Hi [[ session.user.profile.firstName ]]

End User Computing

  • Cutting Endpoint Management Costs In Half: A How-To Lesson
    Cutting Endpoint Management Costs In Half: A How-To Lesson
    Cy Englert Recorded: Jun 4 2020 18 mins
    The BigFix Endpoint Management Platform can perform multiple functions that have previously required many disparate tools. We'll look at building a business case for BigFix by identifying infrastructure cost savings, productivity improvements, operational efficiencies, and other benefits.
  • Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
    Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
    Diana Kelley, Cybersecurity Field CTO, Microsoft, Michelle Drolet, CEO, Towerwall Recorded: Jun 4 2020 49 mins
    Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
    Wherever we turn it feels like the news is all COVID-19 all the time. Many of us are feeling stressed and overwhelmed and attackers know it. At Microsoft we've seen an increase in the success of phishing attacks, one of the common vectors for malware and ransomware infections. Rather than inventing entirely new exploits, attackers are pivoting their existing infrastructure for ransomware and other malware delivery tools to COVID-19 focused lures to get us to click. In this talk we'll share insights into how the attackers have shifted their lures and provide recommendations for improving detect and response times to reduce the likelihood these attacks will work.
  • HP Education: Cybersecurity in the Age of Teach and Learn from Home
    HP Education: Cybersecurity in the Age of Teach and Learn from Home
    Mike Belcher, HP Director EdTech Innovation Recorded: Jun 3 2020 59 mins
    Colleges, universities and K12 institutions have had to transition to a remote learning and working model, therefore it has become crucial to protect students’, faculty’s, and research department’s PCs and printers.

    To help you tackle the special challenge of cyber safety while researching, teaching and learning from home, please join us for a webinar to learn about the best practices for securing your institutional interests and devices while operating in the new norm.

    Learning Points:
    - How K12 and university institutions can protect students’, faculty’s, and research department’s PCs and printers remotely
    - Best practices for securing sensitive information and devices while operating in the new norm
    - Real examples of security initiatives taken from academic peers

    Join HP's speakers for this in-depth security discussion
    - Mike Belcher, HP Director EdTech Innovation
    - Rick Griencewic, HP Senior Security Advisor

    And Our Guest Speaker
    - Daniel Mincheff, Chief Information Officer at Northeast Wisconsin Technical College
  • Digital Experience Monitoring for Remote Workers
    Digital Experience Monitoring for Remote Workers
    Chris Siakos, Founder and CTO, at Sinefa & Alex Henthorn-Iwane, VP Product Marketing at Sinefa Recorded: Jun 3 2020 50 mins
    IT teams face three big visibility challenges due to the massive shift to remote work. The first is the high variability of home network environments. The second is cloud-based and Internet-centric SaaS and cloud-migrated applications. The third is the inherent unpredictability of Internet transport and higher congestion during these unprecedented times. How do you overcome these monitoring challenges and make users happy and productive?



    In this webinar, you will learn about:

