Get powerful end user computing insights from influential EUC experts. Connect with thought leaders and colleagues to get the most up-to-date knowledge on effective approaches to get non-programmers to create working applications.
HP and Staples Business Advantage present:
Governance, Compliance & Print Security - Three keys to protecting business
• The rise of IoT and its evolving role in Security Challenges
• IoT Standards & Framework Developments in CyberSecurity
• Governance and its role in mitigating risk
• And More: Influential Mega Trends, Risks & Hidden Costs
Ron Chestang – GCIH, CEH, CISM
Print Security Advisor
Ron joined HP, Inc. from one of the big four consulting firms where he performed IT Security consulting in Oil and Gas Industry in Houston, Texas. Ron also has over 15 years’ experience as a Cyber Officer in the US Air Force where he received the nation’s most comprehensive cyber security training and the highest level AF security certifications. During his tenure with the AF, Ron participated in numerous cyber exercises and operations including wartime cyber efforts coordinating defense of the nation’s top secret information and coordinating offensive efforts.
Ron has numerous industry Cyber Security Certifications including the EC Council Certified Ethical Hacker, SANS GIAC Certified Incident Handler, and the ISACA Certified Information Security Manager Certification.
Technology Account Executive
Staples Business Advantage
Mike Mayberry our Staples Technology Solutions Healthcare Technology Account Executive has been part of the Staples family for 10 years. Mike started with Staples on our Small Business Account sales team before moving to our retail team as a Sales Manager. Mike joined the Technology Commercial Contract team in 2011 providing IT solutions to our Mid-Market customer. After spending two and a half years with the Mid Market team Mike transitioned to the Commercial team working with F-500 customers. Recently Mike helped launch the new Healthcare team within Staples Technology Solutions and is now working to provide relevant IT solution thought-out our Healthcare base.
Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?
IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.
Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
Gain valuable insight from our expert speakers.
Webinar topics include:
Cross Company Platform Adoption
-How IT Managers can make every department happy
-How to deal and adapt when everything changes
Multi- Communication Solutions
Communication is Key
-What to consider when looking at a new communication plan
Simon Dudley, Director of Product Strategy, Logitech
Simon Dudley is Director of Product Strategy for Logitech’s Video Collaboration business. Dudley joined Logitech in August 2016. Prior to that, he operated Excession Events, where he consulted organizations on optimizing their use of video collaboration. Dudley also spent a number of years working in sales, marketing, and product management at companies like LifeSize and Polycom, which has given him a holistic view of the video conferencing market.
Dudley is an expert in the design, implementation and use of visual collaboration tools. He is a sought-after speaker in the collaboration industry, a published author, and the recipient of two patents. A native of the United Kingdom, Dudley currently resides in Austin, Texas.
Zane Carroll, Product Development Manager, Staples Business Advantage
Zane Carroll leads the Product Development Office at Staples Technology Solutions. He is collegiately trained as an Audio engineer with a passion for all things technology and quality sound. Throughout his time at Staples, he has supported our Computing & Printing hardware, managed services, and supported the launch of many new product categories, including the tablet, mobility, and most recently Device as a Service offerings here at Staples.
When deployed successfully, managers say that DCIM software has revolutionized their operations. It lowers risk, it makes it easier to push utilization levels higher, and it enables effective capacity provisioning and planning, among other benefits.
For others, however, the software has not achieved the ROI they expected. This is often because DCIM is an enabling technology as much as it is a management approach. To realize DCIM's full value, project leadership, operational process and cross-domain collaboration are essential. This means that the cost – and value – of a DCIM installation goes well beyond the software license; new internal operational, business procedures and workflows are required.
This webinar explores these issues in detail and addresses the key question: "Is there any ‘easy’ button’ for DCIM to be successful?" Tune in to find out!
Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.
About the Speakers:
Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.
Maria L. Allen is Senior Director and Global Head of Unisys' Financial Services Portfolio Solutions. In this role, Maria is responsible for building new products and services across all regions, platforms and channels ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives.
For more information on our Advanced Analytics offerings contact us at firstname.lastname@example.org and visit http://www.unisys.com/analytics
Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.
During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be.
The demonstration will cover how to:
•Configure PCoIP Zero Clients for off-site employees or contractors
•Determine the best WAN settings to recognize out-of-office devices
Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.
It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?
Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellanox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
The rapid rise of hybrid cloud and multi-cloud infrastructure is enabling business agility and cost reduction, but at what price to infrastructure security? Concerns over increased hacking and malicious attacks, regulatory compliance, and internal auditing are driving infrastructure decision-makers to think again about protecting sensitive data in multiple cloud workloads, and what security solutions to spend their budgets on. At the same time, the lack of skilled talent, rapidly evolving cloud security offerings, and the management of legacy environments is creating additional strain on protecting data.
