CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

security

Results 126 - 150 of 7494Sort Results By: Published Date | Title | Company Name
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense, it management, knowledge management, data management
    
ThreatTrack Security
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Lumension     Published Date: Jun 03, 2015
The IT news over the last year has been filled with story after story on data breaches, making the release of Lumensions’ 4th annual data protection maturity report all the more relevant. Review this report for a timely analysis of the threats, responses, policies, and technologies comprising today’s shifting data security landscape. It also reveals how organizations have made progress, the steps they plan to take to address data protection challenges in 2015—and where they may still be at risk.
Tags : 
data protection, data, security, cloud, storage, infrastructure, productivity
    
Lumension
Published By: Lumension     Published Date: Jun 03, 2015
Report leads to the security best practices that can better protect your information and your business.
Tags : 
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
Lumension’s fourth-annual survey on data protection maturity highlights the threats, responses, policies, and technologies of a shifting data security landscape. It also reveals how organizations have made progress—and where they may still be at risk.
Tags : 
data protection, threats, security landscape, shifting data, data maturity
    
Lumension
Published By: IBM     Published Date: Jan 07, 2016
This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements.
Tags : 
ibm, gartner, magic quadrant, security, enterprise
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : 
ibm, gartner, security, managed security services, magic quadrant, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems, ips, gartner, networking
    
IBM
Published By: AlienVault     Published Date: Aug 11, 2015
This report talks about Gartner's Magic Quadrant for SIEM in 2015
Tags : 
security information, event management, magic quadrant, gartner report, siem technology, event data, correlations, user activity monitoring
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : 
alienvault, security, siem, hacking, threat detection, monitoring, anti virus, application security
    
AlienVault
Published By: IBM     Published Date: Jul 31, 2015
Market trends and vendor evaluation criteria.
Tags : 
security, data, event management, infrastructure, network management, productivity, project management
    
IBM
Published By: IBM MaaS360     Published Date: Jul 09, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
magic quadrant, enterprise mobility management, emm, mobility security, vendors, networking, security, it management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
ibm, fiberlink, maas360, gartner, enterprise, mobile management, networking, wireless
    
IBM MaaS360
Published By: IBM     Published Date: Jul 31, 2015
This guide provides a quick overview of the solutions IBM offers aligned to the three ‘imperatives’ facing the retail industry - to deliver a Smarter Shopping Experience, to build Smarter Merchandising and Supply Networks and to drive Smarter Operations.
Tags : 
ibm, retail solutions, retail industry, supply networks, omni-channel commerce, retail security, performance insights
    
IBM
Published By: xMatters     Published Date: Jan 26, 2015
Unsanctioned apps have become the norm, even in large enterprises with tight IT oversight. But when it comes to IT communication solutions, which frequently involve sensitive data, you simply cannot compromise. Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Dive deep into topics such as: • Security and compliance • Enterprise specific capabilities • What constitutes a real mobile solution • Selecting a trustworthy partner • Breadth and depth of integrations • Global support • And much more...
Tags : 
security, compliance, enterprise, mobile solution, networking
    
xMatters
Published By: PulseSecure     Published Date: Apr 06, 2015
Learn about the 2015 mobile threat landscape and see how you can prepare your organization for 2015 and beyond with this market report.
Tags : 
mobile threats, pulsesecure, mobile security, mobile threat landscape, market report, security, it management, knowledge management
    
PulseSecure
Published By: Qualys     Published Date: Jun 02, 2015
This paper discusses these challenges and how they are made more complicated by the rapidly accelerating pace of development and lack of control over applications hosted in the cloud.
Tags : 
application security, sans, developers and protectors gap, builders, defenders, security
    
Qualys
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle, enterprise applications, business technology
    
Veracode
Published By: Lumension     Published Date: Jun 03, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, productivity, business technology, cloud computing
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity, cloud computing
    
Lumension
Published By: IBM     Published Date: May 12, 2015
In this guide, we explore the technological trends that are transforming the retail industry, across the areas of Big Data and Analytics, Cloud Computing, Mobile and Social Engagement, and Security
Tags : 
retail industry, big data, analytics, cloud computing, mobile engagement, security, emerging marketing, crm & customer care
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search