Hi [[ session.user.profile.firstName ]]

End User Computing

  • Over or Under Capacity? No Multi-Platform Plan? Lessons From the Industry
    Over or Under Capacity? No Multi-Platform Plan? Lessons From the Industry
    Denny Yost, Enterprise Systems Media; Gary Henderson, ASG Recorded: Nov 8 2018 26 mins
    Are you over-provisioning server capacity, experiencing unplanned capital expenditures or just lacking the necessary capacity planning information to help you make critical decisions? If you answered “YES!”, you are not alone. In a recent independent study conducted by Enterprise Systems Media, more than 50% of respondents acknowledged that they do not have a single, consistent multi-platform solution that provides information to managers, internal buyers, or end-users about performance and capacity across their enterprise. Additionally, close to 30% responded that they did not know if this capability even exists within their organizations.

    Join Enterprise Systems Media’s Denny Yost and ASG’s Gary Henderson on Thursday, November 8th to learn how your organization compares.

    During this presentation, the results of the survey will be reviewed and you’ll discover strategies for tackling challenges in enterprise capacity planning such as:
    -Accurate Tracking
    -Optimization of Resource Use
    -Controlling Costs
    -Improving Service Availability across all Platforms

    Don’t miss your opportunity to find out more - Register Now!
  • FBI Warning: Cyber Attacks on ATMs - Are you prepared?
    FBI Warning: Cyber Attacks on ATMs - Are you prepared?
    Joan McGowan, Senior Analyst at Celent and Steve Migliore, Head, Cybersecurity at Unisys Recorded: Nov 7 2018 46 mins
    A recent warning issued to banks by the FBI reads like the script for a Hollywood movie: cybercriminals are plotting a sophisticated, global “ATM cash-out” using cloned credit cards to fraudulently withdraw millions of dollars in just a few hours. A few days later, reports of a $13.5 million heist of 25 ATMs across the globe confirmed the reality that ATMs are a prime target for hackers.

    Are you prepared for when an ATM breach occurs, or more importantly, when a hacker gains access to your network and confidential customer information through your ATM networks?

    Join Unisys and Celent for this very critical, time sensitive topic that will help you understand this increasing threat and how to respond.

    In this webinar we will cover:

    •How global trends, such as open banking, will increase these threats
    •How ATM security fits in your end to end security and risk posture
    •We will be discussing Unisys Stealth®, which is a flexible software suite that leverages microsegmentation to secure critical assets
    •And so much more!
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Recorded: Nov 7 2018 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • Workplace as a Service: Reduce Costs, Increase Uptime & Enhance Security
    Workplace as a Service: Reduce Costs, Increase Uptime & Enhance Security
    Jonas Persson (Sr Category Manager) and Gary Wall (pMPS Business Development Manager) Recorded: Nov 6 2018 50 mins
    Technology, culture and the millennial generation are shaping how, where and when we work. The workforce is demanding greater flexibility, but is your IT infrastructure ready to control costs and secure data in this new environment?

    Join industry leading experts for an interactive webinar to learn more about:

    - Current workplace trends
    - How to harness the advantages that mobility services and the digital workplace bring
    - How HP’s Device as a Service (DaaS) and Managed Print Services can help you implement solutions to better predict costs, increase uptime, and enhance security

    With an “office of the future” style approach, this webinar is designed to educate, inform, and assist businesses that are looking for a more flexible IT procurement and management process.

    If you have any questions, please use this link to get in touch with one of our experts: https://enable.hp.com/LP=931
  • Making the shift to unified endpoint management for workforce agility
    Making the shift to unified endpoint management for workforce agility
    Suzanne Dickson, Senior Director, Product Marketing, Citrix and Frank Srp, Senior Manager, Technical Marketing, Citrix Recorded: Nov 1 2018 63 mins
    Increasingly, more companies have recognized that unified endpoint management (UEM) is a critical component of their overall digital transformation as UEM allows for greater workforce agility.

    By managing all your users, devices, apps, and data from a single platform, Citrix helps you maximize user and IT productivity while helping to secure your information and reduce costs.

    In this webinar, you will learn how to:
    - Modernize Windows 10 management
    - Manage Windows 7, Windows 10, iOS, Android, ChromeOS, macOS and iOT endpoints from a single platform
    - Simplify and improve users’ onboarding experience
    - Provide users a consistent, secure approach to access all their apps (virtual, mobile, web, SaaS, native Windows) and data regardless of the device, network or location
    Leverage user-centric analytics that correlates device, application, network and data access information to proactively prevent security threats


    Suzanne Dickson, Senior Director, Product Marketing, Citrix
    Frank Srp, Senior Manager, Technical Marketing, Citrix
  • Improving Risk and Operational Results with a Cloud Identity Governance Service
    Improving Risk and Operational Results with a Cloud Identity Governance Service
    Matt Chambers (Asurion), Harshal Patel (Simeio), Shawn Keve (Simeio) Recorded: Oct 31 2018 56 mins
    Learn how Asurion moved from multiple legacy, on-prem Identity Management and Access Governance tools to a single, cloud-based Identity Governance and Administration Service to improve enterprise risk and operations.
  • How to Survive Against Increasing Regulatory Compliance and Industry Standards
    How to Survive Against Increasing Regulatory Compliance and Industry Standards
    Chris Payne, Security Evangelist at Infinigate UK Recorded: Oct 31 2018 59 mins
    In the last few years, organisations have weathered an onslaught of IT and information security regulations and industry standards. From ISO 27001 to the GDPR to SWIFT, 2018 has failed to buck the trend; and organisations now find themselves attempting to adhere to multiple regulations/standards.

