Hi [[ session.user.profile.firstName ]]

451 Research

  • Date
  • Rating
  • Views
  • Reducing Risk in the Data Center with DCIM
    Reducing Risk in the Data Center with DCIM Rhonda Ascierto, Research Director at 451 Research and Mark Gaydos, Chief Marketing Officer at Nlyte Software Recorded: Jan 18 2018 40 mins
    The management of change has been a recognized and necessary discipline in enterprise IT for decades. But the management of change – and indeed critical events – in datacenter facilities has not received so much attention, despite the dangers and significant costs associated with even partial failure.

    Increasingly, datacenter owners and operators are reducing risks associated with change and unplanned events by using purpose-built datacenter infrastructure management (DCIM) software. DCIM has become an essential element of modern datacenter risk management, from monitoring and alerting to traceable (auditable) workflows, asset tracking, predictive analytics and end-to-end risk analysis.

    In this webinar, you will learn how DCIM is being leveraged to understand, manage and lower risk, while at the same time delivering efficiency, agility and cost benefits.
  • Challenges and Opportunities in Workflow Automation for the Modern Workforce
    Challenges and Opportunities in Workflow Automation for the Modern Workforce Chris Marsh, 451 Research Director | Ryan Duguid, Nintex SVP of Technology Strategy Recorded: Jan 11 2018 60 mins
    Designing and managing complex, specific and even specialist work is no longer only the remit of centralized teams of specialist project managers, analysts and process experts. Companies are looking for looser, more matrixed, decentralized and collaborative forms of organization, they are reconsidering processes, people and technology as part of this shift with a focus increasingly on enabling these types of work to be done by business leaders and their teams.

    Unfortunately the traditional mix of collaboration, team, task, project and business process management tools are struggling to deliver the balance of cohesive, flexible and extensible work processes business teams need.

    They need a way of building automated processes that span across different systems and applications so that their myriad tactical workflows can be elevated into a strategic mesh of operations, giving them new ways to think about organizational culture, business agility, employee engagement, work throughput and customer satisfaction.

    In this webinar Chris Marsh, Director of Workforce Productivity and Compliance at 451 Research and Ryan Duguid, SVP of Technology Strategy at Nintex will discuss the trends, pain points and opportunities around content and workflow automation for the modern workforce.
  • The Importance of EDR within an Endpoint Security Strategy
    The Importance of EDR within an Endpoint Security Strategy Fernando Montenegro of 451 Research and Erik Kristiansen of Tanium Recorded: Jan 9 2018 53 mins
    Identifying security incidents isn’t always easy. Properly scoping incidents can be difficult. And, most organizations admit they aren’t able to fully remediate every incident. On average, over 80% of organizations are concerned with their ability to address all three of the aforementioned tasks. Organizations struggle because they lack confidence in their endpoint data due to incomplete visibility, control, and accuracy.

    64% of organizations believe that a successful attack on endpoints is likely to recur and succeed again. This cycle is doomed to repeat over, and over, and over again. However, it's possible to break out of the re-compromise cycle for good. As the endpoint security landscape evolves, what role does EDR play?

    Join us for this webinar. Speakers will include:
    1.Fernando Montenegro (Sr. Analyst at 451 Research) will provide an EDR market overview and trends
    2.Erik Kristiansen (Sr. Director at Tanium) will explore the findings from a recent security survey
  • Ensuring a Trusted Internet of Things
    Ensuring a Trusted Internet of Things Christian Renaud, Research Director at 451 Research & Josh Jabs, Vice President at Entrust Datacard Recorded: Dec 19 2017 57 mins
    During this upcoming webinar we will discuss the current state of IoT adoption, security and trust challenges to deployment by key vertical markets. We will also dive into lessons learned, emerging standards for IoT security, and the necessary innovative technologies required for the Internet of Things to succeed. Please join Entrust Datacard and 451 Research for this informative upcoming webinar.
  • 2018 Cyber Security Predictions: The Identity-Aware Perimeter Comes to the Fore
    2018 Cyber Security Predictions: The Identity-Aware Perimeter Comes to the Fore Chris Sullivan (SecureAuth+Core Security) & Garrett Bekker (451 Research) Recorded: Dec 14 2017 61 mins
    Join 451 Research and SecureAuth+Core Security for a peek into the emerging trends in cyber security and identity in 2018. Register today and learn how these trends will impact your strategy, organization, and job in the coming year.

