Hi [[ session.user.profile.firstName ]]

End User Computing

  • XG Firewall: See It. Stop It. Secure It.
    XG Firewall: See It. Stop It. Secure It.
    Chris McCormack, Firewall Product Specialist, Sophos Recorded: Jan 17 2019 60 mins
    Sophos XG Firewall gives you everything you need to secure your network against advanced threats like ransomware, bots, worms, hacks, breaches and APTs. In addition, you get unparalleled network visibility that no other firewall on the market can deliver.

    Join this webcast to see how XG Firewall can transform your network security and performance. You’ll see:

    - How the threat landscape is evolving
    - How ransomware gets onto your network and spreads – fast
    - Essential protection you need in your firewall to secure your network
    - Best practices for deploying your firewall to provide a solid defense
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure
    Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Recorded: Jan 17 2019 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Tom Patterson, Chief Trust Officer, Unisys Recorded: Jan 16 2019 44 mins
    Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.

    Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.

    Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
  • Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Chris Marsh of 451 Research & Matt Crawford of Citrix Recorded: Jan 10 2019 55 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • Don’t Take the Bait. Stop the Phishing
    Don’t Take the Bait. Stop the Phishing
    Rippy Sekhon, Channel Sales Engineer, Sophos Recorded: Jan 3 2019 49 mins
    While big-name ransomware like WannaCry grabs the headlines, phishing is the cybercrime that’s consistently hooking organizations week in and week out. In fact, over 77% of organizations experience a phishing attack at least once a month.

    Join us for this informative webinar to learn more about phishing and how to stop it, including:

    - The evolution of phishing
    - How phishing works: the business behind the emails
    - Common tactics hackers use in their phishing attacks
  • Modernizing CA SiteMinder with Simeio IDaaS
    Modernizing CA SiteMinder with Simeio IDaaS
    Vipin Jain, Senior IAM Architect (Simeio), Ed Pascua, SVP Sales (Simeio) Recorded: Dec 28 2018 47 mins
    CA SiteMinder is installed in complex multi-product environments. Many times, customers can benefit from decreased costs and simplification and ease of operation by consolidating heterogenous IAM environments on a single vendor IDaaS platform. Listen in to see how Simeio Solutions helped a Fortune 500 retailer modernize its on-prem CA SiteMinder environment.
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Recorded: Dec 20 2018 53 mins
    Windows 10 and the proliferation of BYOD introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • What’s Ahead in Data Management in 2019?
    What’s Ahead in Data Management in 2019?
    Philip Russom, Senior Research Director for Data Management, TDWI; Sue Habas, VP, Strategic Technologies, ASG Recorded: Dec 19 2018 60 mins
    According to Bob Dylan, “The times they are a-changin’.” In the field of data management today, this means a number of exciting but challenging developments.

    Data itself is evolving into larger volumes from new sources in a broadening array of structures, containers, interfaces, and latencies. New data-driven business use cases are rising in prominence, especially those for analytics, self-service, and agile operations. In response to user demands, the software vendor and open source communities are supplying many new data platforms, tools, and capabilities—all purpose-built for modern data and its use cases.

    This webinar is a “must attend” for technical users and business managers who are facing these changes. The expert panel on this webinar will help attendees understand what’s ahead in 2019 and beyond for data management. Attendees can then apply that information to prioritize the data management changes they must address and how they will prepare via hiring, training, budgeting, making a business case, and adopting the right data platforms and tools.

    The webinar panel brings together a panel of experts, moderated by Philip Russom, TDWI’s lead analyst for data management. The panel will hit the hotter trends in data management, including:

    - Evolving data volumes, structures, sources, interfaces, and latencies
    - New data platforms, such as Hadoop, clouds, object store, and databases based on columns, NoSQL, graph, etc.
    - Cloud for data management, including data warehousing, integration, and analytics
    - Advancements in catalogs, glossaries, and metadata
    - Automation for development productivity and production optimization
    - Data-driven business practices that need modern technologies, namely analytics, self-service, intelligent operations, and data governance, stewardship, or curation
    - Examples of what successful real-world organizations are doing today
  • Demo: True IT Performance Optimization Needs to be Proactive, Not Reactive
    Demo: True IT Performance Optimization Needs to be Proactive, Not Reactive
    Frank Alber, Solutions Architect, ASG Technologies Recorded: Dec 19 2018 24 mins
    IT must ensure that capacity meets current and future business requirements in a cost-effective manner, but it takes more than just monitoring your infrastructure for current problems. It’s about preventing issues tomorrow, through proper planning and implementation today. Join us for the first in a three-part series of 30 minute demos to find out how ASG-TMON Performance Analyzer can help you move beyond reaction to prevention.

