Hi [[ session.user.profile.firstName ]]

End User Computing

  • Multi-Cloud, Security & Encryption: The State of the Market
    Multi-Cloud, Security & Encryption: The State of the Market Rory Duncan 451 Research, Charles Goldberg Thales Recorded: Oct 12 2017 59 mins
    The rapid rise of hybrid cloud and multi-cloud infrastructure is enabling business agility and cost reduction, but at what price to infrastructure security? Concerns over increased hacking and malicious attacks, regulatory compliance, and internal auditing are driving infrastructure decision-makers to think again about protecting sensitive data in multiple cloud workloads, and what security solutions to spend their budgets on. At the same time, the lack of skilled talent, rapidly evolving cloud security offerings, and the management of legacy environments is creating additional strain on protecting data.

    In this session, Rory Duncan, Research Director with 451 Research will outline market trends and disruptive factors facing the security services market, sharing demand-side primary research and providing insight into areas of innovation.
  • Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments
    Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments Kelly Morgan, Research VP, Services at 451 Research; Nathan Vandenberg, GM, Data Centre at Dimension Data Recorded: Oct 12 2017 50 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?

    Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.

    Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.

    We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.

    Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
  • How Performance Management can Drive Growth & Loyalty: An Allscripts Case Study
    How Performance Management can Drive Growth & Loyalty: An Allscripts Case Study John Worthington, Director of Product Management at eG Innovations and Mike Montano, CDO of Strategy at Allscripts Recorded: Oct 11 2017 61 mins
    In a fast-moving, 24/7 healthcare environment, doctors and nurses cannot afford any impediments to delivering the best possible patient care. To ensure that the hospitals, physicians, nurses and other care providers it serves receive the best client experience possible, Allscripts offers a proactive application monitoring service that checks for potential problems that could slow down or disrupt the use of its mission-critical healthcare IT systems.

    Initially launched in 2006, the proactive support offering monitors clients’ IT infrastructure and use of Allscripts solutions. Since its introduction, Allscripts has been able to improve client experiences in a way that has had a significant impact on business growth and client retention.
  • Cyber security: Threats and opportunities across the public sector
    Cyber security: Threats and opportunities across the public sector Richard Mullins, Account Manager Malwarebytes & Mark Phillips, Sales Engineer, Malwarebytes Recorded: Oct 11 2017 62 mins
    In light of recent high profile cyberattacks, notably WannaCry, it is now more important than ever for organisations to take stock of their current IT environment and mitigate security risks caused by the ever-changing threat landscape.
    In fact, a recent report by iGov found that nearly 76% of participants had experienced a cyber-attack, and 50% were ransomware victims in the last twelve months.
    This webinar focuses on how organisations can best meet this challenge and also explored the most common pitfalls faced and offer expert advice to combat this. Stuart Rogers, IT Security and Technical Architecture Manager at Cheshire Constabulary, shares his organisation’s story.
  • Retail Survival in the Age of Digital Disruption
    Retail Survival in the Age of Digital Disruption Sheryl Kingstone 451 Research, Sudesh Girdhari CenturyLink Recorded: Oct 10 2017 57 mins
    Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.

    The retail industry is bursting with digital innovation driving change. This session will review:
    •How differentiation demands digital maturity
    •Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
    •The role of cloud services and its impact on customer experience, agility, efficiency and risk
  • Tout savoir sur le ransomware
    Tout savoir sur le ransomware Nicolas Sterckmans Malwarebytes and Stephane Larcher, Mag Securs Recorded: Oct 9 2017 63 mins
    Malwarebytes & Mag-Securs ont organisé un webinaire autour de l'une des menaces les plus inquiétantes de ces derniers et prochains mois. Le cabinet Osterman Research a réalisé cet été pour le compte de Malwarebytes une étude très complète auprès de 180 entreprises françaises sur les ransomwares et leurs conséquences. Les conclusions sont sans appel : les ransomwares figurent désormais parmi les principales menaces dont peuvent être victimes les entreprises et la tendance n'est clairement pas à un ralentissement. La situation est désormais perçue comme inquiétante ou très inquiétante pour la plupart des 180 entreprises interrogées
    Ce webinaire a présenté les résultats de cette étude ainsi qu’une analyse du ransomware jaff. Il a été suivi par une session de questions/réponses très complète.
  • Seus clientes confiam na segurança da sua empresa, produtos e serviços?
    Seus clientes confiam na segurança da sua empresa, produtos e serviços? Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys Recorded: Oct 5 2017 61 mins
    Saiba mais sobre as preocupações dos seus consumidores!

