Get powerful end user computing insights from influential EUC experts. Connect with thought leaders and colleagues to get the most up-to-date knowledge on effective approaches to get non-programmers to create working applications.
Ian Rowlands, ASG; Bob Cumberbatch; Consultant; Gaurav Bansal, RCloud Consulting; Garry Manser, VisaRecorded: Dec 10 201860 mins
Over the past few years, about 90% of data management has been dedicated to the operational requirements of data governance and regulatory compliance, but this is changing rapidly as financial institutions look to exploit and drive business value from data.
At a growing number of institutions, close to 70% of data management resource is focused on understanding data and implementing analytics that help the business work faster, smarter and identify new opportunities.
How can you shift the balance between operations and business analytics safely and successfully, and ensure investment in data management initiatives delivers proportionate business value?
Join this webinar to find out more about:
- The shift from operations to business led data management
- Ongoing challenges and solutions of regulatory compliance
- How to identify value in data and drive business benefit
- Approaches to balancing operational and business needs
- Technology tools and solutions to sustain the balance
- Ensuring return on investment in data management initiatives
Aaron Cockerill, Chief Strategy OfficerRecorded: Dec 7 201829 mins
What is currently happening the world of security?
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*
The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.
During this webinar Aaron Cockrill, CSO at Lookout will talk about:
- What does a post-perimeter world mean to enterprise security?
- Why mobility changes the enterprise security paradigm?
- How to protect data when accessed from outside the corporate perimeter?
- What are the current and emerging threats?
* Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
Joshua Saxe, Chief Data Scientist, SophosRecorded: Dec 6 201854 mins
Anyone who keeps up with technology news has read about deep neural networks beating human champions at Go, achieving breakthrough accuracy at voice recognition, and generally driving today's major advances in artificial intelligence. Little has been said about the ways deep neural network approaches are quietly achieving analogous breakthroughs in intrusion detection.
Join this webcast as we demystify deep neural network (deep learning) concepts and prove how predictive security can protect against unknown threats.
This session will cover:
- How deep learning detects cyberattacks before they happen
- Latest research from SophosLabs
- How to launch your own deep neural networks
Вадим Тихонычев, Руководитель направления клиентских решенийRecorded: Dec 5 201852 mins
Pабота больше не ассоциируется с фиксированным рабочим местом. Работники хотят иметь возможности выбора, чтобы оставаться на связи и быть продуктивнымии там, где и когда им нужно. У них есть своя весомая точка зрения, свой взгляд на технологии. Чтобы успешно провести трансформацию рабочих мест, необходимо учитывать как потребности конечного пользователя, так и потребности ИТ. Модернизация оборудования решает лишь половину проблемы. Организации также должны проанализировать, как они управляют, поддерживают и защищают свои ПК, и найти более эффективные и результативные решения для удовлетворения потребностей современных сотрудников.
Eric Hanselman - Chief Analyst, Robert Mahowald - Senior Vice President, and Simon Robinson - Senior Vice PresidentRecorded: Dec 4 201853 mins
Planning for the future is a complicated business. Organizations have to align business objectives with market forces and the technology that they hope will support them. Early stage technologies can offer tempting options, but it can be hard to quantify the risk in using them.
451 Research has distilled two years of conversations with their clients, demand-side research and the insight of their analyst team into a planning framework that can help organizations take on the future on their own terms. It’s not a quadrant, a wave or a platform. It doesn’t admonish you with prescriptive technology imperatives. It’s our collective view of the most important factors shaping tomorrow, so we can begin to plan today. It outlines trends that are pushing them and the assesses the maturity of the technologies that are behind them. We have identified four key "forces" that define all the trends we foresee: Universal Risk, Invisible Infrastructure, Pervasive Intelligence, and Contextual Experience. Whether you’re an enterprise, a vendor or a service provider, these forces, together or in part, are rocking your world, and 4SIGHT is an essential tool to plan for better future outcomes. This webinar will look at 4SIGHT capabilities and some of the outcomes that it can achieve, and explore some examples of 4SIGHT dialogs.
