CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

mba

Results 1 - 25 of 369Sort Results By: Published Date | Title | Company Name
Published By: iboss     Published Date: Jan 22, 2018
While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.
Tags : 
iboss, device security, intrusion, network security, distributed computing, firewalls, intrusion prevention, business technology, mobile device management
    
iboss
Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology, authentication
    
IDology
Published By: Workday France     Published Date: May 01, 2019
L’alignement de votre plan d’effectif sur les objectifs prioritaires de votre entreprise peut être difficile et laborieux surtout lorsque les fondamentaux ne sont pas bien compris. Ce livre blanc décrit les 10 étapes fondamentales pour créer un plan d'effectif stratégique efficace et explique comment la technologie peut aider à le mettre en œuvre.
Tags : 
workday, workforce technology, digital strategy
    
Workday France
Published By: Workday France     Published Date: May 17, 2019
L'alignement de votre plan d'effectif sur les objectifs majeurs de l'entreprise n'est pas forcément une entreprise laborieuse, surtout lorsque les fondamentaux sont bien compris. Ce livre blanc décrit les 10 étapes fondamentales pour créer un plan d'effectif stratégique efficace et explique comment la technologie peut aider à le mettre en œuvre.
Tags : 
    
Workday France
Published By: Simba by Magnitude     Published Date: Sep 20, 2019
Despite the thousands of MarTech solutionsavailable today, we’re stillmissing a comprehensive, connected view of our marketing data.Imagine if we could connect the dots.You know you don’t have the fully integrated picture of your marketing data, but how do you troubleshoot, whom and what should you ask?Here’s a check listof questions and exercises to help you discover your data and process bottlenecks. Are you ready?
Tags : 
    
Simba by Magnitude
Published By: Net Atlantic     Published Date: Mar 19, 2010
Net Atlantic's whitepaper, "15 Trade Secrets of Email Service Providers" uncovers the details behind email service providers (ESPs) and their practices. It highlights the differences between an email marketing server and a static web server, the methods used to avoid SPAM, and how ESPs achieve and maintain high deliverability rates. Marketers should know these secrets before embarking on an email marketing strategy, or entering into a deal with an ESP.
Tags : 
net atlantic, esp, email service provider, deliverability, spam, anti-spam
    
Net Atlantic
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
It doesn’t matter whether you’re new to Oracle Retail, have an active implementation project that is running or have an existing deployment in production. The same issue applies: You are making a significant investment in the technology and need to develop a reliable and efficient batch schedule. If you’re new to Oracle Retail, you are no doubt embarking on a major project to improve your competitive position in the retail market. With that in mind, your goals will be to shrink the time-to-market for your retail implementation, lower the reliability risks associated with in-house developed solutions and improve the visibility and control of retail business processes. In this eBook you will discover a series of recommendations for operating a fail-safe and efficient Oracle Retail operational environment. You will also understand how automation enables you to streamline the execution of your Oracle Retail batch operations and increase the day-to-day efficiency of your operations teams.
Tags : 
    
CA Technologies_Business_Automation
Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies, anti spyware, email security, internet security
    
Cisco
Published By: Canon Solutions America     Published Date: Oct 17, 2017
Transforming government processes starts with laying the right foundation for your organization’s workflow. Many government agencies have embarked on transformation initiatives; however, there is still room for improvement to build a more stable transformation foundation.
Tags : 
pii security, pii breach, pii compliance checklist, how to protect pii, pii information security, pii data compliance, pii data protection, pii data breach, pii encryption, pii encryption best practices, public sector printing, secure public sector printing, security breach in public sector
    
Canon Solutions America
Published By: Aditi     Published Date: Jun 11, 2015
Your mobile device is speaking to your garage door. Your alarm is telling your coffee maker you are up and it’s time to get that caffeine kick going. Your car is dropping your thermostat a message, telling it to keep the house warm before you step in. This isn’t a quote from an Issac Asimov novel, it’s the reality of how the Internet of Things is making a difference to our lives. Most of us are consciously making the shift to a connected world, while at home or at work. While this has caught the public imagination, enterprises are chasing to fulfil their Internet-of-Things-ambitions and transform their customer experience. In this e-book we aim to address the 5 fundamental questions that one should not hesitate to ask about your foray into the world of Internet of Things, while telling you how it can reshape your business.
Tags : 
aditi, rfids scada, c-suite, optimization, lot, hybrid cloud, it management
    