    O Unisys Security Index mede as preocupações dos consumidores em questões relacionadas à segurança nacional, pessoal, financeira e da Internet. O Unisys Security Index mostrou um aumento de 20% na preocupação de segurança geral em 2017. Saiba mais neste webinar onde iremos apresentar os detalhes do estudo e falar sobre como lidar com ameaças cibernéticas, o que os consumidores pensam sobre Internet das Coisas, e como aumentar a confiança de seus consumidores enquanto sua empresa avança na Transformação Digital.

    Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys. Possui mais de 20 anos de experiência no setor de segurança. Na Unisys, ajuda a construir um mundo mais seguro, ao mesmo tempo em que transforma o setor de segurança com uma inovadora abordagem de microssegmentação, bem como a arquitetura de segurança adaptativa e a inteligência de ameaças cibernéticas.
  • The Explosion of Hyperconverged Infrastructure: Tackling Data Center Complexity
    The Explosion of Hyperconverged Infrastructure: Tackling Data Center Complexity Ben Bolles, VP of Product, Pivot3 Recorded: Oct 4 2017 34 mins
    The hyperconverged infrastructure space is exploding! It can be hard to keep up with the leading technologies in this incredibly fast growing market. Hear how Pivot3’s unique architecture tackles the data center complexity problem and simplifies IT deployment, performance & datacenter management. We’ll discuss how Pivot3’s newest product, Acuity, delivers 6X the performance and is capable of supporting 2X – 3X more VMs than conventional HCI solutions.
  • ¿Sus clientes confían en la seguridad de su compañía, productos y servicios?
    ¿Sus clientes confían en la seguridad de su compañía, productos y servicios? Leonardo Carissimi, Experto en Seguridad y Director de Soluciones de Seguridad en América Latina de Unisys Recorded: Oct 3 2017 61 mins
    ¡Conozca las preocupaciones de sus clientes y actúe!

    El Unisys Security Index mide las preocupaciones de los consumidores en problemas relacionados a la seguridad nacional, personal, financiera y en Internet. El Índice Global de Seguridad mostró en 2017 un aumento de 20% en la preocupación general de seguridad. Aprenda más en este webinar sobre los detalles del estudio, cómo hacer frente a ciber amenazas, qué opinan los consumidores sobre el Internet of Things, y gánese la confianza de sus consumidores mientras continúa su proceso de Transformación Digital.

    Leonardo Carissimi, Experto en Seguridad y Director de Soluciones de Seguridad en América Latina de Unisys. Cuenta con más de 20 años de experiencia en la industria de seguridad. En Unisys, ayuda a construir un mundo más seguro mientras transforma la industria de seguridad con el innovador enfoque de micro-segmentación, así como con la Arquitectura de Seguridad Adaptativa y la Inteligencia de Ciber-Amenazas.
  • Game Over Ransomware
    Game Over Ransomware Mark Phillips, Snr Sales Engineer Recorded: Oct 3 2017 26 mins
    It’s no secret that traditional anti-virus products are consistently falling short of the mark, particularly when faced with the clever orchestration of a Ransomware attack.
    With half a million new downloads each day and more than 3 million daily remediation events using our software, there is nobody better placed than Malwarebytes to help defend you from the increasingly clever tactics of the cyber-criminal.
    Please join us on our webinar where we will give you visibility into why these attacks are succeeding, how you can best defend your organisation against them and what to do in the event they are successful.
  • Tips on Addressing Security Awareness and Ransomware Protection
    Tips on Addressing Security Awareness and Ransomware Protection Dr. Al Hartmann (Chief Scientist, Ziften), Mike Levin (CEO & Founder, Center for Information Security Awareness) Recorded: Sep 28 2017 51 mins
    Ransomware has gone from “on the radar” to a Code 5 level threat with the rise of “ransomworms” snaking through global networks in hundreds of countries. Your employees are the front line of defense, and IT and security teams are tasked with protection, detection and response. But nobody knows how the next ransomware strain will take shape and teams are rarely, if ever, properly coordinated.

    In this webinar, you will learn:
    • Tips to help end users recognize and avoid ransomware.
    • Tips to help IT / systems administrators minimize vulnerabilities and risks to protect against ransomware.
    • Tips to help security teams detect and respond to ransomware attacks.