In this session, Rory Duncan, Research Director with 451 Research will outline market trends and disruptive factors facing the security services market, sharing demand-side primary research and providing insight into areas of innovation.
How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?
Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.
Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.
We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.
Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
In a fast-moving, 24/7 healthcare environment, doctors and nurses cannot afford any impediments to delivering the best possible patient care. To ensure that the hospitals, physicians, nurses and other care providers it serves receive the best client experience possible, Allscripts offers a proactive application monitoring service that checks for potential problems that could slow down or disrupt the use of its mission-critical healthcare IT systems.
Initially launched in 2006, the proactive support offering monitors clients’ IT infrastructure and use of Allscripts solutions. Since its introduction, Allscripts has been able to improve client experiences in a way that has had a significant impact on business growth and client retention.
In light of recent high profile cyberattacks, notably WannaCry, it is now more important than ever for organisations to take stock of their current IT environment and mitigate security risks caused by the ever-changing threat landscape.
In fact, a recent report by iGov found that nearly 76% of participants had experienced a cyber-attack, and 50% were ransomware victims in the last twelve months.
This webinar focuses on how organisations can best meet this challenge and also explored the most common pitfalls faced and offer expert advice to combat this. Stuart Rogers, IT Security and Technical Architecture Manager at Cheshire Constabulary, shares his organisation’s story.
Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.
The retail industry is bursting with digital innovation driving change. This session will review:
•How differentiation demands digital maturity
•Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
•The role of cloud services and its impact on customer experience, agility, efficiency and risk
Malwarebytes & Mag-Securs ont organisé un webinaire autour de l'une des menaces les plus inquiétantes de ces derniers et prochains mois. Le cabinet Osterman Research a réalisé cet été pour le compte de Malwarebytes une étude très complète auprès de 180 entreprises françaises sur les ransomwares et leurs conséquences. Les conclusions sont sans appel : les ransomwares figurent désormais parmi les principales menaces dont peuvent être victimes les entreprises et la tendance n'est clairement pas à un ralentissement. La situation est désormais perçue comme inquiétante ou très inquiétante pour la plupart des 180 entreprises interrogées
Ce webinaire a présenté les résultats de cette étude ainsi qu’une analyse du ransomware jaff. Il a été suivi par une session de questions/réponses très complète.
Saiba mais sobre as preocupações dos seus consumidores!
O Unisys Security Index mede as preocupações dos consumidores em questões relacionadas à segurança nacional, pessoal, financeira e da Internet. O Unisys Security Index mostrou um aumento de 20% na preocupação de segurança geral em 2017. Saiba mais neste webinar onde iremos apresentar os detalhes do estudo e falar sobre como lidar com ameaças cibernéticas, o que os consumidores pensam sobre Internet das Coisas, e como aumentar a confiança de seus consumidores enquanto sua empresa avança na Transformação Digital.
Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys. Possui mais de 20 anos de experiência no setor de segurança. Na Unisys, ajuda a construir um mundo mais seguro, ao mesmo tempo em que transforma o setor de segurança com uma inovadora abordagem de microssegmentação, bem como a arquitetura de segurança adaptativa e a inteligência de ameaças cibernéticas.
The hyperconverged infrastructure space is exploding! It can be hard to keep up with the leading technologies in this incredibly fast growing market. Hear how Pivot3’s unique architecture tackles the data center complexity problem and simplifies IT deployment, performance & datacenter management. We’ll discuss how Pivot3’s newest product, Acuity, delivers 6X the performance and is capable of supporting 2X – 3X more VMs than conventional HCI solutions.
¡Conozca las preocupaciones de sus clientes y actúe!
El Unisys Security Index mide las preocupaciones de los consumidores en problemas relacionados a la seguridad nacional, personal, financiera y en Internet. El Índice Global de Seguridad mostró en 2017 un aumento de 20% en la preocupación general de seguridad. Aprenda más en este webinar sobre los detalles del estudio, cómo hacer frente a ciber amenazas, qué opinan los consumidores sobre el Internet of Things, y gánese la confianza de sus consumidores mientras continúa su proceso de Transformación Digital.
Leonardo Carissimi, Experto en Seguridad y Director de Soluciones de Seguridad en América Latina de Unisys. Cuenta con más de 20 años de experiencia en la industria de seguridad. En Unisys, ayuda a construir un mundo más seguro mientras transforma la industria de seguridad con el innovador enfoque de micro-segmentación, así como con la Arquitectura de Seguridad Adaptativa y la Inteligencia de Ciber-Amenazas.
