Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • How High-Performing IT Teams Tame Network Complexity
    How High-Performing IT Teams Tame Network Complexity
    Shamus McGillicuddy, Sr. Network Mgmt Analyst, Enterprise Management Assoc; Mark Towler, Sr. Product Marketing Manager Recorded: Jun 15 2016 41 mins
    IT Teams are being overwhelmed by the increasing complexity of the networks they’re required to manage. Not only do they have too much to do, they paradoxically also have too many tools with which to try to do it! Yet there are a number of clear similarities found amongst the IT teams that are most productive and most effective. Ipswitch and Enterprise Management Associates both surveyed IT teams worldwide to find out how the best IT teams were able to cope.

    The webinar will present our findings and answer key questions such as:

    •What are the emerging challenges facing IT professionals?
    •How are these challenges impacting their business and their end-users?
    •How do the most productive IT teams address increasingly complex networks?
    •Why are additional management tools and outsourced management counterproductive?

    Data shows that increasing network complexity doesn’t have to degrade the effectiveness of IT teams or the businesses they support. Join this webinar to find out how the high-performing IT professionals manage this – and learn what not to do as well!

    This session will be presented by Shamus McGillicuddy, Senior Network Management Analyst for Enterprise Management Associates as well as Mark Towler, Senior Product Marketing Manager for Ipswitch.
  • Data loss due to human error - Stop the zombie apocalypse
    Data loss due to human error - Stop the zombie apocalypse
    David Lacey, leading researcher in Cybersecurity; Paul Castiglione, Secure File Transfer Advocate, Ipswitch Recorded: Mar 17 2016 54 mins
    Implementing Compliance Controls for Data Protection in Regulated Industries

    Securing protected data and meeting data privacy compliance demands are top IT challenges, but recent survey results of over 500 IT pros globally show human and processing errors are the top reasons for data loss.

    The key is to stop zombie-like employee activity by protecting data in motion – including communication between service providers, government agencies, and customers, or integrating business systems across datacenters and the cloud.

    Join this session to understand the essential requirements, strategies and solutions for addressing data privacy laws and regulatory compliance while protecting your data in motion.
    The webinar will address key questions such as:

    • What are the top data protection concerns of your IT peers and how are their organization addressing them?
    • What are the essential IT control requirements protecting data in motion?
    • What are practical strategies to cost effectively meet requirements?
    • Which file transfer and sharing technologies help or hurt your data protection?

    We’ll also look at key trends, which are driving organizational demand for new approaches to technology:

    · Security has moved to a “de-perimeterized” model, where security is wrapped around data and applications to ensure protection.
    · Strong authentication and encryption are now a default expectation to safeguard sensitive data, both at rest and in transit, but what else is needed to ensure data protection and compliance?

    This session will be presented by David Lacey, a former CISO, founder of the Jericho Forum, and author of the original text that formed the basis of the ISO/IEC 27000 standards.

Embed in website or blog