    About our presenters:
    Dr. Al Hartmann is the Chief Scientist at Ziften since 2009, focused on data analysis of user and endpoint behavior to drive critical situational awareness of enterprise cyber activity for security and operations management. Prior to co-founding Ziften, Dr. Hartmann was a senior researcher with Symantec's Research Labs and Technology Scouting Group, performing research in system cybersecurity and application quality of service.

    Michael Levin is the founder and CEO of the Center for Information Security Awareness. Prior to founding CFISA, Levin had a distinguished 30-year career in at the United States Department of Homeland Security. Levin served as the Deputy Director of the National Cyber Security Division, as well as the served as the Branch Chief of the U.S. Secret Service Electronic Crimes Task Force program in Washington DC. He was a member of the Secret Service Electronic Crimes Special Agent program and worked around computer forensics and cybercrime investigations for over 15 years.
  • The Relevance of Omnichannel Banking in the Age of Digital Disruption
    The Relevance of Omnichannel Banking in the Age of Digital Disruption Eric Crabtree, VP & Global Head, Financial Services, Unisys & Daniel Latimore, Senior Vice President, Banking, Celent Recorded: Sep 28 2017 59 mins
    Digital disruption in the banking arena is accelerating. Pure digital firms have raised the bar for customer expectations regarding convenience, service, and speed. Fintech companies are taking over profitable areas such as payments, lending, and retail investments. In this new world, banks need to create a seamless, personalized customer journey. This journey must be marked by intuitively grasping and fulfilling the customer’s next demand.

    But how do banks create this sought-after customer experience? The answer is found in building a cohesive ecosystem incorporating the perfect blend of both digital and physical touchpoints.

    Discover how to grow wallet and market share by making customer journeys easy and frictionless across all touchpoints. As you simplify the way customers interact with your bank, you will reduce costs and free up both staff and capital, which you can then apply to support further innovation and growth.

    About The Speakers:

    Eric Crabtree, VP & Global Head, Financial Services, Unisys
    Eric Crabtree is the global leader for Financial Services. In his current role, Eric is building a cohesive strategy for the financial services vertical, by leveraging the extensive domain expertise across the Unisys portfolio and ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives.

    Daniel Latimore, Senior Vice President, Banking, Celent
    Daniel W. Latimore, CFA, is the Senior Vice President of Celent’s Banking group and is based in the firm’s Boston office. Mr. Latimore’s areas of focus include the banking ecosystem, digital and omnichannel banking, and innovation.
  • How the GDPR Impacts Your Enterprise Mobility Management Practices
    How the GDPR Impacts Your Enterprise Mobility Management Practices Magnus Mjøsund, Apperian Product Manager & Chris Marsh, 451 Research Director, Workforce Productivity & Compliance Recorded: Sep 28 2017 57 mins
    The European Union’s General Data Protection Regulation (GDPR) that goes into effect on 25 May 2018 expands the meaning of personal data, mandates when such data can be collected, and enforces full transparency and consent from the user. Organizations of all types processing data from EU residents must evaluate and likely make changes to their enterprise mobility management practices in order to adhere to the new law or face severe penalties.

    Join this webinar to understand what GDPR means for infrastructure and operations professionals that are responsible for mobile and endpoint strategy to make sure your organization is compliant from day one.

    We will review the most important sections of the law related to enterprise mobility from an administration and end user perspective as well as the implications for BYOD programs. EMM should be leveraged to meet GDPR requirements and you will learn how a mobile application management solution like Apperian supports privacy and mitigates risk by managing corporate data while leaving personal data untouched.
  • Why You Should Monitor IT Service Performance in Pre-Production Environments
    Why You Should Monitor IT Service Performance in Pre-Production Environments John Worthington, Director of Product Management at eG Innovations Recorded: Sep 27 2017 41 mins
    A converged APM/IPM solution can facilitate true root-cause analysis from an end-to-end IT service management (ITSM) perspective, inclusive of both supporting and customer-facing IT services, as well as across multiple service lifecycle stages. In addition, by having all service team members share an easy-to-use interface that is tailored to each of their requirements minimizes learning curves, enhances operational efficiency and ensures user satisfaction by providing a production-grade monitor to IT staff that are working in staging environments.