    The key to surviving this brave new world is a programme of integrated compliance, where new solutions and controls must compliment all regulations, saving time, effort and ultimately money.

    In this webinar, Chris Payne – Security Evangelist at Infinigate UK, is joined by Blackfoot Compliance Specialists, Becrypt, GFI Software and Ipswitch where they will discuss integrated compliance and how they have helped their customers to achieve this. You will learn:

    -What integrated compliance is
    -How a number of regulations and industry standards overlap
    -Which solutions can help you with a programme of integrated compliance
    -How customers have seen success in when implementing mutually complimentary solutions and controls
  • The Future of Work: The Liquid Enterprise, WorkOps and Workforce Intelligence
    The Future of Work: The Liquid Enterprise, WorkOps and Workforce Intelligence
    Research Director Chris Marsh, Senior Analyst Raul Castanon-Martinez and Senior Research Associate Rosanna Jimenez Recorded: Oct 30 2018 60 mins
    The nature of work is being entirely transformed by innovative new technologies. Catalyzed by businesses looking for greater strategic and operational agility and by the techno-empowerment of individuals, ownership over work execution is decentralizing away from IT and other centralized teams of specialists. This shift requires new understanding and new language.

    At 451 Research, we use the term ‘liquid enterprise’ to describe the massive responsiveness to changing market, customer and user requirements that the most innovative enterprises are looking to give affect to. ‘WorkOps’ describes how the nature of work is changing to make this possible – with intelligence, workflow automation, collaboration and reporting embedded and flexibly tessellating across the work execution lifecycle. WorkOps is opening up new possibilities for collective and connected yet highly personalized experiences that will supercharge work execution and drive employee engagement. It’s also giving rise to what we believe is a new enterprise software archetype we call the Workforce Intelligence Platform.

    This radically different future for work is significant enough for us to have to rethink the archetypes we use to understand and describe work.

    In this webinar, 451 Research analysts Chris Marsh, Raul Castanon-Martinez and Rosanna Jimenez will help you understand how to plan for the future for work that is unfurling:

    •What does the future of work look like?
    •What are the technology trends underpinning how work is changing?
    •How should you be thinking about employee engagement?
    •How do you leverage AI to improve work execution?
    •How can you become ‘liquid’ and put in place for WorkOps practices?
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Recorded: Oct 30 2018 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • Secure Your Azure Environment
    Secure Your Azure Environment
    Eric Kim, SoftwareONE and Gautam Bharti, Trend Micro Recorded: Oct 25 2018 39 mins
    Are you using or considering using Microsoft Azure? If so, join our session with cyber security partner, Trend Micro, to provide an overview of the threat landscape your environment is facing and how to address it.

    SoftwareONE’s Security Practice Lead, Eric Kim, and Trend Micro’s Gautam Bharti will discuss the following:

    -CISO’s top priorities
    -Current and future landscape of threats
    -Security considerations for cloud
    -Reducing vulnerabilities and protect against malicious activity
    -Leveraging automation to accelerate compliance
  • Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Kees Baggerman,EUC Technical Director Nutanix & Dave Brear,Enterprise Architect EMEA Professional Services Citrix UK Recorded: Oct 24 2018 50 mins
    The benefits of a modern digital workspace are well documented; but not all solution stacks are created equal.

    Join Nutanix EUC Technical Director, Kees Baggerman and Dave Brear,Enterprise Architect, Citrix Professional Services, as they discuss how Citrix EUC with Nutanix Files, which is natively integrated into the Nutanix Enterprise Cloud OS, eliminates costs and complexities at any scale to successfully deliver a modern digital workspace.


    In this webinar, attendees will learn:

    1. What is Nutanix Files?
    2. Why is Nutanix Files applicable to Citrix EUC environments and its successful deployment?
    3. Best practices to integrate and deliver Nutanix Files in Citrix EUC environments.
  • Outsmart Hackers by Coordinating Your Defenses
    Outsmart Hackers by Coordinating Your Defenses
    Greg Bennett, Engineer, Sophos Recorded: Oct 22 2018 30 mins
    Smart hackers coordinate their attacks across your system. Now, you can learn how to outsmart the hackers by coordinating your defenses!

    Synchronized Security is a best-of-breed security system that enables security solutions to talk to each other, sharing information and responding automatically to threats.

    For example, if the endpoint detects a threat, the firewall automatically isolates the infected computer and then the cleanup kicks right in to finish the job.

