Get powerful end user computing insights from influential EUC experts. Connect with thought leaders and colleagues to get the most up-to-date knowledge on effective approaches to get non-programmers to create working applications.
Transactions are migrating from offline to online channels, driving dramatic shifts in the fraud landscape. 2018 will be another challenging year as increasing EMV penetration in the US further throttles the counterfeiting market, shifting more fraudulent activity into digital channels. Join 451 Research Principal Analyst Jordan McKee as he discusses the major fraud trends to monitor in the New Year and shares market data on the current and future state of the digital commerce threat environment.
How much time and missed opportunity is yesterday's network design costing today’s organisation? For many, cloud has already disrupted their software, communications and storage to scale and simplify operations – so why not networks?
Join our CWNEs for this 30 minute workshop o review the benefits of today’s cloud networking offerings – and how to apply principles of software defined networking for radical simplification of the local and wide area network.
•How cloud networking compares to previous fixed network
•How to remove limitations and achieve faster deployment, simpler
management and instant adaptability
•Comparing clouds for your network’s future – scalability, security
•How to automate complex operations and dynamically change
network behaviour based on activity
•What cloud-powered big data, AI and analytics could do for you
We as cybersecurity professionals have witnessed firsthand how a mishandled data breach can cause far more harm to an organisation than it otherwise should have. From financial losses to reputational damage, breaches can leave companies suffering for months, or even years, thereafter when not handled properly. This presentation will share real-world examples of how organisations can effectively recover from a security incident, while minimising potential damage and risk. Regardless of their industry, session attendees will learn best practices for restoring system trust, proving compliance, and communicating to key stakeholders.
• Discover how to quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems
• Learn how to use a systematic approach to restore trust in affected systems
• Understand how to apply a “standard of due care” in order to prove compliance to regulatory agencies
• Understand key information that needs to be communicated to various stakeholders in the event of a breach
A senior level Information Technology professional with over 30 years of experience in management, consulting and service provision. Paul has been at Tripwire for 8 years and is the International Services Director.
Modern software is getting complicated, and we’re simply not able to
hire or train people fast enough to operate it due to the complexity of
micro-services running across many machines. Juju from Canonical allows
you to deploy open source operations code and model-driven operations at
any scale on any cloud. Join the Juju team to find out what Juju is, and
what benefits it can bring to your company.
Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.
With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.
Register to today's webinar to learn about:
- The threat landscape
- The evolution of mobile threats
- How does that impact your organization?
- How other organizations are doing?
- The impact of a breach post GDPR
- How to protect your enterprise data?
We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.
However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.
Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.
During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:
•Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
•The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
•The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
•Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
•Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face
The world of data is changing at breakneck speed. Costs are dropping, speed is increasing, and centralization is getting easier. But getting more value from your data isn’t always easy. We’ll talk about the key trends in analytics and how to prepare your organization for this new world.
Join this webinar and learn:
- Which new analytic technologies and trends you need to be aware of and how they’ll impact your business;
- How to use new technologies to actually empower business users to self-serve to answers and make better decisions using data in their day-to-day workflows
- Pitfalls to avoid (and flashy technologies to ignore) when you’re planning your analytics strategy
2018 is the year for containers. IT teams are using them to bring new levels of cloud portability, infrastructure utilization, and micro-services to applications. There’s just one big catch: what about the data? How will you bring container-style automation, portability, and operations to enterprise applications and data? Attend this webinar and learn how to make it easy. HPE will share top use cases and show a demo of advanced data services with persistent storage for teams.
For nearly two decades, Mike has focused on high-end security research, first as a researcher and penetration tester and then building and leading teams of highly skilled security professionals. He previously led Product Development Security at GE Healthcare, where he built a global team to secure the Healthcare Internet of Things. Prior to that, he co-founded The Hacker Academy and MAD Security, and has held leadership positions at companies including nCircle Network Security, Liberty Mutual Insurance and Neohapsis.
Incorporate data into your product, and take advantage of word class databases and a modern data platform. And learn from companies that have been there.
Join this webinar and learn:
- How to incorporate data into your product, and take advantage of word class databases and a modern data platform. And hear from companies that have been there.
- Learn how PDX improved their in house analytical solution and offered their pharmacies a premium level of service — granting them access to collaborate and share the data that they need.
- Learn how Namely, a HR platform, was able to leverage modern technologies ---databases optimized for performance, ETL tools, BI platforms that offer customization and can scale — to build out a scalable go to market solution in 3 months.