    During this demo, you will discover how TMON PA can:
    - Help improve IT systems and business application availability while controlling costs
    - Achieve IT utilization competency by providing an integrated and consolidated ASG-TMON performance management solution
    - Enable cross team collaboration and uniformity with centrally stored data that is summarized, analyzed, and presented/reported in commonly used distributable formats
  • The Road Forward with ASG and the Mobius Content Services Platform
    The Road Forward with ASG and the Mobius Content Services Platform
    David Downing, EVP, Product Management and Marketing, ASG; Greg Wilson, Director, Content Services, ASG Recorded: Dec 18 2018 61 mins
    The advances in technology and the growth of information are dramatically changing the landscape – constantly & expeditiously.

    ASG’s Mobius Content Services Platform (CSP) enables your organization to establish a digital automation foundation on which to transform your business.

    In this session, learn how ASG and its Mobius CSP delivers the technology to help you and your company thrive in the rapidly changing information management environment, prepare for the emerging digital automation economy and use Mobius to bring people, process and information together at digital speeds with web scaling.
  • Accelerating the ROI of product reviews
    Accelerating the ROI of product reviews
    Eunice Lee, Solution Engineer at Algolia and Amy Saekow, Marketplace Product amanger at Influenster Recorded: Dec 18 2018 33 mins
    Your customers’ voices are your overlooked revenue. Empower product reviews with search and discovery to drive user engagement and accelerate the path to the shopping cart.


    Join Eunice Lee, solutions engineer at Algolia and Amy Saekow, Marketplace Product Manager at Influenster on July 26 to learn about best ways to uncover meaningful feedback to jumpstart user engagement and stickiness, and drive growth.

    In this 30-minute webinar, you’ll learn:

    -How product reviews inform and steer buyers toward desired business outcomes
    - Best practices in leveraging product reviews to motivate user engagement and conversions
    - The future of utilizing product reviews as a strategic weapon
  • Transform Learning with Powerful, Scalable Desktops in Azure
    Transform Learning with Powerful, Scalable Desktops in Azure
    Adrian Wilson, Account Technology Strategist, Microsoft & Mirela Cunjalo, Dir. Product Mgmt., Teradici Recorded: Dec 13 2018 56 mins
    Join Teradici and Microsoft for a glimpse into how scalable desktop resources in the cloud can help in education.
    In this webinar, you'll learn how education institutions can leverage virtual desktops in the cloud to provide improved computing resources to students, strengthen security, and help make university IT operations more efficient. Teradici Cloud Access Software and Microsoft Azure enable a solution that will solve today’s desktop management challenges and drive improved access for students, personalized learning, and improved student outcomes.
    We’ll cover:
    •The unique benefits of hosting desktops and applications on Azure
    •A reference architecture for the education use case
    •The security and performance benefits PCoIP technology provides
    •Endpoint flexibility, from ultra-secure PCoIP Zero Clients to personal devices
    Don’t miss this webinar and a chance to learn how you can get started with Teradici and Microsoft.
    Q&A will follow.
    Register today!
  • Обзор рабочих станций Dell Precision и защищенных ноутбуков Latitude Rugged
    Обзор рабочих станций Dell Precision и защищенных ноутбуков Latitude Rugged
    Александр Белоглинцев, Региональный менеджер Dell Precision Recorded: Dec 13 2018 32 mins
    Специализированные клиентские продукты Dell — для пользователей с особенными требованиями. Рабочие станции Dell Precision для работы с ресурсоемкими приложениями. Защищенные ноутбуки Latitude Rugged для доступа к ИТ-инфраструктуре в полевых условиях.
  • 5 Steps to Defeat Most Cyber Attacks
    5 Steps to Defeat Most Cyber Attacks
    Chris Goettl, Director of Product Management for Security at Ivanti Recorded: Dec 11 2018 41 mins
    Since WannaCry changed the game in June 2017, cyber threats have continued evolve in intent and consequences. How can you protect your organization from today’s sophisticated attacks designed to have such a critical impact? You must prioritize risk.