Join us and see how you can raise your planning game!
Andrew Small, Binita Jilka from BT and Kieran Kelly, Lead Collaboration Practitioner, Sei Mani.Recorded: Dec 4 201822 mins
Organisations spend money on tools that help make jobs easier, but employees aren’t always falling over themselves to use them. Introducing a new technology without getting your people on side won’t succeed. So how do you drive high levels of user adoption? Find out the secrets in transforming employee collaboration behaviours and achieving faster business results. This could be the reason of success or failure of your collaboration technology and digital workplace strategy.
Andrew Small, Vice president, unified communications and contact centres, BT
Kieran Kelly, Lead Collaboration Practitioner, Sei Mani
Binita Jilka, Senior Manager, user adoption for unified communications, BT
Paul Murray, Senior Systems Engineer, Nutanix & James Hsu, Senior Technology Architect, CitrixRecorded: Dec 4 201860 mins
Nutanix and Citrix have partnered to create a tightly integrated multi- cloud solution that simplifies and accelerates VDI deployments for companies of any size. With Nutanix InstantON for Citrix Cloud, the entire Citrix software stack is delivered as a 1-click service from the Citrix Cloud, attaching with zero effort to the on-prem Nutanix clusters powered by Citrix XenServer or AHV, the Nutanix native hypervisor. This hybrid mode tackles all the drawbacks of an exclusively on-prem or an exclusively cloud-based desktop delivery mechanism.
In this webinar, you will learn how Nutanix and Citrix allow you to:
· Take advantage of enterprise-class VDI benefits without any complexity
· Simplify desktop management and operations while increasing security and compliance
· Bring IT's focus back to the end-user with the help of Citrix XenApp and XenDesktop running on the Nutanix Enterprise Cloud
· Safely transition to hybrid cloud using our tightly integrated VDI solution called Nutanix InstantON for Citrix Cloud
Jon Erickson, Vice President, TEI, Forrester & Gary Henderson, Director of Product Management, ASG TechnologiesRecorded: Nov 29 201854 mins
Most IT professionals today face a lack of visibility into how their IT resources are being used. Disparate, silo-based tools create gaps in infrastructure coverage and data collection, resulting in a limited understanding of resource utilization and creating difficulties for collaboration and decision-making. Does this sound like your organization?
Join guest speaker, Forrester Consulting’s Jon Erickson and ASG Technologies’ Gary Henderson to find out how ASG-TMON Performance Analyzer can provide you with the insights needed to accurately track and optimize resource use, control costs, improve service availability and effectively predict and plan with a single, consistent enterprise solution for analysis and reporting.
An independent Total Economic Impact™ (TEI) commissioned study conducted by Forrester Consulting on behalf of ASG Technologies revealed that ASG-TMON Performance Analyzer delivers 179% ROI, Net Present Value (NPV) of $1.5M over three years, and savings of $54K in OPEX and $180K in CAPEX. Don’t miss your opportunity to find out more.
Andrew Small from BT, Dominic Elliott from Cisco and Stewart Wright from IRRecorded: Nov 29 201837 mins
You want to transform team collaboration, but you’re just a little bit anxious on the how. All those concerns you have about things going wrong, complexity, disruption, cost and value, all mean that whilst you know it’s important, it’s still a daunting prospect. By dispelling those myths and giving you our opinion based on communication transformations with hundreds of organisations just like you, you’ll be in a better place to make an informed decision. And making the right choice means having a more connected workspace and reaping the benefits that collaboration and digital services can offer.
Join Andrew Small, Vice president, unified communications and contact centres, BT; Dominic Elliott, CTO BT global relationship, Cisco; and Stewart Wright, General manager UK & Ireland, IR, to find out why making the switch is easier than you think.
Chris Marsh of 451 Research & Matt Crawford of CitrixRecorded: Nov 28 201855 mins
The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.
