Get powerful end user computing insights from influential EUC experts. Connect with thought leaders and colleagues to get the most up-to-date knowledge on effective approaches to get non-programmers to create working applications.
Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.
Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:
•Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
•Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
•Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
If ever there were a truly asymmetric battle, it’s in the war for the endpoint. Enterprises must apply defense as broadly and consistently across hundreds or thousands of endpoints as best they can. But to penetrate an organization, the attacker only needs to succeed with one that exposes a weakness. And from the network, to the endpoint itself, to the user that interacts with malicious content, these weaknesses may be many.
There is a new array of tools in the fight for the endpoint that go beyond traditional monitoring and controls, or the trend toward applying machine learning to the art of defense. In this webinar, Scott Crawford of 451 Research and Ofer Israeli of Illusive Networks will examine these issues and opportunities, and shed light on deception technology and other new tools for intelligent defense at the endpoint that can recognize and contain a threat before it has a serious impact.
Renting infrastructure on demand is the most disruptive trend in IT in decades. In 2016, enterprises spent $23B on public cloud IaaS services. By 2020, that figure is expected to reach $65B. The public cloud is now used like a utility, and like any utility, there is waste. Who's responsible for optimizing the infrastructure and reducing wasted expenses? It’s DevOps.
The excess expense, known as cloud waste, comprises several interrelated problems:
•Services running when they don't need to be
•Improperly sized infrastructure
There are a few core tenets of DevOps that can be applied to reducing cloud waste:
•Rapid useful feedback
Join Chris to learn why you should include continuous cost optimization in your DevOps processes. Automate cost control, reduce your cloud expenses, and make your life easier.
As more and more applications move to the public cloud, many wonder if it still makes sense to maintain a data centre apart from regulated workloads. In this presentation Andres Rodriguez, MAAS engineering manager, will look into how devops and infrastructure managers can build an agile data centre with a developer agility and a cost base that can compete with public cloud.
In this presentation you will learn:
* How to build a low cost / high usage smart data centre based on automation
* Most common use cases best suited for bare metal provisioning
* How MAAS, Canonical's server provisioning tool, can be used to build your agile data centre
Of course you know Ubuntu. Your developers use it everywhere. But you're from an enterprise, where the IT Security team has the final say. As they should. Before your app built on Ubuntu can go into production, you need their signoff. So what's the security story with Ubuntu? How is it hardened? Are there best practices around patch management? What about standards and compliance? How can Canonical help?
In this webinar, join Dustin Kirkland to learn:
>How Ubuntu is secured out of the box
>How we ensure that we are compliant
>How Canonical ensure customers get a first class support experience
>Why Ubuntu has the leading edge in security
In his introduction keynote to the Ubuntu Enterprise Summit Mark Shuttleworth, founder and CEO of Canonical, will be explaining his vision for the future of enterprise architecture.
In his presentation Mark will look into the various trends at play that are currently transforming the way IT infrastructures are being built and managed. From technology to operations, Mark will expose how enterprises are taking new approaches to containing costs and giving developers the freedom to build new breakthrough services.
More about Mark:
Mark Shuttleworth is Founder of Ubuntu and CEO of Canonical. Mark founded Thawte, an internet commerce security company in 1996 while studying finance and IT at the University of Cape Town before selling the company to VeriSign in 1999. In 2000 he founded HBD, an investment company, and created the Shuttleworth Foundation to fund innovative leaders in society with a combination of fellowships and investments. In 2002 he flew to the International Space Station as a member of the crew of Soyuz mission TM34, after a year of training in Star City, Russia. In 2004, he founded Ubuntu and Canonical.
Consumers are enjoying a rapidly expanding choice of how, when and where they bank. However, banks must now manage the extra responsibilities and risks these new channels bring.
In APAC, the Unisys Security Index™ revealed consumers are more concerned about bankcard fraud, ID theft and cyber security than about physical threats like the threat of war/terrorism and natural disasters.
So how can banks balance the need to digitally transform, maintain privacy and security but still provide a seamless, personalized and trustworthy customer experience?
We will cover:
The 10 steps banks need to take to get digital transformation right, and how to improve customer experience and trust during this journey.
How the CISO’s office can be part of the digital transformation journey, embedding security as part of the development lifecycle from the start as a value added component and not a burden as an afterthought.
Innovative technologies like predictive analytics and biometrics can help provide a seamless, frictionless experience for customers. But how can they be applied without seeming invasive?
Nicholle is an experienced senior financial services executive with almost 20 yrs experience working in financial institutions and corporates. She has extensive knowledge across financial services, payments, consumer and business banking, IT, analytics, marketing and strategy.
