Hi [[ session.user.profile.firstName ]]

Micro Focus UK

  • Date
  • Rating
  • Views
  • How to take control of your structured data
    How to take control of your structured data Mark Gower, Technical Presales Consultant, Micro Focus Recorded: Oct 11 2018 39 mins
    Nearly every business today is facing exponential business growth with huge volumes of information in diverse formats spread across numerous repositories. Industry and government regulations continue to escalate, requiring diligent compliance and introduction of defensible deletion across all electronically stored information.

    Join us to discover how you can control the growth of mission-critical databases by automating the migration or retirement of data while preserving its business value and protecting sensitive information.

    Learn how you can:
    -Discover and protect sensitive data - Automatically discover sensitive data including PII across repositories and apply intelligent format preserving encryption to sensitive information

    -Comply to GDPR - Delete relevant data and protect or mask sensitive information

    -Lower TCO - Reduce data footprint and storage costs including hardware, maintenance and administration

    -Federated data access - Simultaneous access to production and archived data using combined reporting and increase data accessibility utilizing conceptual search
  • How to tame your unstructured data
    How to tame your unstructured data Alan Carter, Technical Presales Consultant, Micro Focus Recorded: Oct 4 2018 58 mins
    As with many organisations, you are likely to store data in a number of systems and information repositories. But as data volumes continue to increase, you face significant business risks and loss of efficiency because you simply can’t control all the information contained in siloed repositories. Time is wasted looking for specific documents that have not been managed appropriately—and you may not be fully aware of what other information you actually have.

    Join us to discover how you can:

    -Clean up legacy data - Shine a light on dark data that is sitting unmanaged in email repositories, file shares, and SharePoint sites to save significant storage costs and gain better access to valuable information.

    -Automate records declaration - Minimise the cost and risk of declaring records to be managed in a records management system for long-term governance.

    -Intelligently migrate to the cloud - Analyse vast amounts of enterprise data and intelligently migrate targeted information to Cloud-based repositories for improved security, user access and lower overall storage costs.

    -Drive your future information governance strategy with better business insight.

    -Become compliant with regulations like GDPR, through the discovery of sensitive and personal unstructured data using document categorization and applied policy based actions to reduce risk and enhance compliance
  • How to automate secure content and records management, from creation to disposal
    How to automate secure content and records management, from creation to disposal Andrew Clake, Technical Presales Consultant, Micro Focus Recorded: Sep 27 2018 30 mins
    Many organisations are realising the benefits of integrating electronic records management into their enterprise content management practises. This is because of its proven mechanisms for proactively capturing and organising the documentary evidence that makes up the regular course of business.

    Join us to discover how you can significantly improve business efficiency and productivity, information security, and operational cost savings, whilst proactively managing both business content and records throughout the content lifecycle, from the point of creation through to disposal.

    Learn how you can:

    -Reduce errors and manual tasks - Improve the efficiency of staff and systems with automatic classification, folder creation, policy application and advanced disposal processing.

    -Have transparent and compliant management of critical content and records - Integration with Microsoft Office 365, OneDrive, and SharePoint without negatively impacting the collaborative or cloud experience.

    -Gain extensive security and access controls - improve privacy for managed content while simplifying the defensible disposal of content that has expired or has no residual value.

    -Lower retention management cost and complexity - Policy automation across multiple jurisdictions simplifies compliance with regulatory mandates such as privacy, freedom of information, FRCP, or DoD5015.2.
  • Fast, affordable, on-demand application security testing
    Fast, affordable, on-demand application security testing Simon Howard, Jon Taylor & Nadim Barsoum Recorded: Sep 26 2018 51 mins
    Demand for business-critical applications continues to increase, putting IT and development teams under pressure to enable innovation while maintaining security. Hackers are exploiting this pressure to uncover gaps in application security and launch cyberattacks on businesses.

    Join Micro Focus for this live demonstration to see how Fortify on Demand provides fast, affordable, on-demand mobile application security testing for organisations like yours.

    You’ll learn how Fortify on Demand leverages the most advanced, security-focused dynamic testing and static analysis technologies through a global infrastructure to help you:

    •Leverage market-leading application security testing technologies

    •Scale your organisation’s AppSec efforts, giving you immediate access to a global 24x7 testing service

    •Find, verify, and prioritize vulnerabilities to deliver actionable results faster

    •Protect your entire software development lifecycle (SDLC)

    Additionally, our software security partner ITKaa will be discussing how they help customers initiate and operate software security assurance programs based on the Fortify on Demand platform.

    Presenters:
    Simon Howard, Fortify Security Solutions Architect, Micro Focus
    Jon Taylor, Fortify Business Manager, Micro Focus
    Nadim Barsoum, Software Security Consultant, ITKaa
  • Live Webinar: Enabling complete privacy protection from legacy to modern IT
    Live Webinar: Enabling complete privacy protection from legacy to modern IT Simon Wilkinson, Anna Russell, Daniel Clift, Brendan Rizzo Recorded: Sep 20 2018 27 mins
    During this session, we’ll introduce you to modern-day data security challenges.

