Hi [[ session.user.profile.firstName ]]

End User Computing

  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Sep 12 2019 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • Your “How To” Guide for Data Wellness: X-Ray, Diagnose, Treat
    Your “How To” Guide for Data Wellness: X-Ray, Diagnose, Treat
    Susan Laine, ASG Technologies & Dan Montgomery, North Highland Recorded: Sep 12 2019 46 mins
    Understanding your data is the first step to advancing data maturity.
    - Do you know what critical factors to look for to ensure a healthy data environment?
    - Are you able to find the data you need quickly and do you know where it came from?
    - Do you trust the data and insights coming from your analytical environments?
    - Can you disrupt the marketplace, succeed in the digital world and modernize with your current portfolio of data?

    Success with data depends on a mature set of processes built on a solid foundation. Without that maturity, decision making is delayed, data-related compliance is at risk and digital transformation is difficult.

    ASG & North Highland have partnered to deliver an automated data x-ray, assessment and treatment plan for customers needing to diagnose their current data state, identify their desired future state and map out a path to get to healthy data maturity.

    Join this webinar to learn how ASG & North Highland can prescribe a foundational data-fit program that will elevate and activate your business to:
    - Open communication about information needs and usage across processes and functions
    - Align information and business strategy
    - Improve fact-based decision-making regarding corporate information direction
  • How to protect your Citrix deployments and modern applications with Citrix ADC
    How to protect your Citrix deployments and modern applications with Citrix ADC
    Patrick Coble & Frank Bunger Recorded: Sep 12 2019 33 mins
    Explore the major security features that Citrix ADC offers and deployment techniques to implement them in your organization. Citrix ADC is a security engineer’s Swiss Army knife and you will discover tools you may not know about, including Web Application Firewall, GeoIP and bad IP reputation blocking. You’ll also hear about Citrix ADC denial of service (AppQoE) protections along with SmartAccess, multifactor authentication and more.

    If your Citrix ADC is acting as a gateway, join this session to see how it can further secure your Citrix deployment.
  • Address growing cybersecurity threats with a people-centric security approach
    Address growing cybersecurity threats with a people-centric security approach
    Akhilesh Dhawan & Robin Manke-Cassidy Recorded: Sep 11 2019 46 mins
    In order to focus on people and security in tandem, you need a workspace and network that are context-aware and intelligent enough to provide insights into both the end user and the admin sides. The Citrix people-centric approach to security enables an individualized security perimeter that follows each user, combining policies, analytics, and information about user device, location, access rights, and expected behaviors to secure all types of enterprise apps and data. Join this session to learn how this dynamic approach proactively protects information, simplifies management, and provides visibility across increasingly complex hybrid and multi-cloud environments
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Sep 10 2019 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • What's new in Citrix Networking
    What's new in Citrix Networking
    Chalan Aras & Mihir Maniar Recorded: Sep 10 2019 44 mins
    Transforming IT with a hybrid and multi-cloud infrastructure requires innovation and agility. Come learn about the latest advances in the Citrix Networking portfolio, including Citrix ADC, Citrix SD-WAN, Citrix Application Delivery Management and Citrix Intelligent Traffic Management
  • Part 1 SQL End of Support Readiness: What to Know and How to Prepare
    Part 1 SQL End of Support Readiness: What to Know and How to Prepare
    Kaz Traverso, Solutions Specialist; David Bloxham, Marketing Manager Recorded: Sep 10 2019 20 mins
    Make sure you are fully informed about the upcoming end-of-support for Microsoft SQL Server 2008 and 2008 R2 – and ensure your organisation is ready.

    Once SQL Server 2008 reaches its end of support deadline on 9th July 2019, security updates will no longer be released for it, leaving systems open to outside threats, and the risk of non-compliancy with industry requirements such as GDPR.

    In part 1 of our 4-part series to help with your readiness Solution Specialist from SoftwareONE, Kaz Traverso, and Marketing Manager, David Bloxham, will discuss the essential pieces of information to help with your strategy planning, including:

    •What is ‘End of Support’ and what does it mean
    •What are the timelines and other upcoming End of Support products
    •Security risks and impact on ISO and GDPR compliance
    •Operational constraints
    •How to understand your risk – discovery tools and assessment
    •What are your options – stay on-prem or move to Azure or hybrid approach?

