Hi [[ session.user.profile.firstName ]]

451 Research

  • Date
  • Rating
  • Views
  • Mobile Strategy: The Benefits of Using an Integrated Solution Mobile Strategy: The Benefits of Using an Integrated Solution Chris Marsh, Research Director at 451; Emil Stoychev Progress, Product Manager at Progress Digital Factory for Mobile Recorded: Oct 27 2016 54 mins
    Companies have struggled to find their feet when it comes to combining technology, people and workflow in their mobile application development strategies. All too often fragmented technologies have impeded progress. As technologies mature however and mobile (as distinct from pure web development) becomes better understood, there is light at the end of the tunnel. In particular integration across the lifecycle is delivering significant productivity gains for developers and business stakeholders that makes moving from handfuls of apps to a scaled mobile app strategy more of a reality.
  • Automation in the Age of Digital Transformation Automation in the Age of Digital Transformation Carl Lehmann, 451 Research Manager; Kelly Christensen, Nintex Product Marketing Manager Recorded: Oct 27 2016 57 mins
    Organizations of all types and sizes are currently enamored with (or plagued) by a new IT buzzword –Digital Transformation. The cloud, mobile and social network era is indeed affecting the way organizations run their business. Big data and the Internet of

    Things (IoT) also have firms investing wildly to keep up, or scratching their heads trying to figure out what to do.
    In this webinar Carl Lehmann, Hybrid IT analyst at 451 Research will discuss digital transformation from both business and technical perspectives by:

    • Describing digital transformation and how it is used to create competitive advantage
    • Discussing why and how enterprises are pursuing such initiatives
    • Identifying the critical technology needed for execution
    • Revealing how workflow automation accelerates new ways of doing business

    Attendees will learn how to define and structure digital transformation initiatives unique to their firms and how best to make use of workflow automation for IT and business transformation.
  • Data Center Colocation: Is it the Right Approach for the Enterprise? Data Center Colocation: Is it the Right Approach for the Enterprise? Kelly Morgan - 451 Research, Jim Leach- RagingWire, Bill VanCuren- NCR Recorded: Oct 21 2016 36 mins
    Is Data Center Colocation the Right Approach for the Enterprise? A 451 Conversation with the CIO of NCR.

    Large enterprises have traditionally owned and operated their own data centers. But the capital and personnel requirements of owning and operating your own data centers as well as the strategic distraction, are causing many enterprises to consider replacing their data centers with a mix of colocation and cloud computing.

    In this webinar, Kelly Morgan, Vice President at 451 Research and one of the leading authorities on the economics and finances of the data center and hosting industries, will present the key considerations for enterprises as they evaluate colocation. Then, William VanCuren, Chief Information Officer at NCR, will join Kelly for a discussion on NCR’s hybrid cloud strategy, including their convergence of public cloud and colocation to support the enterprise
  • Gen 4 Attacks: Web Behavior Analytics to Protect Websites Gen 4 Attacks: Web Behavior Analytics to Protect Websites Eric Ogren, Senior Analyst at 451 Research, & Omri Iluz, CEO of PerimeterX Recorded: Oct 20 2016 58 mins
    Join Eric Ogren, Senior Security Analyst at 451 Research, and Omri Iluz, CEO of PerimeterX, as they discuss how your best defense against automated website attacks rests with an approach founded on analyzing the behavior of humans and bots. 451 Research has talked with organizations that have saved millions in fraudulent transactions after embracing a behavioral analysis approach to security.

    Sophisticated attackers are commercially motivated, using automated attacks to inflict damage. By abusing encoded business logic, they utilize real browsers to take over accounts, perform fraudulent purchases and scrape intellectual property, without triggering traditional security mechanisms. Through advanced techniques of cloaking from the world of malware, they disguise their nefarious intentions. Signature-based bot detection and WAFs are blind to these new threats, leaving your organization’s website defenseless.

    In this webinar you will learn:

    •How bots have evolved from simple scripts to sophisticated Man-in-the-Browser attacks
    •How to protect against advanced modern attacks utilizing real-user browsers
    •How to detect malicious behavior with Web Behavior Analytics (WBA) technologies
    •Real-world attacks and how organizations use behavioral analysis to prevent them
    •How to future-proof your business and your infrastructure
  • Businesses Held Hostage: Are You Ready for a Ransomware Attack? Businesses Held Hostage: Are You Ready for a Ransomware Attack? Scott Crawford, Research Director at 451 Research & Matthew Gardiner, Senior Product Marketing Manager at Mimecast Recorded: Oct 13 2016 60 mins
    No organization is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.

    The motivation to pay can be strong, particularly given issues such as criticality of business assets, digital infrastructure, or even safety of life in some cases – but a far better strategy is to be prepared for the threat, before ransomware strikes.

    How ready is your organization to face a ransomware attack? Join Scott Crawford, Research Director of information Security at 451 Research, and Matthew Gardiner, Senior Product Marketing Manager with Mimecast to explore:

    -The impact of ransomware: Just how serious a threat is it?
    -How could ransomware get into your organization?
    -Why is ransomware happening more now than ever before?
    -How can you best defend against a ransomware attack…before it locks up your critical information assets?