    You’ll learn how Micro Focus Voltage can help you to overcome these challenges, while also improving operational efficiency, compliance, and revenue generation.

    We’ll also share real-world examples of how Voltage has enabled the world’s leading organisations to:

    •Scale big data security, by protecting big data streaming into and beyond the data lake, allowing secure analytics to be enabled on protected data at massive scale

    •Reduce high cost of compliance for data protection regulations, by protecting card data immediately after capture and minimising PCI audit scope

    •Secure workloads to the cloud, by seamlessly protecting data consistently across hybrid IT infrastructure, accelerating new business models

    This live webinar will be presented by:

    - Simon Wilkinson, EMEA Cyber & Security Strategist, Micro Focus
    - Anna Russell, Head of Data Security Consulting, Micro Focus
    - Daniel Clift, Senior Sales Engineer, Micro Focus
    - Brendan Rizzo, Senior Sales Engineer, Micro Focus
  • Deploying multi-factor authentication on mobile platforms
    Deploying multi-factor authentication on mobile platforms Brent Kynaston, TriVir LLC and Kent Purdy, Micro Focus Recorded: Aug 29 2018 47 mins
    Do you have mobile platforms in your organization? Are you interested in eliminating usernames and passwords on iOS, Android and Windows mobile devices and tablets?

    In this webinar you’ll learn:

    • How multi-factor credential enrollment and usage can be provisioned along with enterprise identity into the VMWare AirWatch, IBM MaaS360 and MobileIron environments as well as others
    • How to enable convenient access with tighter security and an improved experience for users and mobile developers alike
    • How easy it is to escape inefficient password processes, get away from resetting forgotten passwords, and enforcing strong passwords that are easily forgotten

    Register today to hear from Brent Kynaston, Principal Solutions Architect at TriVir LLC, a Virginia-based Identity and Access Management (IAM) integrator, and Kent Purdy of Micro Focus.
  • Key trends and application security risks from the 2018 AppSec Risk Report
    Key trends and application security risks from the 2018 AppSec Risk Report Alexander Hoole, Manager, Software Security Research, Micro Focus Fortify Recorded: Aug 28 2018 49 mins
    Fortify on Demand analysis shows broad vulnerability in apps. The majority of web or mobile applications we analyzed had at least one critical or high severity issue. Furthermore, 1 out of 2 apps had critical or high vulnerabilities not covered by the OWASP Top 10 2017.

    The biggest and most severe data breaches that have affected both the public and private sectors all operate at the application layer. That’s why it is important that organizations take a holistic view and include application security and vulnerability assessment as part of their software development program.

    In this webinar, we will share results from our recent primary research study that reveals:
    • The top application security risks
    • Where these risks originate
    • How to remediate these risks
    • Best practices to protect your business
  • How the Enterprise can Utilise Open Source - Developing, Testing and Monitoring
    How the Enterprise can Utilise Open Source - Developing, Testing and Monitoring Rob Stock and Ray Tomany, Senior Solutions Architects Recorded: Jul 31 2018 45 mins
    You may rely on open source to develop, test or monitor your applications. In Micro Focus, our business depends on it.

    Every product that we release uses or adds value to open source software.
    In this webinar, we will demonstrate how you can protect and extend your organization’s strategic investment in open source software for application delivery management.
  • How to Deploy Your Service Desk Seamlessly, Flexibly and Quickly
    How to Deploy Your Service Desk Seamlessly, Flexibly and Quickly Nev Ward and Noel Hopkinson, Senior Solutions Architects Recorded: Jul 24 2018 25 mins
    While ITSM is often delivered via software as a service (SaaS), businesses today are looking for different deployment options. The world is in flux, and strategies evolve. Businesses using SaaS today may need to migrate to a private cloud in the future. Similarly, some companies have strict security and compliance policies around data sovereignty, making on-premises deployment mandatory. That’s why it’s important to factor deployment flexibility into your evaluation of modern ITSM solutions.

    This webinar will cover:
    1.How Flexible Container Technology provides Portability, Faster Time to Value, and Lower TCO
    2.How seamless upgrades can be achieved in conjunction with Codeless Configuration
    3.How you can now consume new and innovative capabilities with equal speed, whether the solution is on premise, in a SaaS model, or in the public cloud.
  • Extending Data Protector  & HPE StoreOnce into the Cloud
    Extending Data Protector & HPE StoreOnce into the Cloud Nigel Blake, Presales Consultant, Micro Focus & Brynn Harrison, Storage Consultant, Hewlett-Packard Enterprise Recorded: Jul 19 2018 59 mins
    Attend our informative 50-minute webinar to learn how Data Protector and HPE StoreOnce can utilise Cloud storage from AWS and Azure.

Embed in website or blog