Topics discussed will include:
* Current sources of friction that hamper productivity
* Barriers to collaboration and execution
* The importance of context and automation in enabling workers
* Tips for selecting technologies that map to the new workforce
Cheryl McKinnon, Principal Analyst, Forrester Research; David Downing, EVP, ASG; Greg Wilson, Director of Sales, Content, ASGRecorded: Nov 27 201859 mins
Modern content services and flexible platforms have won the generational war over traditional monolithic suites. A third of enterprises are leveraging newer, modern content platforms … is your organization one of them?
Attend this webinar hosted by ASG, and featuring guest speaker Cheryl McKinnon, Principal Analyst at Forrester Research, to learn about the top trends shaping the ECM market and benchmark your own program against industry peers.
Businesses today demand agility, integrations and interoperability. Documents contain data that is hard to mine for insights in older suites – thus analytics increasingly drives content management roadmaps. Join us and hear how companies like yours are addressing new use cases for content management and delivery.
- Latest emerging technologies, such as analytics and intelligent content services in the context of content
- Where other businesses are in their content management maturity, how they govern their programs, and where they are re-thinking their business cases
- Where the future of content services is moving and why a platform approach can help overcome top challenges such as user adoption and content sprawl
Don’t miss this opportunity to find out how you can accelerate your digital transformation with modern content services.
Jeremy Snyder, Bill Prout, Tim Sandage, Derek HansonRecorded: Nov 27 201851 mins
Join this live panel discussion with experts at AWS re:Invent 2018 for a deep dive into next-gen endpoint protection and cloud-managed network security.
Tune into this interactive Q&A session with world renowned IT leaders while they discuss the following:
- The latest network security demands, threats, and protections
- What a successful cloud-managed network looks like
- How to embrace IT initiatives with confidence while keeping your cloud network secure and compliant
This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.
Jeremy Snyder, VP Sales & Business Development, DivvyCloud
Bill Prout, Lead Security Architect, Public Cloud, Sophos
Tim Sandage, Sr. Security Partner Strategist, AWS
Derek Hanson, Sr. Director of Solutions Architecture & Standards, Yubico
Jeff Cherrington, VP, Product Management, Systems, ASG TechnologiesRecorded: Nov 27 201847 mins
Technology serves business and people. Business serves people - not technology. Having a perfectly tuned mainframe, server, virtual, or cloud technology stack won’t provide your business with value – only the ability to leverage the technology to focus on business outcomes will add that insight.
As Gartner wrote in its Insights from the 2018 CIO Agenda Report, “The CIO role is changing from IT-outcome-focused to business-outcome-focused." Does your enterprise support this view?
In this session, find out what you should be looking for from software products and the vendors supplying them to ensure you can focus on mission critical processes, and less on the underlying technology.
Jeremy Snyder, DivvyCloud & Bill Prout, SophosRecorded: Nov 27 201829 mins
Join this one-on-one interview with Jeremy Snyder, VP Business Development, DivvyCloud and Bill Prout, Lead Security Architect - Public Cloud, Sophos for an in-depth discussion on the importance of simplicity and layered security when migrating to the cloud.
- What kind of threats are impacting the public cloud?
- What types of security solutions does Sophos have for AWS?
- How has cloud security evolved over the past few years?
- What's different about security in the cloud compared to on premise?
- What are some considerations to keep in mind when architecting secure environments in the cloud?
- What are some of the biggest challenges customers face when trying to secure their AWS environments?
This on-camera interview will be live-streamed directly from AWS re:Invent in Las Vegas. Tune in from the comfort of your desk!
Sie benötigen schnell umfassende und aktuelle Informationen über die Kubernetes Plattform? Dieses Webinar liefert Ihnen alle wichtigen Informationen und zeigt Ihnen den Einstieg in die Kubernetes-Distribution von Canonical.
Nutzen Sie dieses Webinar, um ...
