Hi [[ session.user.profile.firstName ]]

End User Computing

  • LGPD e o direito ao esquecimento
    LGPD e o direito ao esquecimento
    Luiz Guimaraes, Enterprise Solutions Engineer, ASG Technologies Recorded: Oct 16 2019 53 mins
    Uma nova geração de leis e regulamentos surgiu nos últimos anos com o objetivo de proteger dados e informações de usuários na internet. Na Europa a GDPR, no Brasil a LGPD e nos Estados Unidos (Califórnia), até agora, o CCPA.

    O desafio hoje, para todas as corporações, é não só a gestão de um volume explosivo de dados não-estruturados, tornando-os aderentes as suas Políticas de Governança, como também a geração de valor para o negócio através do uso consistente de seu conteúdo.

    Junte-se a nós em um Quick Demo Webinar, onde você entenderá como o ASG Mobius 9.1 está ajudando seus clientes a obter o máximo de suas informações:
    - Impactos e consequências da nova legislação para as empresas
    - Muito mais que uma abordagem tradicional - entregando escalabilidade, flexibilidade e controle com tecnologia moderna
    - Como tratar aspectos da LGPD em conteúdo dados estruturados e não estruturados
    - Gestão do conteúdo por políticas amplas e auditadas
    - Direito ao esquecimento na Gestão de Registros
  • Mafia Boy's Story: From Black Hat to White Hat and How to Secure Endpoints Today
    Mafia Boy's Story: From Black Hat to White Hat and How to Secure Endpoints Today
    Michael Calce, Lorri Jefferson, Michelle Gattuso Recorded: Oct 3 2019 47 mins
    Please join Lorri Jefferson, HP VP and Head of Software & Services Product Management, as she interviews Michael Calce (aka Mafia Boy) who is now a security expert and former computer hacker from Île Bizard, Quebec who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites, including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, eBay, and CNN. He will share his personal transformation from black hat to white hat hacker and speak about the growing security threats.

    Learn how to counteract attacks, why Michael collaborates with HP as their Security Advisory Board chairman and provides suggestions to IT.

    Also, you will learn about proactive measures you can take to reduce security risks such as isolation technology and the importance of analytics with Michelle Gattuso, HP Senior Director of Product Management for DaaS Proactive Security.
  • How to get end-to-end visibility into your network
    How to get end-to-end visibility into your network
    Neha Harit & Lena Yarovaya Recorded: Oct 3 2019 42 mins
    A single pane of glass for management and visibility are required tools to manage your application delivery today and into the future. With the growth of hybrid and multi-cloud infrastructure, it’s vital to maintain control of various application delivery devices including physical, virtual, containerized and bare metal. Come learn how Citrix ADM provides visibility, management and control from a performance and security perspective, and deep dive into the features for automation and orchestration.
  • How to protect your Citrix deployments and modern applications with Citrix ADC
    How to protect your Citrix deployments and modern applications with Citrix ADC
    Patrick Coble & Frank Bunger Recorded: Oct 2 2019 33 mins
    Explore the major security features that Citrix ADC offers and deployment techniques to implement them in your organization.

    Citrix ADC is a security engineer’s Swiss Army knife and you will discover tools you may not know about, including Web Application Firewall, GeoIP and bad IP reputation blocking. You’ll also hear about Citrix ADC denial of service (AppQoE) protections along with SmartAccess, multifactor authentication and more.

    If your Citrix ADC is acting as a gateway, join this session to see how it can further secure your Citrix deployment.
  • Disaster Recovery
    Disaster Recovery
    Jeff Gilmer Recorded: Oct 1 2019 61 mins
    If a disaster were to strike, would you be able to successfully recover your network?

    Disaster recovery focuses on the ability of an organization to recover from a technology outage. This can be loss of a single technology or a catastrophic event. Many companies have a need to quickly gain a better understanding of their Disaster Recovery capabilities, future options, and strategies.

    Join us as we explore the differences between Emergency Management, Business Continuance, and Disaster Recovery Planning.