    Join Chris Goettl, Director of Product Management for Security at Ivanti, as he looks at how attacks today are getting into networks, the damage they’ve done, and how focusing on the right threat vectors can go a long way toward protecting your organization from a similar fate.
  • Data Intelligence Drives Digital Business Success
    Data Intelligence Drives Digital Business Success
    Marcus MacNeill, SVP, Product Management, ASG Technologies Recorded: Dec 11 2018 39 mins
    In the digital era, an organization’s business strategy is inextricably linked to its data strategy.

    Yet increases in data volume, variety and velocity continue to challenge data management strategies and capabilities making it difficult for enterprises to effectively satisfy defensive (run the business) and offensive (drive the business) needs.

    In this session, we’ll explore the state of data management including key trends and their impact on the direction and evolution of ASG’s Data Intelligence offering.
  • Accelerating the path to the shopping cart
    Accelerating the path to the shopping cart
    Emily Hayman, Solutions Engineer at Algolia Recorded: Dec 11 2018 40 mins
    How e-commerce leaders think about product discovery

    Today’s consumers come to your site for experiences, and it is experiences that compel them to buy—and return for more.

    Join Emily Hayman, Algolia’s Senior Solutions Engineer and search expert, to learn about innovative user experiences that turn browsers into shoppers and move the needle with e-comm KPIs.

    In this 30-minute webinar, you’ll learn to :

    - Avoid simplistic views of the e-comm customer journey
    - Define and apply key elements of successful product discovery
    - Use concrete tips to improve your site’s user experience today
  • The Rise of Targeted Ransomware
    The Rise of Targeted Ransomware
    Michelle Drolet, CEO, Towerwall Inc. Recorded: Dec 11 2018 32 mins
    What is targeted ransomware?
    Are you susceptible?
    What can you do to defend against it?
  • Balancing Compliance and Value in Data Management Initiatives
    Balancing Compliance and Value in Data Management Initiatives
    Ian Rowlands, ASG; Bob Cumberbatch; Consultant; Gaurav Bansal, RCloud Consulting; Garry Manser, Visa Recorded: Dec 10 2018 60 mins
    Over the past few years, about 90% of data management has been dedicated to the operational requirements of data governance and regulatory compliance, but this is changing rapidly as financial institutions look to exploit and drive business value from data.

    At a growing number of institutions, close to 70% of data management resource is focused on understanding data and implementing analytics that help the business work faster, smarter and identify new opportunities.

    How can you shift the balance between operations and business analytics safely and successfully, and ensure investment in data management initiatives delivers proportionate business value?

    Join this webinar to find out more about:
    - The shift from operations to business led data management
    - Ongoing challenges and solutions of regulatory compliance
    - How to identify value in data and drive business benefit
    - Approaches to balancing operational and business needs
    - Technology tools and solutions to sustain the balance
    - Ensuring return on investment in data management initiatives
  • Deep Learning for Hackers
    Deep Learning for Hackers
    Joshua Saxe, Chief Data Scientist, Sophos Recorded: Dec 6 2018 54 mins
    Anyone who keeps up with technology news has read about deep neural networks beating human champions at Go, achieving breakthrough accuracy at voice recognition, and generally driving today's major advances in artificial intelligence. Little has been said about the ways deep neural network approaches are quietly achieving analogous breakthroughs in intrusion detection.

    Join this webcast as we demystify deep neural network (deep learning) concepts and prove how predictive security can protect against unknown threats.

    This session will cover:

    - How deep learning detects cyberattacks before they happen
    - Latest research from SophosLabs
    - How to launch your own deep neural networks
  • Трансформация рабочих мест
    Трансформация рабочих мест
    Вадим Тихонычев, Руководитель направления клиентских решений Recorded: Dec 5 2018 52 mins
    Pабота больше не ассоциируется с фиксированным рабочим местом. Работники хотят иметь возможности выбора, чтобы оставаться на связи и быть продуктивнымии там, где и когда им нужно. У них есть своя весомая точка зрения, свой взгляд на технологии. Чтобы успешно провести трансформацию рабочих мест, необходимо учитывать как потребности конечного пользователя, так и потребности ИТ. Модернизация оборудования решает лишь половину проблемы. Организации также должны проанализировать, как они управляют, поддерживают и защищают свои ПК, и найти более эффективные и результативные решения для удовлетворения потребностей современных сотрудников.
  • Expecting the future with 4SIGHT
    Expecting the future with 4SIGHT
    Eric Hanselman - Chief Analyst, Robert Mahowald - Senior Vice President, and Simon Robinson - Senior Vice President Recorded: Dec 4 2018 53 mins
    Planning for the future is a complicated business. Organizations have to align business objectives with market forces and the technology that they hope will support them. Early stage technologies can offer tempting options, but it can be hard to quantify the risk in using them.