It’s no secret that traditional anti-virus products are consistently falling short of the mark, particularly when faced with the clever orchestration of a Ransomware attack.
With half a million new downloads each day and more than 3 million daily remediation events using our software, there is nobody better placed than Malwarebytes to help defend you from the increasingly clever tactics of the cyber-criminal.
Please join us on our webinar where we will give you visibility into why these attacks are succeeding, how you can best defend your organisation against them and what to do in the event they are successful.
Ransomware has gone from “on the radar” to a Code 5 level threat with the rise of “ransomworms” snaking through global networks in hundreds of countries. Your employees are the front line of defense, and IT and security teams are tasked with protection, detection and response. But nobody knows how the next ransomware strain will take shape and teams are rarely, if ever, properly coordinated.
In this webinar, you will learn:
• Tips to help end users recognize and avoid ransomware.
• Tips to help IT / systems administrators minimize vulnerabilities and risks to protect against ransomware.
• Tips to help security teams detect and respond to ransomware attacks.
About our presenters:
Dr. Al Hartmann is the Chief Scientist at Ziften since 2009, focused on data analysis of user and endpoint behavior to drive critical situational awareness of enterprise cyber activity for security and operations management. Prior to co-founding Ziften, Dr. Hartmann was a senior researcher with Symantec's Research Labs and Technology Scouting Group, performing research in system cybersecurity and application quality of service.
Michael Levin is the founder and CEO of the Center for Information Security Awareness. Prior to founding CFISA, Levin had a distinguished 30-year career in at the United States Department of Homeland Security. Levin served as the Deputy Director of the National Cyber Security Division, as well as the served as the Branch Chief of the U.S. Secret Service Electronic Crimes Task Force program in Washington DC. He was a member of the Secret Service Electronic Crimes Special Agent program and worked around computer forensics and cybercrime investigations for over 15 years.
Digital disruption in the banking arena is accelerating. Pure digital firms have raised the bar for customer expectations regarding convenience, service, and speed. Fintech companies are taking over profitable areas such as payments, lending, and retail investments. In this new world, banks need to create a seamless, personalized customer journey. This journey must be marked by intuitively grasping and fulfilling the customer’s next demand.
But how do banks create this sought-after customer experience? The answer is found in building a cohesive ecosystem incorporating the perfect blend of both digital and physical touchpoints.
Discover how to grow wallet and market share by making customer journeys easy and frictionless across all touchpoints. As you simplify the way customers interact with your bank, you will reduce costs and free up both staff and capital, which you can then apply to support further innovation and growth.
About The Speakers:
Eric Crabtree, VP & Global Head, Financial Services, Unisys
Eric Crabtree is the global leader for Financial Services. In his current role, Eric is building a cohesive strategy for the financial services vertical, by leveraging the extensive domain expertise across the Unisys portfolio and ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives.
Daniel Latimore, Senior Vice President, Banking, Celent
Daniel W. Latimore, CFA, is the Senior Vice President of Celent’s Banking group and is based in the firm’s Boston office. Mr. Latimore’s areas of focus include the banking ecosystem, digital and omnichannel banking, and innovation.
The European Union’s General Data Protection Regulation (GDPR) that goes into effect on 25 May 2018 expands the meaning of personal data, mandates when such data can be collected, and enforces full transparency and consent from the user. Organizations of all types processing data from EU residents must evaluate and likely make changes to their enterprise mobility management practices in order to adhere to the new law or face severe penalties.
Join this webinar to understand what GDPR means for infrastructure and operations professionals that are responsible for mobile and endpoint strategy to make sure your organization is compliant from day one.
We will review the most important sections of the law related to enterprise mobility from an administration and end user perspective as well as the implications for BYOD programs. EMM should be leveraged to meet GDPR requirements and you will learn how a mobile application management solution like Apperian supports privacy and mitigates risk by managing corporate data while leaving personal data untouched.
A converged APM/IPM solution can facilitate true root-cause analysis from an end-to-end IT service management (ITSM) perspective, inclusive of both supporting and customer-facing IT services, as well as across multiple service lifecycle stages. In addition, by having all service team members share an easy-to-use interface that is tailored to each of their requirements minimizes learning curves, enhances operational efficiency and ensures user satisfaction by providing a production-grade monitor to IT staff that are working in staging environments.
Attend this webinar to discover how a converged APM/IPM solution can be leveraged effectively in pre-production to eliminate bottlenecks in testing, delays, re-work or increased deployment risk.