    Within the webinar series in part 2 we discuss the cloud migration options and process in more detail, part 3 looks at licensing and commercial options and in part 4 we share best practice governance for hybrid environments for cloud management and cost control.
  • The Digital Workspace, what’s holding you back?
    The Digital Workspace, what’s holding you back?
    Nico Zieck, Workspace Architect Recorded: Sep 10 2019 34 mins
    Gartner predicts that over the next several years, the greatest source of competitive advantage for 30% of the organizations will come from the workforce’s ability to creatively exploit emerging technologies. If you are considering introducing digital workspace into your organization you know it enables new, more effective ways of working; raises employee engagement and agility; and exploits consumer-oriented styles and technologies. But what is keeping you?

    Introducing a digital workspace does not necessarily mean a “rip and replace” of the existing technologies that you have invested in over the past year. Or you may be wondering how you can keep using legacy or custom applications in a unified workspace.

    Please join us for this live webinar and Q&A, hosted by Nico Zieck, Workspace Architect at Liquit, in which he will demonstrate how you move from a traditional, technology driven to a modern, unified workspace in three easy steps overcoming several of the most common obstacles.

    We look forward to welcoming you.
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Sep 5 2019 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • Faster Together: Accelerating Your Team's Productivity
    Faster Together: Accelerating Your Team's Productivity
    Laura Stack, bestselling author Recorded: Sep 4 2019 56 mins
    Laura Stack’s FAST model mobilizes teams to be the most effective they can be, while keeping each other’s best interests at heart. Teams learn to work together Fairly, accept Accountability, apply Systems Thinking, and maximize available Technology.

    Watch this webinar to learn how to better understand the abilities of your team and how each member makes things go.
  • The Transformative Effect of Data Science and Machine Learning
    The Transformative Effect of Data Science and Machine Learning
    Tim Vidas - Senior Distinguished Engineer, Nash Borges PhD - Sr Director of Engineering and Data Science Recorded: Sep 3 2019 58 mins
    The combination of big data and machine learning is making it possible for defenders with limited resources and expertise to detect and respond to unknown threats faster than ever before.

    In an industry forever locked in an adversarial battle with increasingly sophisticated actors, Tim Vidas, Distinguished Senior Engineer, and Nash Borges PhD, Sr Director of Engineering and Data Science at Secureworks explain how the power of machine learning combined with human intelligence have become fundamental to defending the digital economy.

    You will learn:

    - What the threat looks like on a global scale, as observed through Secureworks' Incident Response engagements
    - Data Science 101, including definitions of Data Science (DS), Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL)
    - How our detectors work, including Domain Generation Algorithm (DGA) Detection
  • Security for Azure with Trend Micro and SoftwareONE
    Security for Azure with Trend Micro and SoftwareONE
    Gavin Evans, Trend Micro and Doug Vincent-Townend, SoftwareONE Recorded: Sep 2 2019 21 mins
    Cloud, by its nature, can provide enhanced security because of the shared security model.

    In the case of Azure, security responsibility is shared between Microsoft and the customer.

    For IaaS, Microsoft is responsible for physical security, portions of host infrastructure and network controls. However, substantial responsibility for protecting Azure IaaS infrastructure falls on the customer.

    How do you make sure your data is secure as it enters the cloud?

    Join SoftwareONE and Trend Micro as we discuss the following:

    •The shared responsibilities across the customer and cloud provider
    •The shifting and transforming landscape and its impact on maintaining compliance
    •The growing requirements for speed and automation
    •Stopping advanced threats and protecting vulnerabilities
    •Putting in place security and compliance controls above and beyond the responsibility of the cloud provider

    We will also discuss SoftwareONE’s managed security service which enables organisations to stop malicious activities, and improve security effectiveness for Azure workloads.

    While adoption of Azure drives higher levels of innovation and competitive advantage, a secure Azure environment is essential for protection against threats or data breaches and to ensure compliance with data privacy and industry regulations.

