CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 326 - 350 of 4894Sort Results By: Published Date | Title | Company Name
White Paper Published By: F5     Published Date: May 12, 2016
App Protection is fraught with complexity and with the growth of IoT and the applications that go along with it, the issues are only growing. By enhancing existing security portfolios with solutions and services focused on the application level, organizations can better protect the applications that can expose their sensitive data.
Tags : 
application protection, app protection, security, cloud, cloud computing
    
F5
White Paper Published By: F5     Published Date: May 12, 2016
This white paper illustrates the benefits of implementing F5.
Tags : 
it infrastructure, infrastructure, security, application security management, security application
    
F5
White Paper Published By: F5     Published Date: May 12, 2016
This white paper reveals the results of implementing F5 were it provided intelligent and agile Infrastructure, highly available and secure application services and manage applications in the hybrid environment.
Tags : 
it infrastructure, infrastructure, security, application security management, security application
    
F5
White Paper Published By: Adobe     Published Date: May 12, 2016
This white paper reveals the reason why integrating electronic signatures into the B2B sales cycle will save you both time and money.
Tags : 
esignature, digital signature, online signature, electronic signature, benefits of using esignatures
    
Adobe
White Paper Published By: Adobe     Published Date: May 12, 2016
This paper reveals the benefits of using e-signatures.
Tags : 
esignature, digital signature, online signature, electronic signature, benefits of using esignatures
    
Adobe
White Paper Published By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : 
kaspersky, ransomware, encyyption, data access, email security
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: May 11, 2016
This whitepaper describes the different virtualization security solution options—conventional agent-based; agentless; and Light Agent— as well as possible scenarios for aligning the right security approach to your organization’s virtual environment.
Tags : 
kaspersky, virtualization security, security management, light agent, virtualization
    
Kaspersky
White Paper Published By: SAP     Published Date: May 05, 2016
Executive Summary of the CFO.com Webinar
Tags : 
sap, ariba, e-payments, b2b, security
    
SAP
White Paper Published By: SAP Ariba     Published Date: May 05, 2016
Executive Summary of the CFO.com Webinar
Tags : 
sap, ariba, e-payments, b2b, security
    
SAP Ariba
White Paper Published By: Rsam     Published Date: Apr 28, 2016
The University of Rochester Medical Center (URMC) is of the nation’s top academic medical centers. Their InfoSec team wanted to implement a program that could withstand constant shifts in regulatory requirements while protecting the sanctity of patient health information. Learn why the selected Rsam and the results of their successful implementation.
Tags : 
rsam, university of rochester, security incident response, successful implementation, security
    
Rsam
Webinar Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
rsam, vendor risk management, enterprise, risk assessment, security
    
Rsam
White Paper Published By: YLD     Published Date: Apr 27, 2016
IT departments are faced with new challenges, with increased competition, lower customer loyalty and globalisation. It all requires faster development while dealing with shadow IT, legacy systems and requirements for highly skilled teams, with expertise in new, disruptive technologies.
Tags : 
it department, customer loyalty, technology, it support, becoming a disruptive cio
    
YLD
White Paper Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security, application security, vulnerability management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security, application security, vulnerability management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management, vulnerability management, mobile device management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management, vulnerability management, mobile device management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
In this white paper, we uncover the numerous document productivity features that employees want across PCs and mobile devices.
Tags : 
mobile device management, byod, employee performance, service management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
Diese Entwicklung lässt sich zwar mit Statistiken (siehe Seitenleiste) belegen, am deutlichsten zeigt sie sich jedoch im täglichen Leben. Sei es der Jogger, der sein Laufpensum mit dem Telefon überprüft, die Mutter, die sich mit ihren Kindern den Nachthimmel über eine Astronomie-App auf dem Tablet ansieht, der Hauseigentümer, der mithilfe einer Zeitschriften-App in der Lage ist, selbst eine Reparatur durchzuführen, oder jeder Kunde, der sich sein Getränk an einem „Coke Freestyle“-Automaten zusammenstellt oder seinen morgendlichen Kaffee über die Starbucks-App bestellt. Die Liste ließe sich beliebig fortführen.
Tags : 
mobile lifecycle, mobile device management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
In this white paper, we uncover the numerous document productivity features that employees want across PCs and mobile devices.
Tags : 
mobile device management, byod, employee monitoring software, employee training software
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
Bei DAM geht es nicht nur um Speicher. DAM ist eine strategische Grundvoraussetzung für die digitale Transformation.
Tags : 
digital asset management, marketing, mobile device management
    
Adobe
White Paper Published By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : 
datastrophe study, code 42, data protection, data backups, anti spyware
    
Code42
White Paper Published By: Adobe     Published Date: Apr 22, 2016
This white paper uncovers the numerous document productivity features that employees want across PCs and mobile devices.
Tags : 
mobility, mobile devices, cloud, cloud-based, cloud-based productivity apps
    
Adobe
White Paper Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
White Paper Published By: Code42     Published Date: Apr 22, 2016
Read this whitepaper to find out strategic solutions to your data protection issues.
Tags : 
data protection, data control, code 42, data visibility, encryption
    
Code42
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, Data Loss Prevention, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Mobile Device Management, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search