> zu erfahren, wie Unternehmen Geld und Zeit mit Kubernetes sparen
> zu lernen, wie Sie erfolgreich einsteigen, von der Implementierung bis zu ersten Workloads
> Initiale Konfiguration, Installation und Validierung
Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, CitrixRecorded: Nov 21 201853 mins
Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.
Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.
This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:
• UEM and how it fits into a Digital Workspace
• Managing endpoints through Citrix UEM
• The future of Citrix UEM
Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, CitrixRecorded: Nov 20 201848 mins
Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.
Discover how Citrix Workspace:
• Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
• Extends the perimeter into cloud apps and across multiple devices and networks
• Automates image management and provisioning to move workloads from datacenters to any cloud
• Enables choices of devices from a single endpoint management solution
• Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
• Improves the experience of mobile apps with secure email integrated with Slack
Peter Mackenzie, Malware Escalations Manager, SophosRecorded: Nov 15 201847 mins
Join Peter Mackenzie as he discusses the rise of targeted ransomware and why attacks like SamSam, Dharma and BitPaymer are making headlines. Watch a live demo of a ransomware payload being unleashed and the steps you need to protect your organization from similar attacks.
Leonardo Carissimi, Security Solutions Director, Unisys Latin AmericaRecorded: Nov 14 201862 mins
Unisys Security Index es una importante encuesta regular de las preocupaciones de seguridad llevada a cabo en todo el mundo. Lanzada a nivel mundial desde 2007, proporciona una medida regular y estadísticamente sólida de las preocupaciones que tienen los consumidores de 13 países con respecto a los principales aspectos de la seguridad, incluyendo seguridad nacional, financiera, personal y ciber seguridad.
Únase a este webinar para escuchar a Leonardo Carissimi, director de Ciberseguridad para Unisys América Latina, compartir los resultados y realidades de la encuesta sobre de las preocupaciones de seguridad de los consumidores en Argentina, Colombia y México.
Leonardo usará los resultados de este año, yuxtapuestos con más de una década de historial de encuestas realizadas para proporcionar un informe convincente sobre el estado de la seguridad desde la perspectiva que más importa: la del usuario.
Dave Bryant, Product Management Director, IvantiRecorded: Nov 14 201853 mins
With the widespread adoption of cloud services and mobile devices, today’s modern IT environment has experienced rapid change. Your users now need access to dozens of applications to do their jobs from day one. Onboarding users has become more complex and time-consuming for IT, especially if undertaken manually. And when users leave or change roles, deprovisioning access to applications is often last on the list of tasks or slips through cracks completely.
How do you give an increasingly diverse and mobile group of users, access to the applications they need and stop them circumnavigating IT to get what they want? To keep your users productive, the best solution is a policy-driven identity and access management (IAM) system to ensure they are accurately identified from day one and to automatically remove access when a user leaves. By providing access to only the systems, applications and data your users need you also reduce the attack vector, common when users have more entitlement than required.
Join Dave Bryant, product management director for Ivanti Identity Director, in this introductory webcast to understand:
• Why it’s important to adopt an identity-based approach to control user access to systems
• How automated onboarding and offboarding can improve productivity
• What are the key components you need in a scalable IAM solution?
Leonardo Carissimi, Security Solutions Director, Unisys Latin AmericaRecorded: Nov 14 201863 mins
Unisys Security Index é uma importante pesquisa sobre preocupações de segurança realizadas em todo o mundo. Lançado globalmente em 2007, fornece uma medida regular e estatisticamente sólida das preocupações que os consumidores em 13 países têm sobre os principais aspectos da segurança, incluindo segurança nacional, financeira, pessoal e cibernética.
Participe deste webinar para ouvir Leonardo Carissimi, diretor de Segurança Cibernética da Unisys América Latina, compartilhar os resultados e fatos da pesquisa sobre as preocupações de segurança dos consumidores do Brasil.