    Find out how SoftwareONE and Trend Micro can help you achieve this.
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Aug 29 2019 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • Safety First: Cybersecurity Built to Protect Against Modern Threats
    Safety First: Cybersecurity Built to Protect Against Modern Threats
    Rick Griencewic, HP senior security specialist; Brian Fulmer, Spicehead and IT Manager Recorded: Aug 29 2019 63 mins
    HP senior security specialist Rick Griencewic, and Spicehead and IT Manager Brian Fulmer as they discuss the growing importance of endpoint security and real-time malware protection – an intro to Deep Learning technology. Plus, a peek at the next generation HP EliteBook x360 1040 G6 business notebook including the latest HP security feature: Sure Sense.
  • Introducing Red Cloak™ Threat Detection & Response
    Introducing Red Cloak™ Threat Detection & Response
    John H. Collins, CISSP - Director, Solution Engineering SaaS Security Applications Recorded: Aug 29 2019 58 mins
    For more than 20 years, you’ve known the world-leading threat intelligence and industry-recognised services from Secureworks. Now, it’s time you know Red Cloak Threat Detection and Response, and hear directly from our experts.

    Red Cloak Threat Detection and Response is a cloud-based security analytics application that transforms the way your security team detects, investigates and responds to threats across your endpoints, network and cloud. Built by a team of data scientists and engineers with experience solving big data cybersecurity challenges for intelligence agencies, Red Cloak TDR enables you to detect advanced threats, trust your alerts, streamline and collaborate on investigations and automate the right action.

    What You Will Learn:

    - What is Red Cloak TDR?
    - The benefits of TDR in advanced threat detection
    - How TDR helps to improve investigation to enable organisations to take the right action.
  • Transforming Employee Experience with Intelligence
    Transforming Employee Experience with Intelligence
    Jane Foreman, Citrix and Laura Kaminski, Citrix Recorded: Aug 27 2019 34 mins
    With app and data sprawl at an all-time high, the way we work has never been more convoluted. The complexity that most modern workers experience, demands advances in technology to group and filter workflows—enabling increased productivity without switching apps and devices.

    Citrix recently unveiled new Citrix Workspace intelligence features, incorporating feedback from customers, to address the core challenges in today’s evolving workspace. Watch this webinar to discover how Citrix Workspace is organizing work for employees and enhancing their productivity by:
    •Eliminating frequent switches across apps to increase focus
    •Delivering one universal search across your entire workspace
    •Prioritizing notification feeds and using machine learning to automate tasks
  • SAM 2.0 - The Modern Approach to Software Asset Management
    SAM 2.0 - The Modern Approach to Software Asset Management
    Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam Recorded: Aug 26 2019 44 mins
    The evolution of Software Asset Management (SAM) is upon us as the latest trends such as cloud, IoT and digitization are making it more difficult than ever to track, manage and drive a positive ROI for IT investments. With a changing technology landscape, companies require a more modern and agile approach to SAM that incorporates the power of enterprise data, strategic program governance, and repeatable processes. Join Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam as they discuss factors impacting IT and SAM, leading practices to modernize your license management program, and recommendations on how smart technology with thought leadership can get you there.
  • UK Energy Sector Security, Regulation & Sharing Best Practice
    UK Energy Sector Security, Regulation & Sharing Best Practice
    Bob Tarzey, Independent Industry Analyst & Dr. Bernard Parsons, CEO Becrypt Ltd Recorded: Aug 23 2019 30 mins
    UK Energy Sector Security, Regulation & Sharing Best Practice
  • Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Carmine Rimi - Ubuntu Product Manager & Jan Kanty Milczek - Senior Data Scientist at deepsense.ai Recorded: Aug 21 2019 60 mins
    AI is transforming industries with rapid innovation cycles and unprecedented automation capabilities. With the right frameworks, tools, and processes, machine learning with Kubeflow can help you accelerate your AI business objectives. Kubeflow is a Kubernetes-native platform that includes the most popular machine learning tools and frameworks, like Tensorflow and PyTorch, and is available on your workstation or in the cloud. Recent use cases include expert systems, workflow automation, pattern recognition across real-time data sets, customer relationship management with predictive behavior, and many more.
    The models at the core of this revolution require data - data is the fuel that powers accurate models. How do you get the most from data and ensure it meets your requirements?