    Join us for this engaging webinar to learn more about this new approach to IT security. You’ll find out how Synchronized Security:

    • Gives you unprecedented protection against advanced threats

    • Slashes incident response time by 99.9%

    • Saves IT time and effort every day
  • Real World IoT Podcast | Ep. 22 | ft Globalstar | Saving the World with IoT
    Real World IoT Podcast | Ep. 22 | ft Globalstar | Saving the World with IoT
    151 Advisors | Ron Wright & David Chalona | Ken Briodagh Recorded: Oct 17 2018 45 mins
    On this week’s episode of Real World IoT, host Ken Briodagh talks satellite connectivity and asset tracking with Globalstar’s Ron Wright and David Chalona. Both Regional Sales Managers, Ron holds over 25 years of industry experience in sales and marine technology, while David is a veteran technician with cloud services and IoT networks. Globalstar is a quickly growing company, dedicated to providing data and voice communications in low connectivity areas. With an extensive satellite network, picking up signals from over 80% of the Earth’s surface, Globalstar provides reliability and operability worldwide, connecting users in areas where traditional networks are unreliable or unavailable. Most importantly, Globalstar’s connectivity is provided with extreme reliability by means of their strategically designed LEO network.
  • Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Kees Baggerman,EUC Technical Director Nutanix & Dave Brear,Enterprise Architect EMEA Professional Services Citrix UK Recorded: Oct 17 2018 50 mins
    The benefits of a modern digital workspace are well documented; but not all solution stacks are created equal.

    Join Nutanix EUC Technical Director, Kees Baggerman and Dave Brear,Enterprise Architect, Citrix Professional Services, as they discuss how Citrix EUC with Nutanix Files, which is natively integrated into the Nutanix Enterprise Cloud OS, eliminates costs and complexities at any scale to successfully deliver a modern digital workspace.


    In this webinar, attendees will learn:

    1. What is Nutanix Files?
    2. Why is Nutanix Files applicable to Citrix EUC environments and its successful deployment?
    3. Best practices to integrate and deliver Nutanix Files in Citrix EUC environments.
  • Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Kees Baggerman,EUC Technical Director Nutanix & Dave Brear,Enterprise Architect EMEA Professional Services Citrix UK Recorded: Oct 16 2018 50 mins
    The benefits of a modern digital workspace are well documented; but not all solution stacks are created equal.

    Join Nutanix EUC Technical Director, Kees Baggerman and Dave Brear,Enterprise Architect, Citrix Professional Services, as they discuss how Citrix EUC with Nutanix Files, which is natively integrated into the Nutanix Enterprise Cloud OS, eliminates costs and complexities at any scale to successfully deliver a modern digital workspace.


    In this webinar, attendees will learn:

    1. What is Nutanix Files?
    2. Why is Nutanix Files applicable to Citrix EUC environments and its successful deployment?
    3. Best practices to integrate and deliver Nutanix Files in Citrix EUC environments.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Recorded: Oct 11 2018 38 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Future-proofing Fingbox: The IoT home network monitoring device
    Future-proofing Fingbox: The IoT home network monitoring device
    Carlo Medas Recorded: Oct 10 2018 39 mins
    Fing App is a network scanning and troubleshooting tool used by millions. Fingbox is a complementary hardware device which plugs into Wi-Fi routers to monitor, secure and troubleshoot networks and their connected devices. Fing's engineering team built Fingbox using Ubuntu Core and Snaps to speed up development time, save budget and resources and ensure a future-proofed product went to market.

    Initial development speed was massively improved as Fing engineering resources could concentrate on building product features for our users and not on OS/platform development as this comes ready to go with Ubuntu Core. The ability to upgrade seamlessly within hours was fundamental during the Fingbox product launch phase and it’s as important now that the product is in production.

    In this webinar, you’ll hear from Fing Co-Founder and Big Data Architect, Carlo Medas, on how Fingbox was built with Ubuntu Core and how Fingbox’s key features including parental control, Digital Fence and Digital Presence are updated and improved ongoing using Snaps.
  • The Wolf: The Hunt Continues (ft. Christian Slater) (EN)
    The Wolf: The Hunt Continues (ft. Christian Slater) (EN)
    Christian Slater Recorded: Oct 1 2018 7 mins
    If you're not taking your device security seriously, someone else might be. From director Lance Acord comes the second installment in The Wolf series starring Christian Slater.

    To learn more about how to protect your business visit http://hp.com/go/HPSecure
  • The Wolf (ft. Christian Slater) (EN)
    The Wolf (ft. Christian Slater) (EN)
    Christian Slater Recorded: Oct 1 2018 7 mins
    If you're not taking your printer security seriously, someone else might be. From director Lance Acord comes The Wolf starring Christian Slater.

    To learn more about how to protect your business visit http://www.hp.com/go/ReinventSecurity
  • Jumpstart Workforce Productivity with Digital Workspaces
    Jumpstart Workforce Productivity with Digital Workspaces
    Licia Williams, EVP Global HR & Corporate Counsel, & Taj Aljundi, Enterprise Solution Engineer, ASG Technologies Recorded: Sep 26 2018 59 mins
    Successful onboarding is NOT just a matter of completing paperwork, selecting benefits, and getting a tour of the office. Getting your workforce up and running quickly and effectively will accelerate productivity. With digital workspaces, IT and HR can partner to ensure every new employee hits the ground running on Day 1.