    You will learn how to prioritize the recovery of your organization's services by understanding all the steps in a successful recovery plan. We will also cover what is required to recover those services including facilities, IT, financial, and resources.

    Don't wait until it's too late. Know what to expect in the event of a disaster.

    Jeff is effective in both restoring and building organizations through improved long-term process improvement and implementation of solid scalable methodologies. Jeff also specializes in communications and regularly presents at seminars/webinars, industry events, and partner-sponsored events. In addition, Jeff has presented Excipio’s results to a variety of private and public sector audiences, including: senior executive teams, state legislatures, city councils, and federal agencies, boards of directors, and small community forums.”
  • Quantifying Mobile Risk in the Enterprise
    Quantifying Mobile Risk in the Enterprise
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Recorded: Oct 1 2019 21 mins
    Protect your organization from threats targeting your corporate data. In today's webinar, our guest speaker Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC will discuss:
    - How organizations are preparing for digital transformation
    - What are the security priorities for CISOs through 2020
    - What platforms and technologies are seen as high risk for the next 5 years
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats
  • Quantifying Mobile Risk in the Enterprise
    Quantifying Mobile Risk in the Enterprise
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Recorded: Sep 30 2019 21 mins
    Protect your organization from threats targeting your corporate data. In today's webinar, our guest speaker Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC will discuss:
    - How organizations are preparing for digital transformation
    - What are the security priorities for CISOs through 2020
    - What platforms and technologies are seen as high risk for the next 5 years
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats
  • Enhancing Safety, Operations, and Experience with Computer Vision
    Enhancing Safety, Operations, and Experience with Computer Vision
    Mark Jules, Global VP, Hitachi Vantara | Sameer Sharma, Global GM, Intel Recorded: Sep 27 2019 59 mins
    Video data has long supported safety and security efforts. But thanks to improvements in vision technology, machine learning (ML) and artificial intelligence (AI), and the ability to run analysis at the edge, there are innovative new uses for video data that improve safety, operations and customer experience.

    Join us in this live webinar where we’ll discuss:
    •The evolution of video technology and how it drives insights that improve the way we do business.
    •How video data and vision technology are used across various industries to drive ROI.
    •The technologies that drive these innovations and outcomes.


    About our speakers

    Mark Jules: Global Vice President, Smart Spaces and Lumada Video Insights, Hitachi Vantara

    Mark Jules leads Hitachi Vantara’s Smart Spaces business which provides solutions incorporating video technologies, internet of things (IoT) sensors and analytics to help organizations create smarter spaces that operate more efficiently. Mark served as CEO of Avrio RMS Group for more than a decade and was also the President and Founder of Protean Solutions, a provider of mobile platforms for battlefield and emergency communications.

    Sameer Sharma: Global GM (New Markets/Smart Cities), Intel

    Sameer Sharma is the Global GM (New Markets/Smart Cities) for IoT Solutions at Intel and a thought-leader in the IoT/mobile ecosystem, having driven multiple strategic initiatives over the past 19 years. He leads a global team that incubates and scales new growth categories and business models in IoT and Smart Cities. These solutions include intelligent transportation, AI and video, air quality monitoring and smart lighting in cities.

    Sameer has an MBA from The Wharton School at UPenn, and a Master’s in Computer Engineering from Rutgers University. He holds 11 patents in the areas of IoT and Mobile.
  • IT Transformation: How DaaS is Enhancing Employee Experiences in HP’s Workplace
    IT Transformation: How DaaS is Enhancing Employee Experiences in HP’s Workplace
    Gwen Becknell, HP IT Lead for Employee Experience Strategy & Services and Marc Bland, HP Global Services Development Recorded: Sep 26 2019 48 mins
    HP recently implemented its own Device as a Service (DaaS) solution. Join Gwen Becknell, HP IT Lead for Employee Experience Strategy and Services, to discover how DaaS transformed employee experiences, empowered the IT team, and is resulting in measurable business outcomes. Plus, hear from Marc Bland, HP Global Services Development, about ways you can get started by calculating your organization’s projected value with HP DaaS.
  • Going cloud? Don't forget to bridge the gap between clouds
    Going cloud? Don't forget to bridge the gap between clouds
    Thorsten Rood Recorded: Sep 26 2019 46 mins
    Moving towards a cloud play in your given environment? Thinking that AzureAD will be your future authentication strategy?