    This webinar, in partnership with deepsense.ai will cover:

    How to get started with defining AI project requirements and objectives
    How to prioritize analytical projects in your company
    The challenges involved in collecting and storing data and how to avoid them
    How to extract values and eliminate complexities
    What external sources you should use in your data pipeline
  • Working Together: Exploring the World of Global Standardization
    Working Together: Exploring the World of Global Standardization
    Philip Lafrance Recorded: Aug 15 2019 33 mins
    Have you ever wondered how your smartphone is able to operate seamlessly when visiting a different country?

    It’s something that most of us have probably never thought about, but a great deal of time and resources are spent developing the global standards that help us stay connected. 

    Standards allow for interoperability between connected devices and IT systems, something that is critical in the world of cryptography. As a leader in quantum-safe cryptography, ISARA is involved in several standards-setting initiatives to ensure that upgraded systems will continue to work with existing ones.

    But how are these standards set? Who creates them? How are they implemented?

    Join Philip Lafrance, Standards Manager for a brand-new webinar, "Working Together: Exploring the World of Global Standardization" and find out why standards are important to you, as a cybersecurity leader and your organization.
  • Deliver a Better Digital Workspace Experience featuring Forrester
    Deliver a Better Digital Workspace Experience featuring Forrester
    Calvin Hsu, VP of Product Marketing at Citrix, Andrew Hewitt, Analyst Serving Infrastructure & Ops Professionals at Forrester Recorded: Aug 15 2019 65 mins
    As your enterprise looks for better ways to drive employee productivity through a better technology experience, the infusion of intelligence, automation, and personalization into the digital workspace offers exciting potential. In this webinar, digital workspace thought leaders Andrew Hewitt (Forrester Analyst/Guest speaker) and Calvin Hsu (Citrix VP of Product Marketing) will explore the impact of digital workspaces powered by intelligence and automation.

    Attendees of the webinar will learn:
    -The top challenges organizations face in creating a technology experience that enables productivity
    -The evolution of digital workspace technology, and particularly the impact of intelligence and automation within the workspace
    -A day-in-the-life scenario of a digital workspace end user that shows specific processes and advantages
  • ITM Master Class June 2019
    ITM Master Class June 2019
    Jason Poole Recorded: Aug 14 2019 69 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • ITM Master Class May 2019
    ITM Master Class May 2019
    Jason Poole Recorded: Aug 14 2019 63 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • Citrix Intelligent Traffic Management - Master Class 2019 April
    Citrix Intelligent Traffic Management - Master Class 2019 April
    Jason Poole Recorded: Aug 14 2019 50 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business. Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • Part 2 SQL End of Support Readiness: Migration Options and Cloud Migration
    Part 2 SQL End of Support Readiness: Migration Options and Cloud Migration
    David Bloxham - SoftwareONE; Kaz Traverso - SoftwareONE; Paul Manaton - RiverMeadow Sep 17 2019 8:00 am UTC 26 mins
    With support for SQL Server 2008 and 2008 R2 ending on 9th July, 2019 what are your upgrade options?

    End of support means the end of security updates, which can cause security and compliance issues and put applications and business at risk so it’s important to create an upgrade transition plan.

    SoftwareONE and migration acceleration specialists, RiverMeadow, will discuss the key considerations to ensure a successful transition including:

    •What are the available options: on-premise upgrades, migrate to cloud or do nothing?
    •Best practice methodologies
    •Cloud tooling options for migration acceleration
    •Cloud migration framework for success

    Organisations have options. Each is worth exploring and you may use multiple options to move workloads from SQL Server, depending on the workload.