    Join ASG Technologies on Wednesday, September 26th, to hear from digital workspace expert, Taj Aljundi, and Global Head of HR, Licia Williams, on how you can quickly onboard new staff, whether employees, contractors, or consultants, with the tools and information that they need, right from the start. All while reducing your onboarding costs substantially. You’ll learn how digital workspaces:
    • Support any device, anywhere – so you can engage the best talent regardless of location.
    • Embed IT policies regarding security, governance, and regulatory compliance.
    • Are tailored to an employee’s role, but support personalization to suit individual work styles.
    • Offer a single point of control to facilitate a secure offboarding process.

    Wondering how to maximize your workforce’s productivity? It all starts with their first day and your company’s onboarding process. Effective onboarding can mean 50% greater new-hire productivity, and with talent acquisition costs at 1/3 an employee’s compensation that’s a fact that can’t be ignored. Yet, many organizations struggle to develop a cost-effective and streamlined approach to technology enablement, though it’s critical to their onboarding efforts.

    Join us on September 26th and find out how.
  • 4 Practical Ways Cloud Simplifies Managing Apps, Devices, and Data
    4 Practical Ways Cloud Simplifies Managing Apps, Devices, and Data
    Vishal Ganeriwala Sr. Director, Workspace Marketing, Citrix Recorded: Sep 26 2018 35 mins
    Traditionally, apps, desktops, devices and data are all managed through different systems, which is complex and time-consuming. Unifying management as cloud services with a single control plane improves the delivery and management of the apps and data employees need. Citrix delivers a complete, secure digital workspace.

    Join this webinar to learn more about how managing apps, desktops, devices and data with Citrix Workspace is:

    • Fast: Deploy apps and desktops, or complete secure digital workspaces in hours, not weeks.
    • Simple: Implement a fully-integrated portfolio via a single-management plane to simplify administration.
    • Adaptable: Choose to deploy on any cloud or virtual infrastructure — or a hybrid of both.
    • Secure: Keep all proprietary information for your apps, desktops and data under your control.
  • HP Workplace as a Service
    HP Workplace as a Service
    Jonas Persson (Sr Category Manager) and Gary Wall (pMPS Business Development Manager) Recorded: Sep 26 2018 50 mins
    Technology, culture and the millennial generation are shaping how, where and when we work. The workforce is demanding greater flexibility, but is your IT infrastructure ready to control costs and secure data in this new environment?

    Join our industry leading experts to discover current workplace trends and learn how HP’s Device as a Service (DaaS) and Managed Print Services can help you implement solutions to better predict costs, increase uptime, and enhance security.

    With an “office of the future” style approach, this webinar is designed to educate, inform, and assist businesses that are looking for a more flexible IT procurement and management process.

    If you have any questions, please use this link to get in touch with one of our experts: https://enable.hp.com/LP=931
  • Second Wave Mobility: The Enterprise Mobile Communications Revolution Begins
    Second Wave Mobility: The Enterprise Mobile Communications Revolution Begins
    Raul Castanon-Martinez, 451 Research & Andrew Bale, Tango Networks Recorded: Sep 20 2018 61 mins
    Enterprises seeking the productivity benefits of a mobile workforce have been forced to do so with mainly consumer-oriented mobile services.

    The “First Wave” of mobility over the past 20 years was focused on consumers, with the features and service configurations that mattered most to individual, private users.

    But enterprises are demanding change, and a range of new services, feature-sets, and delivery models are characterizing what Raúl Castañón-Martínez of 451 Research has dubbed “Second Wave Mobility.”

    This webinar will explore the advent of enterprise-focused, Second Wave Mobility, including:

    •Moving control over services and policy enforcement into enterprise IT’s hands.
    •Integrating mobile communications with enterprise applications such as Customer Relationship Management, Workforce Optimization, Customer Experience Management and others.
    •Mobile Unified Communications, “Mobile Native” and “Mobile First” communications strategies.
    •Capturing, recording, logging and archiving mobile voice and text communications for compliance.
    •Managing multiple user identities and personas, for separating business and private communications.
    •Advanced applications such as sending and receiving text messages using business numbers.
    •Cloud-based mobility architectures, private wireless and mobility models such as Private LTE.

    The webinar will feature analysis and market trend data presented by Raúl Castañón-Martínez, Senior Analyst, Workforce Collaboration and Communications, of 451 Research.

    Andrew Bale, General Manager of Cloud Services for Tango Networks, will present case studies and use case examples of Second Wave Mobility, including unveiling Tango Networks’ new enterprise mobile communications service and messaging application.
  • GDPR Comes to America (CCPA) — Be Prepared
    GDPR Comes to America (CCPA) — Be Prepared
    Kevin Moos, President of Primitive Logic; Ian Rowlands, Director of Product Marketing, ASG Recorded: Sep 20 2018 52 mins
    The State of California recently passed the strictest data privacy law in the United States: the California Consumer Privacy Act of 2018 (CCPA). The new law grants California residents a broad array of rights related to their personal information and requires companies to rethink their entire approach to capturing, storing, and sharing personal data.