    Attend this webinar to discover how a converged APM/IPM solution can be leveraged effectively in pre-production to eliminate bottlenecks in testing, delays, re-work or increased deployment risk.
  • OpenStack Pike is here: what’s new?
    OpenStack Pike is here: what’s new? Mark Baker, OpenStack Product Manager and James Page, OpenStack Engineering Lead Recorded: Sep 27 2017 34 mins
    Join this webinar to learn what is new in Canonical OpenStack Pike. Product Manager Mark Baker will highlight some of the new features in OpenStack Pike as well as many of the updates to underlying technologies such as OpenvSwitch and Ceph that are fully integrated with Pike. We'll discuss how to upgrade from Ocata to Pike using OpenStack Charms and how you can get going with Pike from scratch in a matter of hours.
  • Be the Hero: History of Ransomware
    Be the Hero: History of Ransomware Helge Husemann Recorded: Sep 27 2017 54 mins
    Walk through the history of Ransomware from 1989 to 2017 and examining and its impact to global business.
  • Are Your Apps Chasing Users Away ?
    Are Your Apps Chasing Users Away ? Dennis Drogseth EMA V.P Research & Nik Koutsoukos Riverbed VP, Recorded: Sep 25 2017 62 mins
    How to Deliver Superior Digital Experiences: Users expect flawless digital experiences when using your apps, irrespective of device or location. To succeed, IT and business stakeholders need digital experience insights to ensure that every business-critical application keeps customers happy and employees productive. This requires a comprehensive Digital Experience Management (DEM) strategy.

    Join us as we discuss:

    - Must-haves to rolling out successful digital experience management practices
    - Critical components of an effective DEM solution
    - Expected business results and outcomes
    - Pitfalls to avoid along the way
  • Game Over Ransomware, Wie Malwarebytes Ihren Tag rettet
    Game Over Ransomware, Wie Malwarebytes Ihren Tag rettet Helge Husemann Recorded: Sep 25 2017 62 mins
    Unternehmensendpunkte stehen unter ständigem Angriff. Eine erfolgreiche Malware-Infektion bietet den festen Cyber-Kriminellen, die die sensiblen Daten einer Organisation stehlen müssen. Obwohl Ransomware selbst weit von einer neuen Bedrohung entfernt ist, mit einem beispiellosen Wachstum von 267% im letzten Jahr allein, ist es eindeutig schnell zu den Cyber-Kriminellen aktuelle Waffe der Wahl.
  • How to pick a winning IoT business model
    How to pick a winning IoT business model Mike Bell Canonical, Ian Hughes 451 Research Recorded: Sep 20 2017 63 mins
    Getting started on an IoT project? Are you going to build a business or a liability for yourself? Canonical commissioned a research of 361 IoT professionals to find out how their projects are progressing. The findings were compiled in a report titled Defining IoT Business Models, which explored the practices of organisations currently implementing IoT projects. You can read it for yourself at http://ubunt.eu/vkTPIW

    In this webinar, Canonical's EVP of Devices & IoT and 451 Research's IoT Analyst will discuss our findings as well as the challenges and opportunities businesses will face with the internet of things!

    Join our webinar to find out...
    >How businesses can monetise the internet of things in the long term
    >What skills they need and where to find them
    >How to address fundamental security considerations.
  • Digital Transformation: How Europe will turn disruption into differentiation
    Digital Transformation: How Europe will turn disruption into differentiation Nick Patience 451 Research, Matt Leonard CenturyLink Recorded: Sep 20 2017 59 mins
    Join 451 Research and CenturyLink on the 20th September at 3:00pm UK time, 4:00pm CET, to discuss how enterprises are choosing and deploying digital transformation initiatives for business gain. This webinar will focus on the strategies and actions impacting the European market.

    Organisations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation can play out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and CenturyLink to learn how European enterprises are making assured first steps, and discover the following:

    - Understand how companies with more progressive digital transformation strategies are prioritising their efforts for competitive differentiation, changing the nature of their business with innovative technologies, and making service provider choices to accelerate results.

    - Gain insights and recommendations from a major survey of the IT priorities of enterprises in Europe.

    - Identify the key shifts in business context that will continue to shape digitisation efforts, and how these need to be reflected in a digital transformation roadmap for IT organisations.
  • A day in the life of a GDPR breach
    A day in the life of a GDPR breach Elizabeth Davies, Matthias Maier Recorded: Sep 20 2017 60 mins
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?