    It’s likely you’ll still need access to some on-premises resources that won’t make it over that quickly or others that are running outside of a pure Microsoft feature set, such as Amazon (AWS) or Google Cloud Platform (GCP).

    In this session, you’ll learn how Citrix ADC bridges the gap between clouds, and how to integrate remaining datacenter resources into a common offering while maintaining user experience. Plus, explore the elements that constitute a true hybrid cloud infrastructure, which will likely be the longest migration episode in many IT lives.
  • PROTECCIÓN DE DATOS PERSONALES ¿ESTÁ PREPARADO?
    PROTECCIÓN DE DATOS PERSONALES ¿ESTÁ PREPARADO?
    Guillermo Avendaño, Enterprise Solutions Engineer, ASG Technologies Recorded: Sep 25 2019 30 mins
    Las leyes de Protección de Datos requieren ajustes en los sistemas, procesos y cultura organizacional de las empresas. El cumplimiento se basa en una comprensión completa de cómo se identifican y clasifican los datos personales, la transparencia de uso y la velocidad de respuesta a las solicitudes de cumplimiento de los derechos de los clientes.

    En este Webinar verá:
    • La metodología que utilizamos para implementar la solución ASG
    • Características disponibles en la solución de cumplimiento GDPR de ASG
    • Demostración de la solución de Inteligencia de Datos

    Únase a nosotros y aprenda cómo superar los desafíos de las leyes de Protección de Datos.
  • Identity and access management with Citrix Workspace
    Identity and access management with Citrix Workspace
    Akhilesh Dhawan, Praveen Raghuraman, Srinivasan Shanmugam, Pete Downing Recorded: Sep 25 2019 46 mins
    Come get an overview of Citrix Access Control (Workspace Standard). Understand the business value of Access Control, the challenges it addresses, and the differences between Access Control and Gateway.

    Come join us to see how we are different from a traditional SSO solution and how to improve ROI with a single vendor strategy.
  • Bridging the gap between traditional and modern app delivery
    Bridging the gap between traditional and modern app delivery
    Pankaj Gupta & Komal Bhardwaj Recorded: Sep 25 2019 43 mins
    IT transformation, cloud, and new application development technologies are changing the face of application delivery.

    Join Pankaj Gupta & Komal Bhardwaj to learn how Citrix ADC is innovating to guide you through managing your new cloud-native application infrastructure.
  • The Future of BI is not a BI Tool
    The Future of BI is not a BI Tool
    Daniel Mintz, Chief Data Evangelist, Looker Recorded: Sep 25 2019 48 mins
    Business data has changed radically.

    Enterprises today use thousands of SaaS applications and business systems that create more data than ever imagined, resulting in a struggle for users to gain holistic and actionable insights. Organisations need a solution to simplify the end to end workflow -- from data prep and governance to visualisation, delivery, and action.

    This webinar will reveal a proven solution with real world examples and how it creates future opportunities for your organisation.
  • Comment accélérer le cycle développement de vos applications?
    Comment accélérer le cycle développement de vos applications?
    Chardy N’diki (Regional Manager, EMEA) & Laurent Levi (Sales Engineer, EMEA) at Contrast Security Recorded: Oct 2 2019 35 mins
    Une transformation digitale réussi dépend de l’agilité sa Software Factory. Comment la sécurité peut tenir le rythme et avoir une emprunte minimal sur les cycles développement ? Nous vous montrerons comment Contrast utilise les technologies d’instrumentations pour renforcer la sécurité des applications avant leur déploiement, de les protéger en production et offrir une visibilité sur les vulnérabilités tout au long du cycle de vie des applications. Enfin nous montrerons comment améliorer l’adoption auprès des développeurs et d’optimiser les ressources liées à la sécurité dans vos projets.
  • Deploying Application Delivery Management for the Enterprise
    Deploying Application Delivery Management for the Enterprise
    Zaheer Mohammed & Sanjay Gupta Recorded: Sep 24 2019 45 mins
    Citrix Application Delivery Management (ADM) provides a single platform to manage, monitor, and troubleshoot Citrix Networking platforms deployed on-premises or in the cloud.