    This webinar will primarily focus on cloud migration.
  • How to deliver a high-quality & reliable workspace experience
    How to deliver a high-quality & reliable workspace experience
    Derek Thorslund & Wesley Shepherd Sep 17 2019 9:00 am UTC 36 mins
    Today's digital workspace includes a myriad of applications: SaaS, Citrix Virtual Apps and Desktops, VoIP, unified communications, and much more. Delivering a high-quality workspace experience to workers in any location may not be as easy as it seems since these apps can run in various clouds and datacenters.

    Come learn how customer Fast Pace Urgent Care uses Citrix SD-WAN to deliver a consistent experience for Citrix apps, even over imperfect network conditions.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem Sep 17 2019 6:00 pm UTC 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • Secure app and workspace delivery in a hybrid multi-cloud world
    Secure app and workspace delivery in a hybrid multi-cloud world
    Darshant Bhagat & Robin Manke-Cassidy Sep 18 2019 9:00 am UTC 38 mins
    Hybrid cloud deployment success depends on the effectiveness of your networking and security strategy and how you manage complexity.

    In this session, we will teach you top use cases and real-world security architectural considerations to optimize and secure your apps, data, and workspaces.
  • Simplify the transition to hybrid multi-cloud infrastructure with Citrix ADC
    Simplify the transition to hybrid multi-cloud infrastructure with Citrix ADC
    Abhilash Verma & Tsutomu IBI Sep 19 2019 9:00 am UTC 41 mins
    Join Abhilash Verma & Tsutomu IBI as the discuss new trends impacting hybrid cloud and IT infrastructure transformations and what distinguishes the Citrix flexible application delivery.
  • PCoIP Ultra: the most advanced remoting protocol for virtual workstations
    PCoIP Ultra: the most advanced remoting protocol for virtual workstations
    Ian Main, Technical Marketing Principal - Teradici Sep 19 2019 5:00 pm UTC 30 mins
    What’s PCoIP Ultra? This webinar introduces Cloud Access Software with its latest enhancements designed for our most demanding users in VFX/media, engineering, medical and other verticals. Learn about how we support 4K HFR content, efficient scaling across multicore CPUs, and third-party codecs like H.264. See how the AVX2 instruction set boosts PCoIP Ultra performance metrics that illustrate our latest PCoIP advancements.

    Q&A to follow.

    Register today!
  • The Six Components of Digital Transformation
    The Six Components of Digital Transformation
    Rob Perry, Jim Schmidt, Jarein Vlasveld - ASG Technologies & Brad Steinmeyer - Zia Consulting Sep 19 2019 5:00 pm UTC 60 mins
    Digital transformation is vital for success in the information economy. Businesses must enhance their ability to change—and change quickly. While 81% of organizations know that digital transformation is important, many are unsure where to begin or how to advance their digital transformation journey*…and if transformation isn’t done right, it’s going to be a waste of valuable time and money!

    Join ASG and Zia Consulting to find out everything you need to know about digital transformation, including:

    • Business benefits of undergoing a digital transformation the right way
    • The six components of digital transformation
    • Best practices for advancing your digital transformation
    • Choosing the right tools to plan and manage the journey
    • How your peers are succeeding with digital transformation technologies, competencies and techniques

    *The State of Intelligent Information Management: Getting Ahead of the Digital Transformation Curve, by AIIM 2018
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Sep 19 2019 6:00 pm UTC 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • Developing a Hybrid Multi-cloud Security Strategy
    Developing a Hybrid Multi-cloud Security Strategy
    Kurt Roemer, Citrix Chief Security Strategist Sep 23 2019 5:00 pm UTC 45 mins
    Orchestrating security requirements and assuring effective delivery across multiple providers, services and shared responsibility models seems daunting – but doesn’t have to be. Having a tailored strategy to guide decision making is key to success in spanning and navigating hybrid multi-cloud models.

    This session will explain why hybrid multi-cloud security is so different, beginning with architectures and spanning threats, administrative practices, networking and workspace integrations. Strategy elements will focus on the demands of diverse stakeholders including architects, highly-privileged workers and line of business leadership who must assure governance, availability, resiliency and regulatory compliance.

    Learn the pitfalls, options, tools and techniques to assist you in developing your own personalized hybrid multi-cloud security strategy.