    451 Research has distilled two years of conversations with their clients, demand-side research and the insight of their analyst team into a planning framework that can help organizations take on the future on their own terms. It’s not a quadrant, a wave or a platform. It doesn’t admonish you with prescriptive technology imperatives. It’s our collective view of the most important factors shaping tomorrow, so we can begin to plan today. It outlines trends that are pushing them and the assesses the maturity of the technologies that are behind them. We have identified four key "forces" that define all the trends we foresee: Universal Risk, Invisible Infrastructure, Pervasive Intelligence, and Contextual Experience. Whether you’re an enterprise, a vendor or a service provider, these forces, together or in part, are rocking your world, and 4SIGHT is an essential tool to plan for better future outcomes. This webinar will look at 4SIGHT capabilities and some of the outcomes that it can achieve, and explore some examples of 4SIGHT dialogs.

    Join us and see how you can raise your planning game!
  • Find out how to deliver 80% user adoption within 4 months
    Find out how to deliver 80% user adoption within 4 months
    Andrew Small, Binita Jilka from BT and Kieran Kelly, Lead Collaboration Practitioner, Sei Mani. Recorded: Dec 4 2018 22 mins
    Organisations spend money on tools that help make jobs easier, but employees aren’t always falling over themselves to use them. Introducing a new technology without getting your people on side won’t succeed. So how do you drive high levels of user adoption? Find out the secrets in transforming employee collaboration behaviours and achieving faster business results. This could be the reason of success or failure of your collaboration technology and digital workplace strategy.

    Andrew Small, Vice president, unified communications and contact centres, BT
    Kieran Kelly, Lead Collaboration Practitioner, Sei Mani
    Binita Jilka, Senior Manager, user adoption for unified communications, BT
  • VDI Strategy in a Multi-Cloud World: Building the Optimal Hybrid Cloud Platform
    VDI Strategy in a Multi-Cloud World: Building the Optimal Hybrid Cloud Platform
    Paul Murray, Senior Systems Engineer, Nutanix & James Hsu, Senior Technology Architect, Citrix Recorded: Dec 4 2018 60 mins
    Nutanix and Citrix have partnered to create a tightly integrated multi- cloud solution that simplifies and accelerates VDI deployments for companies of any size. With Nutanix InstantON for Citrix Cloud, the entire Citrix software stack is delivered as a 1-click service from the Citrix Cloud, attaching with zero effort to the on-prem Nutanix clusters powered by Citrix XenServer or AHV, the Nutanix native hypervisor. This hybrid mode tackles all the drawbacks of an exclusively on-prem or an exclusively cloud-based desktop delivery mechanism.

    In this webinar, you will learn how Nutanix and Citrix allow you to:
    · Take advantage of enterprise-class VDI benefits without any complexity
    · Simplify desktop management and operations while increasing security and compliance
    · Bring IT's focus back to the end-user with the help of Citrix XenApp and XenDesktop running on the Nutanix Enterprise Cloud
    · Safely transition to hybrid cloud using our tightly integrated VDI solution called Nutanix InstantON for Citrix Cloud
  • Improve Visibility of Your IT Resources & Achieve 179% ROI
    Improve Visibility of Your IT Resources & Achieve 179% ROI
    Jon Erickson, Vice President, TEI, Forrester & Gary Henderson, Director of Product Management, ASG Technologies Recorded: Nov 29 2018 54 mins
    Most IT professionals today face a lack of visibility into how their IT resources are being used. Disparate, silo-based tools create gaps in infrastructure coverage and data collection, resulting in a limited understanding of resource utilization and creating difficulties for collaboration and decision-making. Does this sound like your organization?