Don't let inefficient cost allocations cause bad business decisions. Inaccurate allocations diminish the value of reporting, distorting your understanding of where in the business costs are being consumed.
With the right practices in place, accurate cost allocations are achievable. In 10 minutes we’ll talk about how to get it right.
Join Phil Richards and Simon Townsend to get both an EMEA and Americas perspective on how technology solutions such as Discovery, Patching, Application Control, Privilege Management and Service Management can help you minimize the headaches around GDPR.
Attendees will learn:
• How to navigate GDPR without a silver bullet
• The importance of identifying PII data, protecting users, and securing endpoints
• How to integrate, unify, orchestrate, and automate with service management
• Ways to implement solutions that reduce the pain associated with GDPR
It can be hard to see GDPR as anything more than a massive on-going headache. However, while GDPR requires companies to adjust how they handle data in many ways, it also helps organizations ensure overall compliance, protect against cybersecurity threats, manage their IT assets, and more. Register today and discover solutions to help you prepare for GDPR and accelerate your organization with fewer headaches.
Want to know even more about Snaps? In our second webinar on the topic we’ll be taking a technical look at Snaps themselves, our writing and publishing tool Snapcraft, how you can convert your existing applications, and the insight you’ll need to start building your first snaps! Ready to start building? You won’t want to miss this one.
Achieving a single pane of glass for performance management has been an elusive goal, as organizations are faced with an increasingly complex mix of legacy, virtual and cloud technologies, as well as emerging operating models and evolving roles/skillsets.
But, monitoring the performance of digital business services demands more than visibility to just the end user experience, applications, or the underlying infrastructure. It requires an ability to automatically anticipate and isolate performance issues across a heterogeneous mix of technologies, devices and suppliers.
Digital business services are how end users experience IT, and that is how IT services must be managed. Achieving unified performance management will continue to be elusive until all stakeholders are aligned with this approach.
Join this webinar, as John Worthington, Director of Product Marketing at eG innovations, details some best practices for achieving the single pane of glass vision. Attendees will receive the related White Paper, "Best Practices for Achieving Transparency in Digital Business Services Monitoring".
In this webinar, you will:
-Learn how monitoring can be leveraged in continuous improvement and other transformative change programs
-See how converged APM/IPM can accelerate achievement of a single point of glass for performance monitoring
-Identify some best practices you can apply for achieving unified monitoring and improving organizational transparency
What if you could package, distribute, and update any application for Linux Desktops, Servers, Clouds, and IoT devices? Snaps are containerised software packages that are simple to create and install, safe to run, and can work on all major Linux systems without modification. Whether you’re a developer, desktop user, or even a device manufacturer; you won't want to miss this!
We’re entering the era of cloud consumption. The market is transitioning from one that has been defined mostly by building clouds to one in which cloud service acquisition is the primary driver of IT spending. For enterprises seeking to take advantage of cloud, the key question is ‘how fast can I go?’ As both the foundation for digital transformation and as the platform to support innovation, cloud will bring profound change in 2018.
Join 451 Research’s leading cloud analysts, William Fellows, Melanie Posey, Katy Ring and Owen Rogers on February 9 for a live webinar as they review and discuss the trends expected to shape the cloud landscape in 2018, and the level of impact those changes will have. Please come armed with questions, as there will be a live Q&A session at the end of the webinar.
Watch our 10-minute On-Demand Webinar "Key trends in Telecom Industry for 2018" to learn more about the expansion of traditional TEM into new expense management categories, such as:
- SD WAN and what it means for traditional network design
- Telecom and cloud pricing models
It’s no longer business as usual in the multibillion-dollar tech M&A market. New buyers are displacing many of the long-time leaders, while other companies from far outside the tech industry are suddenly looking for ways to buy into new trends. To help you navigate this changing M&A landscape, join Brenon Daly, 451 Research’s Director of Financials, for a look ahead to activity in 2018. Drawing on data and insight from across 451 Research, our annual Tech M&A Outlook webinar will highlight specific trends in key enterprise IT markets – including information security, software, mobility and IoT -- that will shape dealflow and valuations in the coming year.
What if you could move your Linux Virtual Machines straight to containers, easily, without modifying the apps or administration processes? LXD from Canonical is a pure-container hypervisor that takes the speed and latency of containers and brings them to the hypervisor world. LXD is a machine container, meaning they’re just like traditional physical and virtual machines. Join our webinar on February 7th with Technical Lead Stephane Graber to learn...