    - How to leverage Sinefa Endpoint Agent and network path monitoring to get visibility from end user devices, through home and ISP networks, to data centers, cloud and SaaS
    - How network path monitoring can be used to get visibility into your customer-facing applications, plus third party APIs and services that are critical for your customer digital experiences
    - How to get access to these capabilities for 90 days, free of charge
  • Ask Me Anything About Customer Identity and Access Management
    Ask Me Anything About Customer Identity and Access Management
    James Quick, Director, Solutions & Advisory at Simeio Solutions, and Richard Bird, Chief Customer Information Officer at Ping Recorded: Jun 3 2020 32 mins
    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work. Join us for 30 minutes to ask us anything about our next topic, Customer Identity and Access Management (CIAM) with James Quick, Director of Solutions and Advisory at Simeio Solutions, and Richard Bird, Chief Customer Officer at Ping Identity.
  • Securing Endpoints in a Work-From-Home World
    Securing Endpoints in a Work-From-Home World
    Todd Gustafson - President of U.S. Public Sector, HP Inc. and Sherban Naum - SVP, Business and Strategy, HP Security Recorded: Jun 3 2020 32 mins
    In the blink of an eye, thousands of public sector workers have become work-from-home employees. Even as some states have begun lifting their coronavirus shelter-at-home regulations, large swaths of the public workforce will continue to operate remotely for the foreseeable future. With so many employees working from their kitchen tables, state and local endpoints can be more vulnerable. The good news is that the number of cyberattacks has remained predictably steady during the past several weeks. The bad news? There’s been a tremendous increase in the number of successful attacks, resulting in potentially more breaches. Securing enterprise endpoints has never been more difficult – or more important. As a participant, you’ll learn:
    - The biggest challenges of maintaining endpoint security with a remote workforce
    - How some jurisdictions are innovating to meet those needs
    - How to secure your enterprise endpoints while enhancing cyber visibility in the months ahead
  • Standardising machine learning from workstation to production
    Standardising machine learning from workstation to production
    Rui Vasconcelos - Canonical & Kyle Harper - Dell Recorded: Jun 3 2020 36 mins
    In April, we talked about the landscape for Dell’s Data Science Workstation, which is a development enterprise-class workstation for data scientists. Continuing the initial discussion, join Dell and Canonical once again to discover the AI journey from modelling and testing on the desktop to production in the data centre. We will also learn about the foundation of containers in AI - including how to harness the potential of container orchestration of Kubernetes in Machine Learning deployments at scale.

    Kyle and Rui will discuss:
    - Dell workstations in AI/ML - Hear the latest info on the Ubuntu-based Dell Data Science Workstation platform lineup available in the DSW Guided Install Edition - Mobiles, Towers and Racks
    - Microk8s for lightweight Kubernetes - Learn about “under the desk” clustering (a.k.a. carpet clusters), and testing on a Kubernetes cluster
    - Deploying and using Kubeflow on top of MicroK8s - for portability of AI/ML workloads with the best tools for machine learning
  • Télétravail, Digitalisation Omnicanal, Modernisation des Processus Documentaires
    Télétravail, Digitalisation Omnicanal, Modernisation des Processus Documentaires
    Eric Le Ven, Archimag; Caroline Buscal, Consulting du Groupe Serda; Avi Sellem, ASG & Marouéne Makhloufi, ASG Recorded: Jun 3 2020 60 mins
    La communication BtoC évolue au même rythme que les usages digitaux. Dans leurs échanges documentaires avec les entreprises, les consommateurs utilisent aujourd’hui avec une certaine agilité plusieurs canaux de communication (mail, services en ligne, app mobile, etc.). Il convient d’appréhender au mieux ces différents canaux et d’en tirer des avantages compétitifs, tant au niveau de la contractualisation que de la fidélisation client. Ce qui passe par une modernisation du système d’information. En effet, les solutions traditionnelles ne répondent que partiellement (ou plus) à ces nouvelles exigences omnicanales.

    Dans ce contexte, ASG Technologies, en partenariat avec le groupe Serda-Archimag, vous convie à un webinar où vous pourrez :
    - Obtenir un panorama des pratiques documentaires actuelles.
    - Découvrir l’état de l’art du marché et les nouveaux défis des industries à forte interaction client (Banques, Assurances et Mutuelles).
    - Assister à une démonstration du socle technologique ASG autour de cas métiers concrets
    - Comprendre au travers d’un retour d’expérience client comment moderniser son système d’information pour améliorer la qualité des services
  • What's Next in IAM?
    What's Next in IAM?
    Tony Naples, Practice Director - Security Solutions, Trace3 Recorded: Jun 2 2020 53 mins
    Join TRACE3 and Okta for an intuitive presentation to accelerate your knowledge in Identity and Access Management, provide tips to guide conversations, and IAM offerings to bring to your customers. Tony Naples, Managing Director of Identity and Access Management at TRACE3 and Brock Dooling, Associate Partner Sales Engineer at Okta will provide a guided understanding of emerging capabilities.

