Hi [[ session.user.profile.firstName ]]

Slashdot Media

  • Date
  • Rating
  • Views
  • Mobile Security from Platform to Device: What You Need to Know Now Mobile Security from Platform to Device: What You Need to Know Now Scott Steinberg, CEO,TechSavvy Global Recorded: Sep 23 2016 20 mins
    By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications.
     
    Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles.  This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
  • Mobility, Cloud, and the Enterprise: Mobile Application Strategies for Today Mobility, Cloud, and the Enterprise: Mobile Application Strategies for Today Scott Steinberg, CEO,TechSavvy Global Recorded: Sep 23 2016 18 mins
    By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications.
     
    Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles.  This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
  • Mobility vs. Security: Balancing Accessibility & Efficiency against Threats Mobility vs. Security: Balancing Accessibility & Efficiency against Threats James Morrison, Computer Scientist with the Federal Bureau of Investigation Recorded: Apr 14 2016 36 mins
    In today’s application economy, IT and business units are focused on increasing employee effectiveness and driving customer loyalty with a broad range of new ‘mobile-first’ applications.

    Having ‘an app for that’ offers many benefits – consumer-like experiences, increased use of enterprise applications, support for mobile workforce and a global customer base, to name just a few. But with each new mobile app – and mobile user – comes another attack surface and possible source of data loss or regulatory infraction. What now?

    Attend this Slashdot webinar to hear our expert panel discuss the challenges facing IT, developers and DevOps teams today, and what enterprises of all sizes should be doing to ensure their applications and users aren’t at risk. Attendees will hear:

    -How MDM is evolving, and what that means to users and IT
    -Methods of controlling devices that access your network and apps – simply
    -Why provisioning matters, and how to accelerate onboarding and retiring of users and devices
    -How to give users secure corporate access while retaining their existing mobile experience
    -Why content is king – and how to collaborate securely no matter how large the group
    How to give access behind the firewall – without messy configuration settings or VPNs
  • Monitoring Docker Containers in a DevOps Context Monitoring Docker Containers in a DevOps Context Chris Riley-DevOps analyst, Fixate IO & Faisal Puthuparackat-Sr Engineer, Druva Recorded: Jan 26 2016 56 mins
    DevOps teams are challenged with monitoring, tracking and troubleshooting issues in a context where continuous integration servers and DevOps tools emit their own logging data. Machine data can come from numerous sources, and CD tools may not agree on a common method. Once log data has been acquired, assembling meaningful real-time metrics such as the condition of your host environment, the number of running containers, CPU usage, memory consumption and network performance can be challenging
  • EMM in Action with MobileFirst Protect EMM in Action with MobileFirst Protect John Nielsen, IBM MobileFirst Protect Recorded: Dec 28 2015 31 mins
    In an increasingly mobile workforce, mobile security challenges continue to bubble up to the surface. New devices, OSs and attack vectors can keep a team of security professionals busy.
    This 3-part TechBytes series takes an in-depth look at the evolution of enterprise mobility and the how securing devices, users and applications has rapidly evolved over the past few years. Viewers will leave with actionable insights as to how to ease the mobile security burden for their enterprise.

    Part 3, EMM in Action with MobileFirst Protect offers hands-on demonstration of EMM best practices, delivered by John Nielsen of Fiberlink (formerly MaaS360). Here, viewers will see exactly how to demonstrate the ROI of EMM.
  • EMM Platform Must-Haves for Harnessing Mobility ROI EMM Platform Must-Haves for Harnessing Mobility ROI John Nielsen, IBM MobileFirst Protect Recorded: Dec 22 2015 25 mins
    In an increasingly mobile workforce, mobile security challenges continue to bubble up to the surface. New devices, OSs and attack vectors can keep a team of security professionals busy.

    This 3-part TechBytes series takes an in-depth look at the evolution of enterprise mobility and the how securing devices, users and applications has rapidly evolved over the past few years. Viewers will leave with actionable insights as to how to ease the mobile security burden for their enterprise.