Leon Manson, Lead Cybersecurity Architect for Unisys APAC, is responsible for the range of real-time protection solutions delivered through Unisys Managed Security Services. Leon has over 25 years IT security industry experience in consulting and systems engineering for startups, tier-one vendors, and as a business owner.
Ian Selbie is responsible for Unisys Financial Industry solutions in APAC focused on enhancing business processes and compliance in financial institutions including omnichannel, financial crime prevention, enterprise payments and case management solutions.
In our fourth Cybercrime Tactics & Techniques webinar, we are going to take a deep look at what threats got our attention the most during the last three months and what we expect to happen moving into the last quarter of 2017. Thus far, the year has brought us outbreaks of ransomware and breaches across the globe, making it more important than ever to implement multi-vector protection.
HP and Staples Business Advantage present:
Governance, Compliance & Print Security - Three keys to protecting business
• The rise of IoT and its evolving role in Security Challenges
• IoT Standards & Framework Developments in CyberSecurity
• Governance and its role in mitigating risk
• And More: Influential Mega Trends, Risks & Hidden Costs
Ron Chestang – GCIH, CEH, CISM
Print Security Advisor
Ron joined HP, Inc. from one of the big four consulting firms where he performed IT Security consulting in Oil and Gas Industry in Houston, Texas. Ron also has over 15 years’ experience as a Cyber Officer in the US Air Force where he received the nation’s most comprehensive cyber security training and the highest level AF security certifications. During his tenure with the AF, Ron participated in numerous cyber exercises and operations including wartime cyber efforts coordinating defense of the nation’s top secret information and coordinating offensive efforts.
Ron has numerous industry Cyber Security Certifications including the EC Council Certified Ethical Hacker, SANS GIAC Certified Incident Handler, and the ISACA Certified Information Security Manager Certification.
Technology Account Executive
Staples Business Advantage
Mike Mayberry our Staples Technology Solutions Healthcare Technology Account Executive has been part of the Staples family for 10 years. Mike started with Staples on our Small Business Account sales team before moving to our retail team as a Sales Manager. Mike joined the Technology Commercial Contract team in 2011 providing IT solutions to our Mid-Market customer. After spending two and a half years with the Mid Market team Mike transitioned to the Commercial team working with F-500 customers. Recently Mike helped launch the new Healthcare team within Staples Technology Solutions and is now working to provide relevant IT solution thought-out our Healthcare base.
Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?
IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.
Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
Gain valuable insight from our expert speakers.
Webinar topics include:
Cross Company Platform Adoption
-How IT Managers can make every department happy
-How to deal and adapt when everything changes
Multi- Communication Solutions
Communication is Key
-What to consider when looking at a new communication plan
Simon Dudley, Director of Product Strategy, Logitech
Simon Dudley is Director of Product Strategy for Logitech’s Video Collaboration business. Dudley joined Logitech in August 2016. Prior to that, he operated Excession Events, where he consulted organizations on optimizing their use of video collaboration. Dudley also spent a number of years working in sales, marketing, and product management at companies like LifeSize and Polycom, which has given him a holistic view of the video conferencing market.
Dudley is an expert in the design, implementation and use of visual collaboration tools. He is a sought-after speaker in the collaboration industry, a published author, and the recipient of two patents. A native of the United Kingdom, Dudley currently resides in Austin, Texas.
Zane Carroll, Product Development Manager, Staples Business Advantage
Zane Carroll leads the Product Development Office at Staples Technology Solutions. He is collegiately trained as an Audio engineer with a passion for all things technology and quality sound. Throughout his time at Staples, he has supported our Computing & Printing hardware, managed services, and supported the launch of many new product categories, including the tablet, mobility, and most recently Device as a Service offerings here at Staples.
When deployed successfully, managers say that DCIM software has revolutionized their operations. It lowers risk, it makes it easier to push utilization levels higher, and it enables effective capacity provisioning and planning, among other benefits.
For others, however, the software has not achieved the ROI they expected. This is often because DCIM is an enabling technology as much as it is a management approach. To realize DCIM's full value, project leadership, operational process and cross-domain collaboration are essential. This means that the cost – and value – of a DCIM installation goes well beyond the software license; new internal operational, business procedures and workflows are required.
This webinar explores these issues in detail and addresses the key question: "Is there any ‘easy’ button’ for DCIM to be successful?" Tune in to find out!
Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.
About the Speakers:
Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.
