learn how to maximize efficiencies through greater system integration and automation, enable seamless interactions with providers, members and other constituents, and drive increased healthcare value with automated, value-based programs.
Tags : 
trizetto, trizeto, healthcare reform for payers, payers and healthcare reform, reform and payers, compliance with reform, administrative efficiency, technology, icd-10, 5010, claims administration, mlr requirement, value-based insurance design, value-based reimbursement programs, healthcare information technology, population health management, mlr
    
The TriZetto Group
Published By: PKWARE     Published Date: Aug 21, 2009
Any organization that stores or transfers health or insurance records electronically must comply with HIPAA, from health care facilities to HR departments. PKWARE offers straightforward strategies for managing protected health information.
Tags : 
compliance, hipaa compliance, hipaa, healthcare, privacy, health, health information management, him, database security, data protection, pkware, software compliance
    
PKWARE
Published By: Workday     Published Date: Sep 30, 2019
HR can do more for your organization than just day-to-day tasks. In fact, many of your peers are using HR to achieve growth goals and other business objectives. See how technology can help you break out of administrative silos, and hear from Workday customers that made HR a more strategic partner for the business.  Read the eBook to learn more. 
Tags : 
workday inc (wday), career development, employee engagement, human capital management, human resource management
    
Workday
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: Signiant     Published Date: Aug 14, 2008
Moving content from raw form to finished form and delivering it to cable head-ends and Telco providers has its own unique set of challenges. How does content flow from the person or companies who are producing and post-producing the content to the companies that are hosting the content for consumption? IPTV content must be transformed in some fashion, such as various bit rates, resolutions, aspect ratios, file formats, etc.
Tags : 
signiant, information management, file transfer, ftp, large file transfer, digital media
    
Signiant
Published By: Signiant Inc.     Published Date: Aug 14, 2008
Moving content from raw form to finished form and delivering it to cable head-ends and Telco providers has its own unique set of challenges. How does content flow from the person or companies who are producing and post-producing the content to the companies that are hosting the content for consumption? IPTV content must be transformed in some fashion, such as various bit rates, resolutions, aspect ratios, file formats, etc.
Tags : 
signiant, information management, file transfer, ftp, large file transfer, digital media
    
Signiant Inc.
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
Published By: Informatica     Published Date: Jul 07, 2011
Explore how retailers can generate a single view of customers who engage across multiple channels-online, in stores, and via call centers, on social media, and mobile devices.
Tags : 
informatica, competitive edge, customer information management mdm, master data management, multichannel retail environment, social media, single view, customer activity, loyalty
    
Informatica
Published By: Quocirca     Published Date: Sep 07, 2007
Mid-sized organizations have similar issues to large organizations when it comes to the storage and management of information and data, yet they often have limited capability to attract, retain and maintain the skills that large organizations will use in managing their data assets.  There is a strong need for more effective tools that will enable mid-sized organizations to manage their data assets and gain the greatest value from them.
Tags : 
smb, smbs, storage, data management, information management, storage management, san, sans, storage area network, quocirca
    
Quocirca
Published By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : 
siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store, forensics and regulatory compliance
    
Intel Security
Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
The discipline of data quality assurance ensures that data is "fit for purpose" in the context of existing business operations, analytics and emerging digital business scenarios. It covers much more than just technology. It includes program management, roles, organizational structures, use cases and processes (such as those for monitoring, reporting and remediating data quality issues). It is also linked to broader initiatives in the field of enterprise information management (EIM), including information governance and master data management (MDM)
Tags : 
    
Group M_IBM Q119
Published By: Proofpoint     Published Date: Apr 06, 2012
Gartner, Inc. positions Proofpoint in the Challengers quadrant in its 2011 Magic Quadrant for the Enterprise Information Archiving (email archiving, file archiving, social media archiving, retention management, eDiscovery, search, legal hold) market.
Tags : 
gartner, email archiving, archive email, eia magic quadrant, gartner, search, ediscovery, legal hold, cloud archiving, storage costs, information governance, archiving, regulatory compliance, information governance, discovery, ediscovery, file shares, managing content, cloud archiving, email retention
    
Proofpoint
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze, investigate and report on event data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have products designed for this purpose, and they actively market and sell these technologies to the security buying center.
Tags : 
    
Group M_IBM Q119
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance, security
    
McAfee
Published By: Intel Security     Published Date: Apr 06, 2016
Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, incident response, forensics, compliance
    
Intel Security
Published By: LogRhythm     Published Date: Aug 08, 2016
The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
Tags : 
cyber threat, cyber risk, technology, best practices, business management, business analytics, security, business technology
    
LogRhythm
Published By: IBM     Published Date: Apr 14, 2017
The growing need for organizations to treat information as an asset is making metadata management strategic, driving significant growth for metadata management solutions. We evaluate nine vendors to help data and analytics leaders find the solution that best suits the needs of their organization.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection, metadata, business meta data, market data
    
IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search