    Join Kevin Moos, President of Primitive Logic and Ian Rowlands, Director of Product Marketing, ASG, to learn:
    • How this regulation affects your company, regardless of where you’re located
    • What you need to do now to get ready for CCPA’s deadline of January 2020
    • If you’re ready for GDPR, do you have to do anything more for CCPA?
    • Useful tools and technologies to help you meet the new law’s requirements
    • How you can turn CCPA readiness into a benefit (not just a cost)
  • The DevSecOps Journey: Why It Starts with Agile DevOps & App Security
    The DevSecOps Journey: Why It Starts with Agile DevOps & App Security
    Jaweed Metz, Principal, Products at Contrast Security Recorded: Sep 18 2018 45 mins
    DevSecOps is best viewed as a journey that enlightened organizations are starting to embark on.

    The major constituent to consider on this journey is ensuring that organizations defenses have been properly configured, implemented and operated–to that end, application security testing is of paramount importance. As businesses strive to rapidly release code in order to satisfy customer demands and gain a competitive advantage,security must work in tandem with Agile DevOps processes.

    Traditionally, security has been an afterthought, or at the very least introduced late into the release process.Hence, security has been viewed as an impediment to high velocity Agile DevOps processes and becoming a primary bottleneck in the software delivery pipeline.This can cause major contention and distrust between development and security teams–but that doesn’t need to be the case.

    Cyber threats are continuous–so shouldn’t development and security practitioners work in tandem in order to deliver and deploy code securely and continuously?The cultural, differences between development and security teams needs to be addressed and a unified approach established in order to integrate security as early as possible.Automated application security addresses these cultural, technical and process issues.

    This webinar will highlight how modern, automated application security tools can help weave security into the code continuously and accurately throughout the SDLC.Automated application security enables the real-time identification and response to new attacks and vulnerabilities that emerge in custom and third party code. Additionally, we will discuss how integrated application security unites developers and security practitioners with the tools they are already using so that they can work even more effectively.
  • Modern MFA, Deployable Everywhere
    Modern MFA, Deployable Everywhere
    Shawn Keve (EVP, Simeio), Vikram Subramanian, (VP, Simeio), Andrew Goodman (Sr Product Marketing Manager, Ping Identity) Nov 12 2018 7:00 pm UTC 60 mins
    Heavy infrastructure, complex administration and poor user experiences are the hallmarks of legacy multi-factor authentication solutions. They're also the reasons why you haven't deployed MFA in more places to protect against the #1 cause of data breaches, compromised credentials.

    A cloud delivered, adaptive MFA solution balances security and convenience for workforce and consumer use cases. It also allows you to deploy MFA everywhere - on every app, API, VPN, within high risk transaction flows and even when logging into corporate devices. But implementing MFA everywhere isn’t easy, and surprising roadblocks can appear along the way.

    Join Shawn Keve, EVP at Simeio Solutions, Vikram Subramanian, VP Solutions Advisory at Simeio Solutions and Andrew Goodman, Sr. Product Marketing Manager at Ping Identity to learn about requirements and best practices for a comprehensive MFA deployment.
  • Is Software Asset Management the Tonic to your Cloud Headache?
    Is Software Asset Management the Tonic to your Cloud Headache?
    Antony Attfield, Rhys Williams and Mark Lillywhite Nov 13 2018 11:00 am UTC 60 mins
    According to Gartner’s latest research (cited in August 2018*) 20% of the IT budget is now being spent on cloud-based services. An upward trend that is being driven by more organisations moving workloads to the cloud and increasing adoption of SaaS applications.

    Many of these organisations, however, are experiencing significant cloud overspend due to a lack of visibility and effective monitoring across single and multiple cloud providers. And cloud sprawl and overspend is exacerbated by shadow IT with undetected or unauthorised purchases from cloud vendors.

    So how big is this problem of cloud overspend and how do you address it? Join experienced consultants from SoftwareONE, Antony Attfield and Rhys Williams and Mark Lillywhite from Snow to understand how to gain control reduce your cloud spend.

    Agenda

    -The challenges of monitoring usage and spend of IaaS, PaaS and SaaS
    -The disconnect between IT and Lines of Business and C-Level
    -Gaining visibility and control of your cloud estate
    -A demonstration of Snow’s SaaS detection and management capabilities
    -A demonstration of SoftwareONE’s PyraCloud for IaaS and PaaS cloud spend management
    -Best practice governance for budget management and chargeback



    *Source: http://www.cloudpro.co.uk/iaas/7603/cloud-spending-now-swallows-20-of-it-budgets
  • Effective Information Management Enables Digital Transformation
    Effective Information Management Enables Digital Transformation
    Rob Perry, VP, Product Marketing, ASG Technologies Nov 13 2018 6:00 pm UTC 60 mins
    “Digital Transformation” may be an over-used phrase, however, its objectives and value remain strong. To survive and thrive in an information-driven economy, enterprises must leverage digital means of connecting with their employees, customers and partners. Information is fundamental as it drives processes, enables insight and is increasingly a product in itself. Join us as we will explore the state of digital transformation and how enabling information plays a core role in transforming companies in the information economy.
  • HP Security Panel: Expert Analysis
    HP Security Panel: Expert Analysis
    Graham Cluley | Michael Howard | Louella Fernandes | Howard Roberts Nov 14 2018 10:00 am UTC 60 mins
    We recently launched a series of short films for HP printers, featuring Christian Slater as The Wolf. At the upcoming HP Security Panel webinar, we’ll look beyond the films to discuss the smartest ways of safeguarding against hackers like The Wolf.