Join this webinar to learn what is new in Canonical OpenStack Pike. Product Manager Mark Baker will highlight some of the new features in OpenStack Pike as well as many of the updates to underlying technologies such as OpenvSwitch and Ceph that are fully integrated with Pike. We'll discuss how to upgrade from Ocata to Pike using OpenStack Charms and how you can get going with Pike from scratch in a matter of hours.
In our fourth Cybercrime Tactics & Techniques webinar, we are going to take a deep look at what threats got our attention the most during the last three months and what we expect to happen moving into the last quarter of 2017. Thus far, the year has brought us outbreaks of ransomware and breaches across the globe, making it more important than ever to implement multi-vector protection.
Consumers are enjoying a rapidly expanding choice of how, when and where they bank. However, banks must now manage the extra responsibilities and risks these new channels bring.
In APAC, the Unisys Security Index™ revealed consumers are more concerned about bankcard fraud, ID theft and cyber security than about physical threats like the threat of war/terrorism and natural disasters.
So how can banks balance the need to digitally transform, maintain privacy and security but still provide a seamless, personalized and trustworthy customer experience?
We will cover:
The 10 steps banks need to take to get digital transformation right, and how to improve customer experience and trust during this journey.
How the CISO’s office can be part of the digital transformation journey, embedding security as part of the development lifecycle from the start as a value added component and not a burden as an afterthought.
Innovative technologies like predictive analytics and biometrics can help provide a seamless, frictionless experience for customers. But how can they be applied without seeming invasive?
Nicholle is an experienced senior financial services executive with almost 20 yrs experience working in financial institutions and corporates. She has extensive knowledge across financial services, payments, consumer and business banking, IT, analytics, marketing and strategy.
Leon Manson, Lead Cybersecurity Architect for Unisys APAC, is responsible for the range of real-time protection solutions delivered through Unisys Managed Security Services. Leon has over 25 years IT security industry experience in consulting and systems engineering for startups, tier-one vendors, and as a business owner.
Ian Selbie is responsible for Unisys Financial Industry solutions in APAC focused on enhancing business processes and compliance in financial institutions including omnichannel, financial crime prevention, enterprise payments and case management solutions.
Of course you know Ubuntu. Your developers use it everywhere. But you're from an enterprise, where the IT Security team has the final say. As they should. Before your app built on Ubuntu can go into production, you need their signoff. So what's the security story with Ubuntu? How is it hardened? Are there best practices around patch management? What about standards and compliance? How can Canonical help?
In this webinar, join Dustin Kirkland to learn:
>How Ubuntu is secured out of the box
>How we ensure that we are compliant
>How Canonical ensure customers get a first class support experience
>Why Ubuntu has the leading edge in security
As more and more applications move to the public cloud, many wonder if it still makes sense to maintain a data centre apart from regulated workloads. In this presentation Mark Shuttleworth, Founder and CEO of Canonical and Andres Rodriguez, MAAS engineering manager, will look into how devops and infrastructure managers can build an agile data centre with a developer agility and a cost base that can compete with public cloud.
In this presentation you will learn:
* How to build a low cost / high usage smart data centre based on automation
* Most common use cases best suited for bare metal provisioning
* How MAAS, Canonical's server provisioning tool, can be used to build your agile data centre
Renting infrastructure on demand is the most disruptive trend in IT in decades. In 2016, enterprises spent $23B on public cloud IaaS services. By 2020, that figure is expected to reach $65B. The public cloud is now used like a utility, and like any utility, there is waste. Who's responsible for optimizing the infrastructure and reducing wasted expenses? It’s DevOps.
The excess expense, known as cloud waste, comprises several interrelated problems:
•Services running when they don't need to be
•Improperly sized infrastructure
There are a few core tenets of DevOps that can be applied to reducing cloud waste:
•Rapid useful feedback
Join Chris to learn why you should include continuous cost optimization in your DevOps processes. Automate cost control, reduce your cloud expenses, and make your life easier.
If ever there were a truly asymmetric battle, it’s in the war for the endpoint. Enterprises must apply defense as broadly and consistently across hundreds or thousands of endpoints as best they can. But to penetrate an organization, the attacker only needs to succeed with one that exposes a weakness. And from the network, to the endpoint itself, to the user that interacts with malicious content, these weaknesses may be many.
There is a new array of tools in the fight for the endpoint that go beyond traditional monitoring and controls, or the trend toward applying machine learning to the art of defense. In this webinar, Scott Crawford of 451 Research and Ofer Israeli of Illusive Networks will examine these issues and opportunities, and shed light on deception technology and other new tools for intelligent defense at the endpoint that can recognize and contain a threat before it has a serious impact.