    About the Presenter:

    As Chief Security Strategist for Citrix, Kurt Roemer leads security, compliance, risk and privacy strategies for Citrix products. As a member of the Citrix CTO and Strategy Office, Roemer drives ideation, innovation and technical direction for products and solutions that advance business productivity while ensuring information governance.

    An information services veteran with more than 30 years of experience, his credentials include the Certified Information Systems Security Professional (CISSP) designation. He also served as Commissioner for the US public-sector CLOUD2 initiative and led efforts to develop the PCI Security Standards Council Virtualization Guidance Information Supplement while serving on the Board of Advisors.
  • Deploying Application Delivery Management for the Enterprise
    Deploying Application Delivery Management for the Enterprise
    Zaheer Mohammed & Sanjay Gupta Sep 24 2019 9:00 am UTC 45 mins
    Citrix Application Delivery Management (ADM) provides a single platform to manage, monitor, and troubleshoot Citrix Networking platforms deployed on-premises or in the cloud.

    This session will help you master key deployment best practices for Citrix ADM with high availability and disaster recovery and show you how to quickly diagnose and address the no data error using the No Data diagnostic utility. You will leave this session with the expertise needed to deploy Citrix ADM according to enterprise requirements and troubleshoot the most common challenges efficiently.
  • Comment accélérer le cycle développement de vos applications?
    Comment accélérer le cycle développement de vos applications?
    Chardy N’diki (Regional Manager, EMEA) & Laurent Levi (Sales Engineer, EMEA) at Contrast Security Sep 25 2019 8:00 am UTC 60 mins
    Une transformation digitale réussi dépend de l’agilité sa Software Factory. Comment la sécurité peut tenir le rythme et avoir une emprunte minimal sur les cycles développement ? Nous vous montrerons comment Contrast utilise les technologies d’instrumentations pour renforcer la sécurité des applications avant leur déploiement, de les protéger en production et offrir une visibilité sur les vulnérabilités tout au long du cycle de vie des applications. Enfin nous montrerons comment améliorer l’adoption auprès des développeurs et d’optimiser les ressources liées à la sécurité dans vos projets.
  • Bridging the gap between traditional and modern app delivery
    Bridging the gap between traditional and modern app delivery
    Pankaj Gupta & Komal Bhardwaj Sep 25 2019 9:00 am UTC 43 mins
    IT transformation, cloud, and new application development technologies are changing the face of application delivery.

    Join Pankaj Gupta & Komal Bhardwaj to learn how Citrix ADC is innovating to guide you through managing your new cloud-native application infrastructure.
  • Identity and access management with Citrix Workspace
    Identity and access management with Citrix Workspace
    Akhilesh Dhawan, Praveen Raghuraman, Srinivasan Shanmugam, Pete Downing Sep 25 2019 2:00 pm UTC 46 mins
    Come get an overview of Citrix Access Control (Workspace Standard). Understand the business value of Access Control, the challenges it addresses, and the differences between Access Control and Gateway.

    Come join us to see how we are different from a traditional SSO solution and how to improve ROI with a single vendor strategy.
  • Going cloud? Don't forget to bridge the gap between clouds
    Going cloud? Don't forget to bridge the gap between clouds
    Thorsten Rood Sep 26 2019 9:00 am UTC 46 mins
    Moving towards a cloud play in your given environment? Thinking that AzureAD will be your future authentication strategy?

    It’s likely you’ll still need access to some on-premises resources that won’t make it over that quickly or others that are running outside of a pure Microsoft feature set, such as Amazon (AWS) or Google Cloud Platform (GCP).

    In this session, you’ll learn how Citrix ADC bridges the gap between clouds, and how to integrate remaining datacenter resources into a common offering while maintaining user experience. Plus, explore the elements that constitute a true hybrid cloud infrastructure, which will likely be the longest migration episode in many IT lives.
  • HP’s IT Transformation: How HP DaaS is Enhancing Employee Experiences
    HP’s IT Transformation: How HP DaaS is Enhancing Employee Experiences
    Gwen Becknell, HP IT Lead for Employee Experience Strategy & Services and Marc Bland, HP Global Services Development Sep 26 2019 7:00 pm UTC 60 mins
    HP recently implemented its own Device as a Service (DaaS) solution.