    Join our panel of independent and HP security experts to hear their invaluable insights on Wednesday, 14th November at 10:00 GMT.

    In this security masterclass discussion, our panelists will address a series of pressing issues.

    • Are vendors using scaremongering to sell their own services?
    • If faces are the new fingerprints, what are the security risks?
    • How big a threat is IoT and what’s the next Mirai Botnet?
    • Is the public sector the weakest link?
    • Can security be baked into the hardware?

    This is an excellent opportunity for board-level and IT directors to gain invaluable security insights from experts on the frontlines.

    Panelists:
    Graham Cluley: Award-winning security blogger - moderator
    Michael Howard: Head of Security Practice, HP Inc.
    Louella Fernandes: Research Director Quocirca
    Howard Roberts: Print Technologist, HP Inc.
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Nov 14 2018 1:00 pm UTC 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Por que a segurança importa?  Perspectivas globais e locais do Unisys Security
    Por que a segurança importa? Perspectivas globais e locais do Unisys Security
    Leonardo Carissimi, Security Solutions Director, Unisys Latin America Nov 14 2018 1:00 pm UTC 60 mins
    Unisys Security Index é uma importante pesquisa sobre preocupações de segurança realizadas em todo o mundo. Lançado globalmente em 2007, fornece uma medida regular e estatisticamente sólida das preocupações que os consumidores em 13 países têm sobre os principais aspectos da segurança, incluindo segurança nacional, financeira, pessoal e cibernética.
    Participe deste webinar para ouvir Leonardo Carissimi, diretor de Segurança Cibernética da Unisys América Latina, compartilhar os resultados e fatos da pesquisa sobre as preocupações de segurança dos consumidores do Brasil.
    Leonardo usará os resultados deste ano, justapostos com mais de uma década de histórico de pesquisas para fornecer um relatório convincente sobre o estado de segurança da perspectiva que mais importa: o usuário.
  • How to Stay on Top of Users’ Identities and their Access Rights
    How to Stay on Top of Users’ Identities and their Access Rights
    Dave Bryant, Product Management Director, Ivanti Nov 14 2018 5:00 pm UTC 56 mins
    With the widespread adoption of cloud services and mobile devices, today’s modern IT environment has experienced rapid change. Your users now need access to dozens of applications to do their jobs from day one. Onboarding users has become more complex and time-consuming for IT, especially if undertaken manually. And when users leave or change roles, deprovisioning access to applications is often last on the list of tasks or slips through cracks completely.

    How do you give an increasingly diverse and mobile group of users, access to the applications they need and stop them circumnavigating IT to get what they want? To keep your users productive, the best solution is a policy-driven identity and access management (IAM) system to ensure they are accurately identified from day one and to automatically remove access when a user leaves. By providing access to only the systems, applications and data your users need you also reduce the attack vector, common when users have more entitlement than required.

    Join Dave Bryant, product management director for Ivanti Identity Director, in this introductory webcast to understand:

    • Why it’s important to adopt an identity-based approach to control user access to systems
    • How automated onboarding and offboarding can improve productivity
    • What are the key components you need in a scalable IAM solution?
  • ¿Por qué importa la seguridad?  Perspectivas de Latinoamérica de Unisys Security
    ¿Por qué importa la seguridad? Perspectivas de Latinoamérica de Unisys Security
    Leonardo Carissimi, Security Solutions Director, Unisys Latin America Nov 14 2018 8:30 pm UTC 60 mins
    Unisys Security Index es una importante encuesta regular de las preocupaciones de seguridad llevada a cabo en todo el mundo. Lanzada a nivel mundial desde 2007, proporciona una medida regular y estadísticamente sólida de las preocupaciones que tienen los consumidores de 13 países con respecto a los principales aspectos de la seguridad, incluyendo seguridad nacional, financiera, personal y ciber seguridad.
    Únase a este webinar para escuchar a Leonardo Carissimi, director de Ciberseguridad para Unisys América Latina, compartir los resultados y realidades de la encuesta sobre de las preocupaciones de seguridad de los consumidores en Argentina, Colombia y México.
    Leonardo usará los resultados de este año, yuxtapuestos con más de una década de historial de encuestas realizadas para proporcionar un informe convincente sobre el estado de la seguridad desde la perspectiva que más importa: la del usuario.
  • Dispelling 7 common myths of cloud collaboration and the digital workplace
    Dispelling 7 common myths of cloud collaboration and the digital workplace
    Andrew Small from BT, Dominic Elliott from Cisco and Stewart Wright from IR Nov 15 2018 3:00 pm UTC 37 mins
    You want to transform team collaboration, but you’re just a little bit anxious on the how. All those concerns you have about things going wrong, complexity, disruption, cost and value, all mean that whilst you know it’s important, it’s still a daunting prospect. By dispelling those myths and giving you our opinion based on communication transformations with hundreds of organisations just like you, you’ll be in a better place to make an informed decision. And making the right choice means having a more connected workspace and reaping the benefits that collaboration and digital services can offer.