    By the conclusion of this webinar, you will be well poised to understand how IAM makes organizations more secure and learn about Okta’s solutions for IAM.

    By attending this virtual event, you will learn:
    • How to identify the most common IAM challenges
    • How emerging capabilities are driving IAM enterprise solution decisions
    • How Okta has changed the IAM landscape with password-less authentication, workflow automation and customer IAM


    Webinar Talk Track:
    • Changes in the IAM landscape (Mergers, Capability/Functionality Consolidations, Collaborations)
    • Improving end-user experience while strengthening enterprise security (Both for Workforce and Customer populations)
    • Privacy and Protecting the Identity (It starts with an Operational Security Mindset)
    • Where do we go from here? (Biometrics, Just-in-Time Provisioning, Conditional Access)

    Core Webinar:
    The User Cares About: Overall User Experience, Ease of Use, Efficiency, Flexibility

    The Security Professional Cares about: Protecting Users and Identities, Technology Flexibility, Reducing IAM Stack Complexity

    Okta
    FastPass, Consumer IAM, Lifecycle Management/Workflows/Prescriptive Lifecycle Orchestration
  • Phishing Threats in a Mobile-Enabled World
    Phishing Threats in a Mobile-Enabled World
    Chris Hazelton, Director Security Solutions, Lookout Recorded: Jun 2 2020 37 mins
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • Phishing Threats in a Mobile-Enabled World
    Phishing Threats in a Mobile-Enabled World
    Chris Hazelton, Director Security Solutions, Lookout Recorded: Jun 2 2020 37 mins
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • Q&A Panel: How to Stay Cybersafe in 2020
    Q&A Panel: How to Stay Cybersafe in 2020
    Michelle Drolet & Arun Subramoniam Towerwall, Inc., Chris Chaves, Sophos Recorded: May 28 2020 57 mins
    Cyberthreats morph rapidly as they try to stay ahead of our defenses; wearing new disguises and breaking down virtual barriers in unique ways. As such, the answer to, "How do I remain secure?" changes as quickly as the cyberthreats we face.

    Join us for an interactive Q&A Panel with experts Chris Chaves of Sophos, and Michelle Drolet and Arun Subramoniam of Towerwall. Engage in a discussion on staying safe in the evolving threat landscape. They'll provide the multi-layered answer to, "How do I stay cybersafe in 2020?", including:

    • What you can do today to remain secure
    • The types of threats Sophos Labs is seeing recently
    • What we know about COVID-19 scams
    • How to correct your security posture
  • O seu Data Center está pronto para o futuro?
    O seu Data Center está pronto para o futuro?
    Diego Pons - Experiential Marketing Recorded: May 28 2020 63 mins
    Expert Talk: Nossos especialistas da Dell Technologies discutirão soluções que conectam todos os ambientes virtuais a um novo conceito de Data Center para implementá-lo de acordo com o estágio em que você está na sua transformação digital.
  • Innovating and scaling efficiently with Kubernetes and MicroK8s
    Innovating and scaling efficiently with Kubernetes and MicroK8s
    N. Dimotakis, VP Data Center Field Engineer; C. Hartwell; Director Field Engineer EMEA; A. Chalkias, Product Manager Recorded: May 28 2020 104 mins
    With the benefits of Kubernetes now well established in the containerisation space, its adoption continues to exponentially increase. However, as developers and enterprises alike turn to Kubernetes for more and more types of use cases, available Kubernetes solutions often fail to meet their exact needs. Canonical’s extensive Kubernetes portfolio is centered around Charmed Kubernetes and MicroK8s, designed to provide full flexibility from cloud to edge in order to facilitate efficient innovation and scaling.