>The difference between application & machine containers
>How pure-container hypervisors such as LXD can reduce overhead
>How to use LXD in practice from deployment to operations
Software is driving the digital economy. Combining insight across key areas of the software market, we look ahead at what we think will transform in 2018, using predictions from four of our Research Channels: Customer Experience & Commerce, Data Platforms & Analytics, Development, DevOps & ITOps and Workforce Productivity & Compliance.
Join 451 Research’s leading software analysts, Nick Patience, Sheryl Kingstone, Chris Marsh, Matt Aslett, and Carl Lehmann on February 7 for a live webinar as they review and discuss the trends expected to shape the software landscape and the level of impact those changes will have. Please come armed with questions, as there will be a live Q&A session at the end of the webinar.
General Data Protection Regulation (GDPR) takes effect on May 25, 2018, requiring financial institutions to meet stringent new rules on managing the personal data of EU residents, and setting astronomic fines for those that fail to comply. The webinar will discuss the broad data management challenges posed by the regulation, the GDPR articles your data management programme will need to consider, and how compliance can best be addressed. Referring to a recent survey conducted by A-Team Group and sponsored by ASG Technologies, the webinar will also explore approaches to the regulation, explain the importance of governance to successful implementation, and offer guidance on new technologies that support compliance.
Register for the webinar to find out about:
•State-of-play on compliance
•Data management challenges
•Approaches and solutions
•Expert views on implementation
Lookout and Electronic Frontier Foundation (EFF) have discovered Dark Caracal, a campaign attributed to the cyber-warfare arm of the Lebanese General Security Directorate.
This actor is prolific and has engaged in widespread APT-style attack campaigns around the world — with mobile devices as the primary target.
This joint research effort has obtained hundreds of gigabytes of exfiltrated data across thousands of victims in over 21 countries. Stolen data include enterprise intellectual property and personally-identifiable information.
Register to the webinar to find out:
- the latest details about Dark Caracal, the first globally-active mobile APT
- whether your organisation has been impacted
- the steps you should take to protect data on mobile devices.
Michael Flossman Security Researcher, Lookout
Eva Galperin Eva Galperin Director of Cybersecurity, EFF
Application architectures have become more distributed, heterogeneous, and reliant on supporting infrastructure tiers. The new year will see customers beginning to realize they need to expand their APM monitoring capabilities to provide visibility of these supporting IT infrastructure components.
Application managers and IT teams are realizing that they need contextual visibility into how an infrastructure problem affects application performance, and seek APM solutions that can cross-correlate code-level and transaction-level performance with the health of the supporting physical, virtual, container and cloud infrastructures.
Join this webinar, as John Worthington, Director Product Marketing at eG innovations, discusses why this cross-correlation is so important and what's required to achieve it.
In this webinar, you will discover:
-Why monitoring applications in isolation will not be enough to monitor digital business service performance
-What's required for the enterprise to achieve total performance visibility
-How you can build an incremental plan for achieving transparency in digital service performance monitoring
Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.
Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?
Join us for this 30 minute quick-hit, reviewing 11ax’s most important components:
• PHY and MAC layer enhancements for better traffic management
• Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
• Considerations for clients and wider network enhancements
The number of mobile phishing attacks is doubling every year, and phishing has now become the no.1 threat on mobile. While employers are largely aware of phishing attacks over corporate email, they may be surprised to learn that the attackers are moving to where employees spend the majority of their time: on SMS, instant messaging clients and social media apps and websites.
Join our webinar to discover:
- What makes mobile such a unique and vulnerable attack vector
- How phishing attacks have evolved to effectively threaten company, employee and customer data
- Why Wandera’s intelligence engine, MI:RIAM, is well-positioned to protect your customers' mobile fleet
Virtualized Desktop Infrastructure (VDI) has been beneficial for large organizations who could manage the complexity and capital expense of a new, high-performance infrastructure. Today many organizations of all sizes have highly distributed workforces running a mix of desktop and mobile (BYOD) devices who could also benefit from centralized virtual system management. This session shares how a Predictive Flash data infrastructure helps ensure the VDI benefits of lower TCO, increased agility and security, and not just for large enterprises. It will feature speakers from the HPE virtualization team along with technical details and demos of how this solution improves VDI performance.