    Join Andrew Small, Vice president, unified communications and contact centres, BT; Dominic Elliott, CTO BT global relationship, Cisco; and Stewart Wright, General manager UK & Ireland, IR, to find out why making the switch is easier than you think.
  • An Inside Look at Targeted Ransomware Attacks
    An Inside Look at Targeted Ransomware Attacks
    Peter Mackenzie, Malware Escalations Manager, Sophos Nov 15 2018 6:00 pm UTC 47 mins
    Join Peter Mackenzie as he discusses the rise of targeted ransomware and why attacks like SamSam, Dharma and BitPaymer are making headlines. Watch a live demo of a ransomware payload being unleashed and the steps you need to protect your organization from similar attacks.
  • Wofür können Sie Kubernetes einsetzen?
    Wofür können Sie Kubernetes einsetzen?
    Naomi Albuquerque Nov 20 2018 11:00 am UTC 60 mins
    Sie benötigen schnell umfassende und aktuelle Informationen über die Kubernetes Plattform? Dieses Webinar liefert Ihnen alle wichtigen Informationen und zeigt Ihnen den Einstieg in die Kubernetes-Distribution von Canonical.

    Nutzen Sie dieses Webinar, um ...
    > zu erfahren, wie Unternehmen Geld und Zeit mit Kubernetes sparen
    > zu lernen, wie Sie erfolgreich einsteigen, von der Implementierung bis zu ersten Workloads
    > Initiale Konfiguration, Installation und Validierung
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure
    Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Nov 20 2018 11:00 am UTC 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Nov 21 2018 11:00 am UTC 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • Ask the Expert: From On-Prem to Cloud - The Evolution of Cloud Security
    Ask the Expert: From On-Prem to Cloud - The Evolution of Cloud Security
    Jeremy Snyder, DivvyCloud & Bill Prout, Sophos Nov 27 2018 5:30 pm UTC 30 mins
    Join this one-on-one interview with Jeremy Snyder, VP Business Development, DivvyCloud and Bill Prout, Lead Security Architect - Public Cloud, Sophos for an in-depth discussion on the importance of simplicity and layered security when migrating to the cloud.

    Topics include:
    - What kind of threats are impacting the public cloud?
    - What types of security solutions does Sophos have for AWS?
    - How has cloud security evolved over the past few years?
    - What's different about security in the cloud compared to on premise?
    - What are some considerations to keep in mind when architecting secure environments in the cloud?
    - What are some of the biggest challenges customers face when trying to secure their AWS environments?

    This on-camera interview will be live-streamed directly from AWS re:Invent in Las Vegas. Tune in from the comfort of your desk!
  • Mission Leads, Technology Follows
    Mission Leads, Technology Follows
    Jeff Cherrington, VP, Product Management, Systems, ASG Technologies Nov 27 2018 6:00 pm UTC 60 mins
    Technology serves business and people. Business serves people - not technology. Having a perfectly tuned mainframe, server, virtual, or cloud technology stack won’t provide your business with value – only the ability to leverage the technology to focus on business outcomes will add that insight.

    As Gartner wrote in its Insights from the 2018 CIO Agenda Report, “The CIO role is changing from IT-outcome-focused to business-outcome-focused." Does your enterprise support this view?

    In this session, find out what you should be looking for from software products and the vendors supplying them to ensure you can focus on mission critical processes, and less on the underlying technology.
  • Securing Your Cloud Networks
    Securing Your Cloud Networks
    Jeremy Snyder, Bill Prout, Tim Sandage, Derek Hanson Nov 27 2018 6:30 pm UTC 60 mins
    Join this live panel discussion with experts at AWS re:Invent 2018 for a deep dive into next-gen endpoint protection and cloud-managed network security.

    Tune into this interactive Q&A session with world renowned IT leaders while they discuss the following:

    - The latest network security demands, threats, and protections
    - What a successful cloud-managed network looks like
    - How to embrace IT initiatives with confidence while keeping your cloud network secure and compliant

    This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.

    Moderator:
    Jeremy Snyder, VP Sales & Business Development, DivvyCloud

    Panelists:
    Bill Prout, Lead Security Architect, Public Cloud, Sophos
    Tim Sandage, Sr. Security Partner Strategist, AWS
    Derek Hanson, Sr. Director of Solutions Architecture & Standards, Yubico
  • Accelerate Your Digital Business with Modern Content Services
    Accelerate Your Digital Business with Modern Content Services
    Cheryl McKinnon, Principal Analyst, Forrester Research; David Downing, EVP, ASG; Greg Wilson, Director of Sales, Content, ASG Nov 27 2018 7:00 pm UTC 59 mins
    Modern content services and flexible platforms have won the generational war over traditional monolithic suites. A third of enterprises are leveraging newer, modern content platforms … is your organization one of them?

    Attend this webinar hosted by ASG, and featuring guest speaker Cheryl McKinnon, Principal Analyst at Forrester Research, to learn about the top trends shaping the ECM market and benchmark your own program against industry peers.

    Businesses today demand agility, integrations and interoperability. Documents contain data that is hard to mine for insights in older suites – thus analytics increasingly drives content management roadmaps. Join us and hear how companies like yours are addressing new use cases for content management and delivery.