    HP recently implemented its own Device as a Service (DaaS) solution. Join Gwen Becknell, HP IT Lead for Employee Experience Strategy and Services, to discover how DaaS transformed employee experiences, empowered the IT team, and is resulting in measurable business outcomes. Plus, hear from Marc Bland, HP Global Services Development, about ways you can get started by calculating your organization’s projected value with HP DaaS.
  • How to implement ITM for web app performance visibility
    How to implement ITM for web app performance visibility
    Steven Lyons & Jason Poole Oct 1 2019 9:00 am UTC 45 mins
    The internet is the blind spot in terms of delivering internet-facing applications. Citrix Intelligent Traffic Management delivers visibility and intelligent traffic steering for optimized user experience and performance.

    In this session, you will learn how implement Citrix ITM to gain visibility into your web app performance.
  • Disaster Recovery
    Disaster Recovery
    Jeff Gilmer Oct 1 2019 5:00 pm UTC 60 mins
    If a disaster were to strike, would you be able to successfully recover your network?

    Disaster recovery focuses on the ability of an organization to recover from a technology outage. This can be loss of a single technology or a catastrophic event. Many companies have a need to quickly gain a better understanding of their Disaster Recovery capabilities, future options, and strategies.

    Join us as we explore the differences between Emergency Management, Business Continuance, and Disaster Recovery Planning.

    You will learn how to prioritize the recovery of your organization's services by understanding all the steps in a successful recovery plan. We will also cover what is required to recover those services including facilities, IT, financial, and resources.

    Don't wait until it's too late. Know what to expect in the event of a disaster.

    Jeff is effective in both restoring and building organizations through improved long-term process improvement and implementation of solid scalable methodologies. Jeff also specializes in communications and regularly presents at seminars/webinars, industry events, and partner-sponsored events. In addition, Jeff has presented Excipio’s results to a variety of private and public sector audiences, including: senior executive teams, state legislatures, city councils, and federal agencies, boards of directors, and small community forums.”
  • How to protect your Citrix deployments and modern applications with Citrix ADC
    How to protect your Citrix deployments and modern applications with Citrix ADC
    Patrick Coble & Frank Bunger Oct 2 2019 9:00 am UTC 33 mins
    Explore the major security features that Citrix ADC offers and deployment techniques to implement them in your organization.

    Citrix ADC is a security engineer’s Swiss Army knife and you will discover tools you may not know about, including Web Application Firewall, GeoIP and bad IP reputation blocking. You’ll also hear about Citrix ADC denial of service (AppQoE) protections along with SmartAccess, multifactor authentication and more.

    If your Citrix ADC is acting as a gateway, join this session to see how it can further secure your Citrix deployment.
  • How to get end-to-end visibility into your network
    How to get end-to-end visibility into your network
    Neha Harit & Lena Yarovaya Oct 3 2019 9:00 am UTC 42 mins
    A single pane of glass for management and visibility are required tools to manage your application delivery today and into the future. With the growth of hybrid and multi-cloud infrastructure, it’s vital to maintain control of various application delivery devices including physical, virtual, containerized and bare metal. Come learn how Citrix ADM provides visibility, management and control from a performance and security perspective, and deep dive into the features for automation and orchestration.
  • ITM Master Class February 2019
    ITM Master Class February 2019
    Jason Poole Oct 4 2019 9:00 am UTC 72 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • ITM Master Class March 2019
    ITM Master Class March 2019
    Jason Poole Oct 9 2019 9:00 am UTC 68 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • ITM Master Class April 2019
    ITM Master Class April 2019
    Jason Poole Oct 11 2019 9:00 am UTC 49 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • ITM Master Class May 2019
    ITM Master Class May 2019
    Jason Poole Oct 16 2019 9:00 am UTC 62 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • ITM Master Class June 2019
    ITM Master Class June 2019
    Jason Poole Oct 18 2019 9:00 am UTC 68 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.