Aditi
Published By: Limeade     Published Date: Mar 14, 2016
Stress is one of the top issues that affect our well-being. When money gets tight or relationships get frazzled, it can lead to unhealthy and unproductive behaviors. This tip cheat has five ways to combat the most common stresses we face.
Tags : 
employee stress, unhealthy employees, employee multitasking, employee resources, human resources
    
Limeade
Published By: Limeade     Published Date: Feb 02, 2017
Stress is one of the top issues that affect our well-being. When money gets tight or relationships get frazzled, it can lead to unhealthy and unproductive behaviors. This tip cheat has five ways to combat the most common stresses we face.
Tags : 
    
Limeade
Published By: Recorded Future     Published Date: Apr 18, 2019
Supercharge Your Security Alert fatigue is the desensitization that comes from being bombarded with too many alerts — a sense of hopelessness from being overwhelmed by tasks and not knowing where to begin. If an overabundance of security alerts is tiring you out, check out our new e-book, “5 Ways to Supercharge Your Security With Threat Intelligence.” It shows exactly how to use threat intelligence to get the context you need to do something with all that data.
Tags : 
    
Recorded Future
Published By: Fujitsu     Published Date: Feb 06, 2017
When you embark on an SAP HANA transformation, your goals should include simplifying operations and empowering your business to compete and win in the digital economy. But big transformation projects like this are extremely complex. Learn key insights into common speed bumps and roadblocks that may slow you down, as well as valuable tips to help you along your transformation journey.
Tags : 
sap hana, hana cloud platform, sap hana cloud platform, sap hana platform, sap hana analytics
    
Fujitsu
Published By: Samuel Curtis Johnson Graduate School of Management     Published Date: Dec 19, 2017
In today’s society, it can be easy to overlook the benefits of earning an MBA. But research shows the benefits of going back to school far outweigh the costs for many individuals.
Tags : 
cornell university, johnson cornell, mba, masters degree, business degree, continuing education, business learning, productivity, elearning, business technology, finance
    
Samuel Curtis Johnson Graduate School of Management
Published By: WNS     Published Date: Apr 05, 2017
The client is one of the world's leading insurance companies. In 2007, the client embarked on a journey to transform its actuarial function. The objective was to improve the operational efficiencies and accuracy of actuarial reporting, while meeting tight timelines and reducing operational costs.
Tags : 
insurance, reporting, wns, wns solution, data, analytics
    
WNS
Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility, business technology
    
LogRhythm
Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection, security
    
Webroot Inc
Published By: Backupify     Published Date: Jul 15, 2013
With more than 100 survey respondents, The Aberdeen Group has collected information on the little known subject of SaaS data loss, how it affects companies today, and what IT departments are doing to combat it.
Tags : 
saas, public cloud, private cloud, datacenter
    
Backupify
Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Siloed data has become the Achilles heel of marketing insights –especially in the world of B2B and B2B2C marketing. Today’s marketing and sales departments sit on a goldmine of data derived from the dozens of applications and data sources in their MarTech stack. Still, the real opportunity for insights is hidden in the combined data across applications. Combining data in a comprehensive way delivers a full picture of marketing efficacy and efficiency. In this eBook, learn about the origins of siloed data, and how data has emerged and evolved, as well as review the benefits that marketing can realize with connected data. Along the way, we’ll share some action items you can take to assess your current situation and build a plan to unify your data and fuel great marketing insights.
Tags : 
    
Simba by Magnitude
Published By: SAP SME     Published Date: Apr 10, 2018
Las empresas de servicios públicos, en respuesta a las presiones competitivas y de los clientes, se están embarcando rápidamente en el cambio hacia la digitalización. Y si bien muchas apenas están comenzando este recorrido, otras están muy avanzadas en el proceso, experimentando con diferentes tecnologías con la esperanza de impulsar las innovaciones para que sean más ágiles, competitivas y rentables dentro de la industria.
Tags : 
    
SAP SME
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management, network security
    
FireEye
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search