    Join guest speaker, Forrester Consulting’s Jon Erickson and ASG Technologies’ Gary Henderson to find out how ASG-TMON Performance Analyzer can provide you with the insights needed to accurately track and optimize resource use, control costs, improve service availability and effectively predict and plan with a single, consistent enterprise solution for analysis and reporting.

    An independent Total Economic Impact™ (TEI) commissioned study conducted by Forrester Consulting on behalf of ASG Technologies revealed that ASG-TMON Performance Analyzer delivers 179% ROI, Net Present Value (NPV) of $1.5M over three years, and savings of $54K in OPEX and $180K in CAPEX. Don’t miss your opportunity to find out more.
  • Dispelling 7 common myths of cloud collaboration and the digital workplace
    Dispelling 7 common myths of cloud collaboration and the digital workplace
    Andrew Small from BT, Dominic Elliott from Cisco and Stewart Wright from IR Recorded: Nov 29 2018 37 mins
    You want to transform team collaboration, but you’re just a little bit anxious on the how. All those concerns you have about things going wrong, complexity, disruption, cost and value, all mean that whilst you know it’s important, it’s still a daunting prospect. By dispelling those myths and giving you our opinion based on communication transformations with hundreds of organisations just like you, you’ll be in a better place to make an informed decision. And making the right choice means having a more connected workspace and reaping the benefits that collaboration and digital services can offer.

    Join Andrew Small, Vice president, unified communications and contact centres, BT; Dominic Elliott, CTO BT global relationship, Cisco; and Stewart Wright, General manager UK & Ireland, IR, to find out why making the switch is easier than you think.
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Jan 22 2019 11:00 am UTC 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Jan 24 2019 11:00 am UTC 38 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Data Center Transformation with HPE Microsoft Storage Solutions
    Data Center Transformation with HPE Microsoft Storage Solutions
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE Jan 24 2019 4:00 pm UTC 60 mins
    Learn how leading companies are improving application performance, reducing IT cost and simplifying their IT administration with Microsoft solutions from HPE. This free webinar introduces HPE Microsoft Storage Solutions that are ensuring business-critical performance and availability for Microsoft SQL Server, Exchange, SharePoint, Windows cloud and Azure Stack infrastructure. Customer case studies and solution offering details will show how to get enhanced SQL Server performance, Higher-density and scale Exchange environments, and simplified administration across your Windows environment with free plug-ins and automation tools.
  • Build for the future with voice search
    Build for the future with voice search
    Dustin Coates, Voice Search go-to-market lead at Algolia Jan 24 2019 5:00 pm UTC 30 mins
    Speaking commands into actions isn’t a futuristic fantasy anymore - it’s the present. Voice as a user interface has arrived and it can elevate the search and discovery experience.

    Join Dustin Coates, Voice Search Go-to-Market Lead, to learn how voice search and its capacity to transform everyday, conversational speech into functional, relevant responses can redefine the way you interact with the world.

    In this session we will cover:

    Why your business should implement voice search
    - Where voice search is useful
    - What good voice search UX looks like
    - How relevancy differs between voice search and typed search
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Jan 30 2019 11:00 am UTC 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Achieve Enterprise Scale with Microsoft Exchange on HPE Apollo Storage
    Achieve Enterprise Scale with Microsoft Exchange on HPE Apollo Storage
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE Feb 7 2019 4:00 pm UTC 60 mins
    Abstract: Learn how HPE hardware brings out the best in Microsoft Exchange Server 2019. This newest version of the leading email product relies on specific hardware features as never before. This session highlights the key features and benefits of Microsoft Exchange on HPE Apollo Gen 10 storage, and what you can expect for improved performance, security, and administration for your email system.
  • Best Practices for Windows Server 2019 on Intelligent Infrastructure
    Best Practices for Windows Server 2019 on Intelligent Infrastructure
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE; Chris Lionetti, Nimble Storage Technical Marketing Manager Apr 11 2019 3:00 pm UTC 60 mins
    Abstract: With Microsoft releasing a new set of server products, 2019 will be a busy year for Windows Admins and IT staff responsible for managing them. Learn how the right enterprise infrastructure products and tools will help ensure smooth upgrades, and the ability to unlock the highest levels of performance, availability & new functionality. Windows solution experts share info on best practices and the latest HPE Storage Integrations, plug-ins and tools covering SCOM, SCVMM, PowerShell and more.