    We’ll discuss how a three-pronged strategy of prevention, business continuity and email archiving can help defeat ransomware before it take your business hostage.
  • Governance in the Hybrid World Governance in the Hybrid World Dr. Katy Ring 451 Research, Jeff Budge OneNeck IT Solutions Recorded: Oct 12 2016 57 mins
    Governance in the Hybrid World

    The use of cloud infrastructure to deliver IT services is gradually becoming the new normal, bringing benefits such as increased business agility and flexibility to support faster speed to market. However, the adoption of cloud technology and its use alongside existing IT investments creates a challenging IT environment. This is compounded by the ease with which workers can bring in their consumer devices and apps. How does the internal IT team ensure that the advantages of cloud technology can be exploited by the business without weakening corporate policies? This webinar will address:

     -The range of workloads and the best execution venue for them
     -How IT teams can take back control by adopting an IT-as-a-Service strategy
     -Ways to think more like a commercial IT service shop
  • Database as a Service: What should you consider before migrating to the cloud? Database as a Service: What should you consider before migrating to the cloud? Matt Aslett - 451 Research Director, Data Platforms and Analytics Recorded: Oct 11 2016 48 mins
    Database-as-a-service offers multiple potential benefits, including lower database licensing and infrastructure costs, faster time to application development, and reduced administration overheads. These benefits are most likely to be experienced by database administrators and architects, although senior decision-makers and business users also stand to gain from having on-demand access to database services, rather than waiting for databases to be configured and deployed on dedicated physical or virtual server infrastructure.

    While 451 Research anticipates growing adoption of database-as-a-service (DBaaS), adoption is currently nascent compared with other cloud services, as enterprises look to make the most of their investments in on-premises database deployments, and also to identify the most appropriate workloads for transition or migration to DBaaS. This webinar explores the factors shaping those adoption trends, including the potential benefits and challenges to DBaaS adoption, the economics of the cloud as they relate to database workloads, and adoption lifecycles.

    Based on research involving enterprises currently deploying database workloads in the cloud, the webinar will:

    • Highlight the trends driving enterprises to move database workloads to the cloud
    • Identify the challenges causing enterprises to be hesitant about migrating database workloads to the cloud
    • Identify the use-cases that are prime candidates for migrating database workloads to the cloud
    • Highlight the critical success factors for database migration to the cloud
  • Cloud Management Platforms-The State of the Market in 2016 and Beyond Cloud Management Platforms-The State of the Market in 2016 and Beyond William Fellows, VP and cofounder of 451 Research, Scott Davis, EVP & Chief Technology Officer at Embotics Recorded: Oct 5 2016 61 mins
    Faced with growing pressure for faster provisioning times, easier-to-use platforms, and better visibility into digital and virtual assets, IT organizations are recognizing the value of incorporating a cloud management platform (CMP) into their broader cloud strategy.

    While there are clear benefits to implementing a CMP, it can be daunting to figure out which platform can properly manage your public, private, and hybrid resources. 451 Research data shows organizations will be using more than one cloud service which increases complexity with each additional cloud.

    Join William Fellows, VP and cofounder of 451 Research, along with guest speaker Scott Davis, EVP & Chief Technology Officer at Embotics, as they dissect the key takeaways and findings of 451’s CMP market study of technology buyers at 166 US enterprise. This webinar will examine the growing need for a CMP in today's market, factors to consider when deciding to move to a CMP, and how to ensure successful deployment in your organization.
  • How to Optimize Security Controls for DevOps How to Optimize Security Controls for DevOps Adrian Sanabria, Senior Analyst at 451 Research, & Sami Laine, Principal Technologist at CloudPassage Recorded: Sep 29 2016 53 mins
    The widespread adoption of DevOps and agile IT delivery systems presents new security challenges. Developers need security tools that are integrated with their build processes so they can test the integrity and security of their applications within minutes. Similarly, infosec managers need security tools that automatically discover and protect new applications as they are delivered via rapid automation and elastic processes. But traditional security tools don’t do either of these things. Thus, security is increasingly viewed as a blocker to agile software development and DevOps deployment. To solve this problem, security has to fundamentally evolve from a production-time concept to something that is much more automated and embedded into the dev-test-build cycle itself,

    Attend this webinar to learn:
    •Why trying to use traditional security tools in DevOps environments will slow down both developers and security operations
    •Key attributes you should be thinking about to make your security plan future-proof
    •Where can security automation be applied to better align security with DevOps delivery models
  • IT Security Hygiene On The Brink: Fix Security Posture With On-Demand Visibility IT Security Hygiene On The Brink: Fix Security Posture With On-Demand Visibility Eric Hanselman, 451 Chief Analyst, and Erik Kristiansen, Tanium Sr. Director of Product Marketing Recorded: Sep 28 2016 51 mins
    IT organizations have hit a breaking point in siloed management tools to address one of the most critical issues today - cybersecurity hygiene. In particular, numerous point solutions targeting the endpoints drive cost, complexity, and other challenges. New investments in cloud, distributed workforces and increasing numbers of connected devices only exasperate this problem. Addressing cybersecurity hygiene means that critical actions must be made on demand versus scheduled. Teams must also have confidence that assessment results and remediation actions are complete.

    Come learn about the key issues why cybersecurity hygiene fails in most organization. We’ll discuss in depth how the platform approach and speed of Tanium are poised to fix this critical problem. Eric Hanselman, 451 Chief Analyst, and Erik Kristiansen, Senior Director of Product Marketing at Tanium will discuss.

Embed in website or blog