Maria L. Allen is Senior Director and Global Head of Unisys' Financial Services Portfolio Solutions. In this role, Maria is responsible for building new products and services across all regions, platforms and channels ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives.
For more information on our Advanced Analytics offerings contact us at firstname.lastname@example.org and visit http://www.unisys.com/analytics
Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.
During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be.
The demonstration will cover how to:
•Configure PCoIP Zero Clients for off-site employees or contractors
•Determine the best WAN settings to recognize out-of-office devices
Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.
It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?
Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellanox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
The rapid rise of hybrid cloud and multi-cloud infrastructure is enabling business agility and cost reduction, but at what price to infrastructure security? Concerns over increased hacking and malicious attacks, regulatory compliance, and internal auditing are driving infrastructure decision-makers to think again about protecting sensitive data in multiple cloud workloads, and what security solutions to spend their budgets on. At the same time, the lack of skilled talent, rapidly evolving cloud security offerings, and the management of legacy environments is creating additional strain on protecting data.
In this session, Rory Duncan, Research Director with 451 Research will outline market trends and disruptive factors facing the security services market, sharing demand-side primary research and providing insight into areas of innovation.
How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?
Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.
Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.
We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.
Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
In a fast-moving, 24/7 healthcare environment, doctors and nurses cannot afford any impediments to delivering the best possible patient care. To ensure that the hospitals, physicians, nurses and other care providers it serves receive the best client experience possible, Allscripts offers a proactive application monitoring service that checks for potential problems that could slow down or disrupt the use of its mission-critical healthcare IT systems.
Initially launched in 2006, the proactive support offering monitors clients’ IT infrastructure and use of Allscripts solutions. Since its introduction, Allscripts has been able to improve client experiences in a way that has had a significant impact on business growth and client retention.
In light of recent high profile cyberattacks, notably WannaCry, it is now more important than ever for organisations to take stock of their current IT environment and mitigate security risks caused by the ever-changing threat landscape.
In fact, a recent report by iGov found that nearly 76% of participants had experienced a cyber-attack, and 50% were ransomware victims in the last twelve months.
This webinar focuses on how organisations can best meet this challenge and also explored the most common pitfalls faced and offer expert advice to combat this. Stuart Rogers, IT Security and Technical Architecture Manager at Cheshire Constabulary, shares his organisation’s story.
Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.
The retail industry is bursting with digital innovation driving change. This session will review:
•How differentiation demands digital maturity
•Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
•The role of cloud services and its impact on customer experience, agility, efficiency and risk
Malwarebytes & Mag-Securs ont organisé un webinaire autour de l'une des menaces les plus inquiétantes de ces derniers et prochains mois. Le cabinet Osterman Research a réalisé cet été pour le compte de Malwarebytes une étude très complète auprès de 180 entreprises françaises sur les ransomwares et leurs conséquences. Les conclusions sont sans appel : les ransomwares figurent désormais parmi les principales menaces dont peuvent être victimes les entreprises et la tendance n'est clairement pas à un ralentissement. La situation est désormais perçue comme inquiétante ou très inquiétante pour la plupart des 180 entreprises interrogées
Ce webinaire a présenté les résultats de cette étude ainsi qu’une analyse du ransomware jaff. Il a été suivi par une session de questions/réponses très complète.
Saiba mais sobre as preocupações dos seus consumidores!
O Unisys Security Index mede as preocupações dos consumidores em questões relacionadas à segurança nacional, pessoal, financeira e da Internet. O Unisys Security Index mostrou um aumento de 20% na preocupação de segurança geral em 2017. Saiba mais neste webinar onde iremos apresentar os detalhes do estudo e falar sobre como lidar com ameaças cibernéticas, o que os consumidores pensam sobre Internet das Coisas, e como aumentar a confiança de seus consumidores enquanto sua empresa avança na Transformação Digital.
Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys. Possui mais de 20 anos de experiência no setor de segurança. Na Unisys, ajuda a construir um mundo mais seguro, ao mesmo tempo em que transforma o setor de segurança com uma inovadora abordagem de microssegmentação, bem como a arquitetura de segurança adaptativa e a inteligência de ameaças cibernéticas.
The hyperconverged infrastructure space is exploding! It can be hard to keep up with the leading technologies in this incredibly fast growing market. Hear how Pivot3’s unique architecture tackles the data center complexity problem and simplifies IT deployment, performance & datacenter management. We’ll discuss how Pivot3’s newest product, Acuity, delivers 6X the performance and is capable of supporting 2X – 3X more VMs than conventional HCI solutions.
We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.
However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.
Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.
During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:
•Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
•The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
•The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
•Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
•Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face