    Part 2, EMM Platform Must-Haves for Harnessing Mobility ROI gives viewers a real-world list of features and benefits that business should expect from their EMM solution. This presentation by John Nielsen of Fiberlink presents a laundry list that IT and business teams alike should use when sourcing an enterprise mobility management solution and discusses how and why each item fits into the big picture.
  • Mobile Security is More than Just Mobile Device Management (MDM) Mobile Security is More than Just Mobile Device Management (MDM) Jimmy Tsang, IBM MobileFirst Protect Recorded: Dec 21 2015 30 mins
    In an increasingly mobile workforce, mobile security challenges continue to bubble up to the surface. New devices, OSs and attack vectors can keep a team of security professionals busy.

    This 3-part TechBytes series takes an in-depth look at the evolution of enterprise mobility and the how securing devices, users and applications has rapidly evolved over the past few years. Viewers will leave with actionable insights as to how to ease the mobile security burden for their enterprise.

    Part 1, Mobile Security is More than Just Mobile Device Management (MDM),

    Fiberlink expert Jimmy Tsang discusses the evolution of devices, applications and use cases that have led to the evolution of Mobile Device Management (MDM) into Enterprise Mobility Management (EMM) which takes a holistic view of device, user, application and back-end infrastructure, enabling end to end security in ways not previously available.
  • DevOps Tools in a Continuous Delivery Pipeline DevOps Tools in a Continuous Delivery Pipeline Chris Riley, DevOps Analyst Recorded: Dec 10 2015 40 mins
    Is your team ready for continuous code delivery? In today’s “there’s an app for that” environment, business units demand new and competitive features as quickly as they can think of them. However, even though the adjectives used to describe DevOps – release, speed, automation – are all about moving forward, doing so without an idea of where you’ve been or where you’re heading leads to unsustainable development operations.

    Attend this informative TechByte sponsored by Sumo Logic and presented by Slashdot Media to learn what is takes to make adoption of a DevOps strategy a success, and avoid the “DevOps didn’t work for us” lament.
    Attendees will learn:

    · How to gain visibility into your entire development pipeline
    · Methods for supporting faster release
    · What tools matter – and how to utilize them
    · The role of monitoring and how to achieve ‘single pane of glass’ views
    · Why legacy waterfall development can’t meet changing demands

    Don’t hesitate – register now for this timely event and learn how to increase agility of your development and operations teams.
  • Linux without Limits: Enterprise Scalability and Performance Linux without Limits: Enterprise Scalability and Performance Dr. Angel Diaz, IBM VP of Cloud Technology & Architecture | Donna Dillenberger, IBM Fellow | Stepven Dickens, LinuxONE SME Recorded: Dec 3 2015 64 mins
    Open Source is growing like wildfire, and with it the popularity of Linux, the OS that increasingly drives how business interacts with the world. Linux’s popularity spans every industry, fueling increasing demand to exploit Linux in the enterprise for business-critical applications and for service providers anxious to offer enterprise-grade Linux to their cloud clients.

    This means new requirements that must be addressed to ensure Linux deployments are enterprise ready- -- that means capable of massive transaction volumes at unprecedented scale, and built not to fail or crack - ever. Getting it right means growth and opportunity. Getting it wrong means running hundreds or thousands of servers, adding cost, complexity, latency and vulnerability—and lost business. How to get it right? Attend this complimentary webinar presented by Slashdot Media to hear IBM Linux experts Donna Dillenberger, Angel Diaz and Steven Dickens discuss how to get from open source project to enterprise-grade Linux with IBM LinuxONE.

    Attendees will learn:
    •What’s driving the demand for Enterprise-grade Linux
    •How Ecosystem communities have come together to ensure open solutions
    •How to leverage the latest technology platform to turbocharge Linux and open source apps
    •New ROI models that enable seamless migration to LinuxONE platforms
    •What enterprises and service providers can do now to begin the journey to enterprise Linux

    Don’t hesitate – view this webinar now to see a live demo and learn how enterprise Linux can help your business today.

Embed in website or blog