    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you will learn

    What breach response will look like under the GDPR
    What tools and processes a data privacy officer will rely on in case of a breach
    What departments and entities will be involved beyond IT
    What activities are currently happening within organizations to prepare for the GDPR
    What the consequences of the breach could be
  • Thinking of SD-WAN? Critical Factors for a Successful Network Transformation
    Thinking of SD-WAN? Critical Factors for a Successful Network Transformation Jim Duffy 451Research, Karim Eljai NTT Recorded: Sep 19 2017 55 mins
    In a rapidly evolving and digitized economy, the adoption of cloud services is accelerating for companies both small and large who want to remain competitive and relevant to their market and clients. Network transformation becomes critical for enterprises to support these cloud initiatives and in this context the emergence of SD-WAN is very timely. If you are considering SD-WAN to access cloud applications and leverage the Internet for your wide area network, this webinar will provide insight into real life SD-WAN deployment considerations. This knowledge will help you fast track your SD-WAN decision-making process and avoid costly mistakes.

    Join this webinar to learn:
    • How connectivity and security need to be a critical consideration of SD-WAN deployment, both at the data center and small branch office level
    • How SD-WAN network analytics can provide you with detailed visibility into the behavior of your network and can help your IT organization better manage workload and performance
    • Why it’s important to select a partner who is flexible and can offer choices from the design, deployment and management of the transformation
    • And more
  • Cybercrime Tactics & Techniques
    Cybercrime Tactics & Techniques Adam Kujawa, Director of Malware Intelligence Recorded: Sep 19 2017 62 mins
    In the quarterly Cybercrime Tactics and Techniques report our Malwarebytes Labs team looks deep into what is dominating the threat landscape. The Labs team saw a significant shift in dominance of new threats and infection techniques.

    Key takeaways:

    Ransomware continued to dominate while utilised new techniques such as NotPetya and WannaCry
    Exploit Kit and Malicious Spam (malspam) lead the way for distribution
    Windows and Mac malware predictions
  • Gameover Ransomware- Les Jeux Sont Faits
    Gameover Ransomware- Les Jeux Sont Faits Nicolas Sterckmans, Sales Engineer France Recorded: Sep 19 2017 71 mins
    Rejoignez-nous à l'occasion de notre webinaire pour mieux comprendre le succès de ces attaques, découvrir les meilleures stratégies pour défendre votre organisation contre celles-ci et en savoir plus sur l'attitude à adopter face à une attaque qui a pénétré votre système.

    La sophistication de la cybercriminalité d'aujourd'hui nécessite une défense multicouche intelligente. Avec la technologie de télémétrie unique de Malwarebytes, vous pouvez de nouveau combattre à armes égales et bénéficier des meilleures capacités de remédiation et de protection actuellement disponibles sur le marché.
  • The Emerging Impact of NVMe-oF and Storage Class Memory
    The Emerging Impact of NVMe-oF and Storage Class Memory Jeff Kato, Senior Analyst & Consultant, Taneja Group Oct 17 2017 9:00 pm UTC 60 mins
    Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.

    It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?

    Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellonox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
  • Remote Endpoint Management and PCoIP Management Console
    Remote Endpoint Management and PCoIP Management Console Paul Barrett, Systems Specialist, Teradici Oct 19 2017 5:00 pm UTC 30 mins
    Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.

    During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be.

    The demonstration will cover how to:
    •Configure PCoIP Zero Clients for off-site employees or contractors
    •Determine the best WAN settings to recognize out-of-office devices
  • Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance
    Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance Rodrigo Fontecilla,Vice President and Global Lead for Analytics, Unisys & Maria Allen, Senior Director & Global Head, Unisys Oct 25 2017 4:00 pm UTC 75 mins
    Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.

    About the Speakers:
    Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.

    Maria L. Allen is Senior Director and Global Head of Unisys' Financial Services Portfolio Solutions. In this role, Maria is responsible for building new products and services across all regions, platforms and channels ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives.

    For more information on our Advanced Analytics offerings contact us at advancedanalytics@unisys.com and visit http://www.unisys.com/analytics
  • Why DCIM fails: Overcoming the pitfalls
    Why DCIM fails: Overcoming the pitfalls Fred Dirla, Dave Eastman, John Parker, Rhonda Ascierto Oct 25 2017 5:00 pm UTC 60 mins
    When deployed successfully, managers say that DCIM software has revolutionized their operations. It lowers risk, it makes it easier to push utilization levels higher, and it enables effective capacity provisioning and planning, among other benefits.