    Security experts Garrett Bekker, 451 Research and Chris Sullivan, SecureAuth+Core Security will share insight on these trends and more:

    •Why network-based approaches to security are no longer sufficient in the age of cloud and IoT
    •Why identity is the new gating factor for access to sensitive resources
    •How various methods for securing cloud resources – CASB and IDaaS - need to converge
    •The need for risk-based approaches to authenticating users – and machines
  • Real World Use Cases for AI
    Real World Use Cases for AI Nick Patience (451 Research) and Mark Gamble (OpenText) Recorded: Dec 14 2017 54 mins
    The key to your enterprise's success lies in leveraging data, AI and analytics to improve processes and optimize your business. But what technologies and techniques should you use and what sorts of problems can AI solve for you? Join us to hear Nick Patience, Principal Analyst at 451 Research, discuss AI and explore how machine learning-based analytics benefits organizations across a variety of use cases. The session will include an overview of Magellan - OpenText's new AI and analytics platform - and will feature live demos and a customer case study. Attend to learn how Magellan can provide a powerful, cost effective, flexible option for implementing AI in your organization.
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • Endpoints in the Hyperconnected Era: Weaknesses and Weapons
    Endpoints in the Hyperconnected Era: Weaknesses and Weapons Scott Crawford, 451 Research | Ofer Israeli, Illusive Recorded: Dec 7 2017 60 mins
    If ever there were a truly asymmetric battle, it’s in the war for the endpoint. Enterprises must apply defense as broadly and consistently across hundreds or thousands of endpoints as best they can. But to penetrate an organization, the attacker only needs to succeed with one that exposes a weakness. And from the network, to the endpoint itself, to the user that interacts with malicious content, these weaknesses may be many.

    There is a new array of tools in the fight for the endpoint that go beyond traditional monitoring and controls, or the trend toward applying machine learning to the art of defense. In this webinar, Scott Crawford of 451 Research and Ofer Israeli of Illusive Networks will examine these issues and opportunities, and shed light on deception technology and other new tools for intelligent defense at the endpoint that can recognize and contain a threat before it has a serious impact.
  • Analytics and Machine Learning Drives ITOA 2.0 for Better App Performance
    Analytics and Machine Learning Drives ITOA 2.0 for Better App Performance Nancy Gohring, Senior Analyst at 451 Research and Kalyan Ramanathan, VP Product Marketing at Sumo Logic Recorded: Dec 7 2017 50 mins
    Today’s leading enterprises are striving to deliver high performance, highly scalable and always-on digital services. Built using a host of modern tools including microservices, multiple cloud platforms, containers and DevOps practices, these apps present new challenges for operations teams when it comes to understanding and driving performance.

    Although IT operations analytics (ITOA) tools bring visibility to IT teams, they don’t operate well in today’s complex and heterogeneous environments. A new breed of ITOA solutions (ITOA 2.0), driven by advancements in machine learning and big-data technologies are poised to better respond to the needs of IT pros responsible for the modern complex applications.

    In this webinar, we will discuss:

    •The driving factors behind the evolution of ITOA to ITOA 2.0
    •How machine learning and analytics play a central role
    •Why correlation of logs and metrics is becoming critical for monitoring tools
    •How organizations can leverage ITOA 2.0 technologies to reduce mean time to identify the source of problems and repair them
  • Digital Transformation Through Automation
    Digital Transformation Through Automation Carl Lehmann, 451 Research | Ryan Bazler, Kofax Recorded: Dec 7 2017 60 mins
    Organizations across the globe are engaged in what some consider to be another IT buzzword – Digital Transformation. Many though take it seriously, as concerted means to optimize customer experiences, improve business efficiencies, and capitalize on new market opportunities.

    In this webinar Carl Lehmann, Principal Analyst at 451 Research will discuss how industry leading enterprises pursue digital transformation from both business and technical perspectives by:

    •Describing digital transformation and how it is used to create competitive advantage
    •Discussing why and how enterprises are pursuing such initiatives
    •Identifying the critical technology needed for execution
    •Revealing how digital automation platforms improve and enable new ways of doing business
    Attendees will learn how to define and structure digital transformation initiatives unique to their firms and how best to make use of digital automation platforms for IT and business transformation.

Embed in website or blog