    This session will help you master key deployment best practices for Citrix ADM with high availability and disaster recovery and show you how to quickly diagnose and address the no data error using the No Data diagnostic utility. You will leave this session with the expertise needed to deploy Citrix ADM according to enterprise requirements and troubleshoot the most common challenges efficiently.
  • Developing a Hybrid Multi-Cloud Security Strategy
    Developing a Hybrid Multi-Cloud Security Strategy
    Kurt Roemer, Citrix Chief Security Strategist Recorded: Sep 23 2019 47 mins
    Orchestrating security requirements and assuring effective delivery across multiple providers, services and shared responsibility models seems daunting – but doesn’t have to be. Having a tailored strategy to guide decision making is key to success in spanning and navigating hybrid multi-cloud models.

    This session will explain why hybrid multi-cloud security is so different, beginning with architectures and spanning threats, administrative practices, networking and workspace integrations. Strategy elements will focus on the demands of diverse stakeholders including architects, highly-privileged workers and line of business leadership who must assure governance, availability, resiliency and regulatory compliance.

    Learn the pitfalls, options, tools and techniques to assist you in developing your own personalized hybrid multi-cloud security strategy.


    About the Presenter:

    As Chief Security Strategist for Citrix, Kurt Roemer leads security, compliance, risk and privacy strategies for Citrix products. As a member of the Citrix CTO and Strategy Office, Roemer drives ideation, innovation and technical direction for products and solutions that advance business productivity while ensuring information governance.

    An information services veteran with more than 30 years of experience, his credentials include the Certified Information Systems Security Professional (CISSP) designation. He also served as Commissioner for the US public-sector CLOUD2 initiative and led efforts to develop the PCI Security Standards Council Virtualization Guidance Information Supplement while serving on the Board of Advisors.
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Sep 19 2019 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • The Future of Work and Working with Nancy Giordano
    The Future of Work and Working with Nancy Giordano
    Nancy Giordano, Strategic Futurist Corporate Strategist TEDx Austin Curator Oct 29 2019 5:00 pm UTC 50 mins
    Whether we have more jobs or less is a debate only time will settle, but there is no doubt 100% of jobs will be re-skilled. HOW we work and WHY is currently being recalibrated. Society overall will take a radical shift as we head into what has been described as the Fourth Industrial Revolution.

    In this session, Nancy will talk through how new tools will shape new behaviors and drive new expectations, which old practices to manage risk are actually now putting us at risk, and how we will measure that we’re doing it right.

    About the speaker:
    Nancy Giordano is a strategic futurist with a passion for helping organizations and leaders transform to meet the escalating expectations ahead. Recognized as one of the world’s top female futurists, she's spent her career driving important conversations on the future of tech, business, and society.
  • Zeroing in on Zero Trust Network Access – Everything You Need to Know
    Zeroing in on Zero Trust Network Access – Everything You Need to Know
    Michelle Drolet, Tony Yodice Nov 6 2019 6:00 pm UTC 60 mins
    In today’s modern enterprise, the use of legacy network access solutions has resulted in both an overly complex and inevitably vulnerable perimeter. Poor networking configuration and excess visibility into the perimeter leaves organizations open to both external attack and insider threat.

    Join Michelle Drolet, CEO at Towerwall and Tony Yodice, Director of US Operations at Safe-T to learn:

    -What is Zero Trust Network Access
    -Why modern enterprises require access policies built with an identity centric approach
    -How to protect your organization from the inside out