    For others, however, the software has not achieved the ROI they expected. This is often because DCIM is an enabling technology as much as it is a management approach. To realize DCIM's full value, project leadership, operational process and cross-domain collaboration are essential. This means that the cost – and value – of a DCIM installation goes well beyond the software license; new internal operational, business procedures and workflows are required.

    This webinar explores these issues in detail and addresses the key question: "Is there any ‘easy’ button’ for DCIM to be successful?" Tune in to find out!
  • How to Embrace New Workplace Communication Technology
    How to Embrace New Workplace Communication Technology Simon Dudley, Director of Product Strategy, Logitech & Zane Carroll, Product Development Manager, Staples Business Advantage Oct 25 2017 6:00 pm UTC 60 mins
    Gain valuable insight from our expert speakers.
    Webinar topics include:
    Cross Company Platform Adoption
    -How IT Managers can make every department happy
    Change Management
    -How to deal and adapt when everything changes
    Multi- Communication Solutions
    Communication is Key
    -What to consider when looking at a new communication plan

    Presenter Information:
    Simon Dudley, Director of Product Strategy, Logitech

    Simon Dudley is Director of Product Strategy for Logitech’s Video Collaboration business. Dudley joined Logitech in August 2016. Prior to that, he operated Excession Events, where he consulted organizations on optimizing their use of video collaboration. Dudley also spent a number of years working in sales, marketing, and product management at companies like LifeSize and Polycom, which has given him a holistic view of the video conferencing market.

    Dudley is an expert in the design, implementation and use of visual collaboration tools. He is a sought-after speaker in the collaboration industry, a published author, and the recipient of two patents. A native of the United Kingdom, Dudley currently resides in Austin, Texas.

    Zane Carroll, Product Development Manager, Staples Business Advantage

    Zane Carroll leads the Product Development Office at Staples Technology Solutions. He is collegiately trained as an Audio engineer with a passion for all things technology and quality sound. Throughout his time at Staples, he has supported our Computing & Printing hardware, managed services, and supported the launch of many new product categories, including the tablet, mobility, and most recently Device as a Service offerings here at Staples.
  • Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider
    Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider Jim Curtis 451 Research, Steve Croce, Product Manager for ElasticSearch and DBaaS Object Rocket Oct 31 2017 6:00 pm UTC 60 mins
    Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
  • CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation
    CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation Aaron Sherrill Senior Analyst 451 Research, Dave Mahon CSO CenturyLink Nov 15 2017 7:00 pm UTC 60 mins
    Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?
  • Managing Security and Risk for Digital Transformation in Financial Services
    Managing Security and Risk for Digital Transformation in Financial Services Nicholle Lindner, Industry Director; Ashwin Pal, Director Security Services; Ian Selbie, Solution Director, Unisys Nov 30 2017 3:00 am UTC 75 mins
    Consumers are enjoying a rapidly expanding choice of how, when and where they bank. However, banks must now manage the extra responsibilities and risks these new channels bring.

    In APAC, the Unisys Security Index™ revealed consumers are more concerned about bankcard fraud, ID theft and cyber security than about physical threats like the threat of war/terrorism and natural disasters.

    So how can banks balance the need to digitally transform, maintain privacy and security but still provide a seamless, personalized and trustworthy customer experience?

    We will cover:
     The 10 steps banks need to take to get digital transformation right, and how to improve customer experience and trust during this journey.

     How the CISO’s office can be part of the digital transformation journey, embedding security as part of the development lifecycle from the start as a value added component and not a burden as an afterthought.

     Innovative technologies like predictive analytics and biometrics can help provide a seamless, frictionless experience for customers. But how can they be applied without seeming invasive?

    Nicholle is an experienced senior financial services executive with almost 20 yrs experience working in financial institutions and corporates. She has extensive knowledge across financial services, payments, consumer and business banking, IT, analytics, marketing and strategy. 

    Ashwin is an experienced and qualified CISO responsible for running the delivery of the security business within the APAC region. He is also responsible for leading and delivering security engagements to C level executives ensuring the successful delivery of client security programs.

    Ian Selbie is responsible for Unisys Financial Industry solutions in APAC focused on enhancing business processes and compliance in financial institutions including omnichannel, financial crime prevention, enterprise payments and case management solutions.