Leonardo usará os resultados deste ano, justapostos com mais de uma década de histórico de pesquisas para fornecer um relatório convincente sobre o estado de segurança da perspectiva que mais importa: o usuário.
Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, CitrixRecorded: Nov 14 201857 mins
Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.
With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.
Some of Citrix Workspace key advantages include:
• Higher user productivity and a better experience
• Stronger security which extends to the cloud
• joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario
Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
Graham Cluley | Michael Howard | Louella Fernandes | Howard RobertsRecorded: Nov 14 201839 mins
We recently launched a series of short films for HP printers, featuring Christian Slater as The Wolf. At the upcoming HP Security Panel webinar, we’ll look beyond the films to discuss the smartest ways of safeguarding against hackers like The Wolf.
In this security masterclass discussion, our panelists will address a series of pressing issues.
• Are vendors using scaremongering to sell their own services?
• If faces are the new fingerprints, what are the security risks?
• How big a threat is IoT and what’s the next Mirai Botnet?
• Is the public sector the weakest link?
• Can security be baked into the hardware?
This is an excellent opportunity for board-level and IT directors to gain invaluable security insights from experts on the frontlines.
Graham Cluley: Award-winning security blogger - moderator
Michael Howard: Head of Security Practice, HP Inc.
Louella Fernandes: Research Director Quocirca
Howard Roberts: Print Technologist, HP Inc.
Rob Perry, VP, Product Marketing, ASG TechnologiesRecorded: Nov 13 201846 mins
“Digital Transformation” may be an over-used phrase, however, its objectives and value remain strong. To survive and thrive in an information-driven economy, enterprises must leverage digital means of connecting with their employees, customers and partners. Information is fundamental as it drives processes, enables insight and is increasingly a product in itself. Join us as we will explore the state of digital transformation and how enabling information plays a core role in transforming companies in the information economy.
Antony Attfield, Rhys Williams and Mark LillywhiteRecorded: Nov 13 201846 mins
According to Gartner’s latest research (cited in August 2018*) 20% of the IT budget is now being spent on cloud-based services. An upward trend that is being driven by more organisations moving workloads to the cloud and increasing adoption of SaaS applications.
Many of these organisations, however, are experiencing significant cloud overspend due to a lack of visibility and effective monitoring across single and multiple cloud providers. And cloud sprawl and overspend is exacerbated by shadow IT with undetected or unauthorised purchases from cloud vendors.
So how big is this problem of cloud overspend and how do you address it? Join experienced consultants from SoftwareONE, Antony Attfield and Rhys Williams and Mark Lillywhite from Snow to understand how to gain control reduce your cloud spend.
-The challenges of monitoring usage and spend of IaaS, PaaS and SaaS
-The disconnect between IT and Lines of Business and C-Level
-Gaining visibility and control of your cloud estate
-A demonstration of Snow’s SaaS detection and management capabilities
-A demonstration of SoftwareONE’s PyraCloud for IaaS and PaaS cloud spend management
-Best practice governance for budget management and chargeback
Marcus MacNeill, SVP, Product Management, ASG TechnologiesDec 11 20186:00 pmUTC60 mins
In the digital era, an organization’s business strategy is inextricably linked to its data strategy.
Yet increases in data volume, variety and velocity continue to challenge data management strategies and capabilities making it difficult for enterprises to effectively satisfy defensive (run the business) and offensive (drive the business) needs.
In this session, we’ll explore the state of data management including key trends and their impact on the direction and evolution of ASG’s Data Intelligence offering.
Chris Goettl, Director of Product Management for Security at IvantiDec 11 20187:00 pmUTC60 mins
Since WannaCry changed the game in June 2017, cyber threats have continued evolve in intent and consequences. How can you protect your organization from today’s sophisticated attacks designed to have such a critical impact? You must prioritize risk.
Join Chris Goettl, Director of Product Management for Security at Ivanti, as he looks at how attacks today are getting into networks, the damage they’ve done, and how focusing on the right threat vectors can go a long way toward protecting your organization from a similar fate.