    Come discover:
    - Latest emerging technologies, such as analytics and intelligent content services in the context of content
    - Where other businesses are in their content management maturity, how they govern their programs, and where they are re-thinking their business cases
    - Where the future of content services is moving and why a platform approach can help overcome top challenges such as user adoption and content sprawl

    Don’t miss this opportunity to find out how you can accelerate your digital transformation with modern content services.
  • Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Chris Marsh of 451 Research & Matt Crawford of Citrix Nov 28 2018 1:00 pm UTC 55 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Tom Patterson, Chief Trust Officer, Unisys Nov 28 2018 3:00 pm UTC 60 mins
    Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.

    Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.

    Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
  • Expecting the future with 4SIGHT
    Expecting the future with 4SIGHT
    Eric Hanselman - Chief Analyst, Robert Mahowald - Senior Vice President, and Simon Robinson - Senior Vice President Dec 4 2018 3:00 pm UTC 60 mins
    Planning for the future is a complicated business. Organizations have to align business objectives with market forces and the technology that they hope will support them. Early stage technologies can offer tempting options, but it can be hard to quantify the risk in using them.

    451 Research has distilled two years of conversations with their clients, demand-side research and the insight of their analyst team into a planning framework that can help organizations take on the future on their own terms. It’s not a quadrant, a wave or a platform. It doesn’t admonish you with prescriptive technology imperatives. It’s our collective view of the most important factors shaping tomorrow, so we can begin to plan today. It outlines trends that are pushing them and the assesses the maturity of the technologies that are behind them. We have identified four key "forces" that define all the trends we foresee: Universal Risk, Invisible Infrastructure, Pervasive Intelligence, and Contextual Experience. Whether you’re an enterprise, a vendor or a service provider, these forces, together or in part, are rocking your world, and 4SIGHT is an essential tool to plan for better future outcomes. This webinar will look at 4SIGHT capabilities and some of the outcomes that it can achieve, and explore some examples of 4SIGHT dialogs.

    Join us and see how you can raise your planning game!
  • Deep Learning for Hackers
    Deep Learning for Hackers
    Joshua Saxe, Chief Data Scientist, Sophos Dec 6 2018 6:00 pm UTC 54 mins
    Anyone who keeps up with technology news has read about deep neural networks beating human champions at Go, achieving breakthrough accuracy at voice recognition, and generally driving today's major advances in artificial intelligence. Little has been said about the ways deep neural network approaches are quietly achieving analogous breakthroughs in intrusion detection.

    Join this webcast as we demystify deep neural network (deep learning) concepts and prove how predictive security can protect against unknown threats.

    This session will cover:

    - How deep learning detects cyberattacks before they happen
    - Latest research from SophosLabs
    - How to launch your own deep neural networks
  • Data Intelligence Drives Digital Business Success
    Data Intelligence Drives Digital Business Success
    Marcus MacNeill, SVP, Product Management, ASG Technologies Dec 11 2018 6:00 pm UTC 60 mins
    In the digital era, an organization’s business strategy is inextricably linked to its data strategy.

    Yet increases in data volume, variety and velocity continue to challenge data management strategies and capabilities making it difficult for enterprises to effectively satisfy defensive (run the business) and offensive (drive the business) needs.

    In this session, we’ll explore the state of data management including key trends and their impact on the direction and evolution of ASG’s Data Intelligence offering.
  • The Road Forward with ASG and the Mobius Content Services Platform
    The Road Forward with ASG and the Mobius Content Services Platform
    David Downing, EVP, Product Management and Marketing, ASG; Greg Wilson, Director, Content Services, ASG Dec 18 2018 6:00 pm UTC 60 mins
    The advances in technology and the growth of information are dramatically changing the landscape – constantly & expeditiously.

    ASG’s Mobius Content Services Platform (CSP) enables your organization to establish a digital automation foundation on which to transform your business.

    In this session, learn how ASG and its Mobius CSP delivers the technology to help you and your company thrive in the rapidly changing information management environment, prepare for the emerging digital automation economy and use Mobius to bring people, process and information together at digital speeds with web scaling.
  • Don’t Take the Bait. Stop the Phishing
    Don’t Take the Bait. Stop the Phishing
    Rippy Sekhon, Channel Sales Engineer, Sophos Jan 3 2019 6:00 pm UTC 49 mins
    While big-name ransomware like WannaCry grabs the headlines, phishing is the cybercrime that’s consistently hooking organizations week in and week out. In fact, over 77% of organizations experience a phishing attack at least once a month.

    Join us for this informative webinar to learn more about phishing and how to stop it, including:

    - The evolution of phishing
    - How phishing works: the business behind the emails
    - Common tactics hackers use in their phishing attacks
  • XG Firewall: See It. Stop It. Secure It.
    XG Firewall: See It. Stop It. Secure It.
    Chris McCormack, Firewall Product Specialist, Sophos Jan 17 2019 6:00 pm UTC 60 mins
    Sophos XG Firewall gives you everything you need to secure your network against advanced threats like ransomware, bots, worms, hacks, breaches and APTs. In addition, you get unparalleled network visibility that no other firewall on the market can deliver.

    Join this webcast to see how XG Firewall can transform your network security and performance. You’ll see:

    - How the threat landscape is evolving
    - How ransomware gets onto your network and spreads – fast
    - Essential protection you need in your firewall to secure your network
    - Best practices for deploying your firewall to provide a solid defense