Александр Белоглинцев, Региональный менеджер Dell PrecisionDec 13 20187:00 amUTC60 mins
Специализированные клиентские продукты Dell — для пользователей с особенными требованиями. Рабочие станции Dell Precision для работы с ресурсоемкими приложениями. Защищенные ноутбуки Latitude Rugged для доступа к ИТ-инфраструктуре в полевых условиях.
Adrian Wilson, Account Technology Strategist, Microsoft & Mirela Cunjalo, Dir. Product Mgmt., TeradiciDec 13 20186:00 pmUTC60 mins
Join Teradici and Microsoft for a glimpse into how scalable desktop resources in the cloud can help in education.
In this webinar, you'll learn how education institutions can leverage virtual desktops in the cloud to provide improved computing resources to students, strengthen security, and help make university IT operations more efficient. Teradici Cloud Access Software and Microsoft Azure enable a solution that will solve today’s desktop management challenges and drive improved access for students, personalized learning, and improved student outcomes.
•The unique benefits of hosting desktops and applications on Azure
•A reference architecture for the education use case
•The security and performance benefits PCoIP technology provides
•Endpoint flexibility, from ultra-secure PCoIP Zero Clients to personal devices
Don’t miss this webinar and a chance to learn how you can get started with Teradici and Microsoft.
Q&A will follow.
Eunice Lee, Solution Engineer at Algolia and Amy Saekow, Marketplace Product amanger at InfluensterDec 18 20185:00 pmUTC33 mins
Your customers’ voices are your overlooked revenue. Empower product reviews with search and discovery to drive user engagement and accelerate the path to the shopping cart.
Join Eunice Lee, solutions engineer at Algolia and Amy Saekow, Marketplace Product Manager at Influenster on July 26 to learn about best ways to uncover meaningful feedback to jumpstart user engagement and stickiness, and drive growth.
In this 30-minute webinar, you’ll learn:
-How product reviews inform and steer buyers toward desired business outcomes
- Best practices in leveraging product reviews to motivate user engagement and conversions
- The future of utilizing product reviews as a strategic weapon
David Downing, EVP, Product Management and Marketing, ASG; Greg Wilson, Director, Content Services, ASGDec 18 20186:00 pmUTC60 mins
The advances in technology and the growth of information are dramatically changing the landscape – constantly & expeditiously.
ASG’s Mobius Content Services Platform (CSP) enables your organization to establish a digital automation foundation on which to transform your business.
In this session, learn how ASG and its Mobius CSP delivers the technology to help you and your company thrive in the rapidly changing information management environment, prepare for the emerging digital automation economy and use Mobius to bring people, process and information together at digital speeds with web scaling.
Rippy Sekhon, Channel Sales Engineer, SophosJan 3 20196:00 pmUTC49 mins
While big-name ransomware like WannaCry grabs the headlines, phishing is the cybercrime that’s consistently hooking organizations week in and week out. In fact, over 77% of organizations experience a phishing attack at least once a month.
Join us for this informative webinar to learn more about phishing and how to stop it, including:
- The evolution of phishing
- How phishing works: the business behind the emails
- Common tactics hackers use in their phishing attacks
Tom Patterson, Chief Trust Officer, UnisysJan 16 20194:00 pmUTC75 mins
Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.
Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.
Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
Chris McCormack, Firewall Product Specialist, SophosJan 17 20196:00 pmUTC60 mins
Sophos XG Firewall gives you everything you need to secure your network against advanced threats like ransomware, bots, worms, hacks, breaches and APTs. In addition, you get unparalleled network visibility that no other firewall on the market can deliver.
Join this webcast to see how XG Firewall can transform your network security and performance. You’ll see:
- How the threat landscape is evolving
- How ransomware gets onto your network and spreads – fast
- Essential protection you need in your firewall to secure your network
- Best practices for deploying your firewall to provide a solid defense