    In this virtual event, Canonical’s panel of experts will discuss tools and strategies for:
    - Optimising economics from cloud to edge
    - Streamlining deployment and operation of Kubernetes clusters
    - Lowering barriers to entry for Kubernetes in resource-limited environments

    The speakers will also delve into notable use cases they have come across throughout their experience, as well as touch on topics and questions put forward by the audience live.
  • Modern Uses of Thermal Imaging and Computer Vision Technologies
    Modern Uses of Thermal Imaging and Computer Vision Technologies
    Michael Knight, Global CTO, Safety and Security – Industry Edge, Dell Technologies Recorded: May 28 2020 31 mins
    Welcome back to Dell Technologies Innovation Webinar Series. In this conversation we will explore and focus on the “Modern Uses of Thermal Imaging and Computer Vision Technologies”. The next generation of safety and security solutions such as thermal imaging and computer vision are being used in novel ways in today’s world, and we believe this is only the beginning.
  • Cloud, Repositories, Anwendungen – gewinnen Sie die Hoheit über Ihren Content!
    Cloud, Repositories, Anwendungen – gewinnen Sie die Hoheit über Ihren Content!
    Jan Falkenstein, Senior Solutions Engineer, ASG Technologies & Joerg Ribbeck, Partner Manager, Comline AG, Dortmund Recorded: May 28 2020 34 mins
    Content, seine Vernetzung und Verfügbarkeit ermöglichen fundierte betriebliche Entscheidungen und das Entstehen neuer Ideen für Produkte und Dienstleistungen. Weiterhin enthält er sämtliches Wissen zu Geschäftspartnern, das Unternehmen benötigen, um Erwartungen zu bedienen und einen Mehrwert gegenüber Wettbewerbern bieten zu können.

    Oftmals liegt dieser Content jedoch eingeschränkt verfügbar über verschiedenste Anwendungen und Repositories verteilt. Zudem wachsen die Datenmengen exponentiell. Sind Unternehmen aktuell in der Lage all diese Informationen zu verwerten und ihren Wert zu nutzen?

    Sehen Sie in unserem praxisorientierten Webinar, wie ein modernes Content Ökosystem hilft, Informationen effektiv in zentrale Geschäftsprozesse einzubinden, um diese zu optimieren. Unternehmen schützen so ihre Investitionen, können aber gleichzeitig digitale Initiativen vorantreiben und auf sich verändernde Rahmenbedingungen reagieren.

    Folgende Themen erwarten Sie:
    - Ausgangslage: verteilte Informationsquellen und Content Silos plus Einhaltung regulatorischer Anforderungen
    - Kosten senken, Digitalisierung vorantreiben und dann noch migrieren? Wir haben einen anderen Ansatz: Unser Vorgehen an einem Kundenbeispiel aus der Praxis
    - Wie gelingt es, Content aus diversen Anwendungen zentral verfügbar zu machen und zu nutzen, um Prozesse zu optimieren und Wert aus den Informationen zu generieren?
    - Smarte Wege in ein Content Ökosystem
  • Ask Me Anything About Building an IAM Career Working from Home
    Ask Me Anything About Building an IAM Career Working from Home
    Shawn Keve, CRO at Simeio Solutions, and Randy Fields, Director, Strategic Client Engagement at Simeio Solutions Recorded: May 27 2020 30 mins
    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work. Join us for 30 minutes to ask us anything about our next topic, Ask Me Anything About Building an IAM Career Working from Home with Shawn Keve and Randy Fields of Simeio Solutions.
  • Future Of Entertainment: #1 Benefits & Options with Android TV Operator Tier
    Future Of Entertainment: #1 Benefits & Options with Android TV Operator Tier
    Magnus Lindhe (Tele2) & Pierre Donath (3SS) Recorded: May 27 2020 41 mins
    Join the Masterclass of our new series "Create the Future of Entertainment" with Magnus Lindhe (Tele2) and Pierre Donath (3SS). In this 30 min live webinar, we will share our experiences from deploying Com Hem Tv Hub as the first hybrid Android TV Operator Tier Custom Launcher worldwide, and focus on the benefits and options for operators. We will wrap up with an open live Q&A, where we will answer your burning questions.

    Together we’ll answer:
    ➡️ Why should I choose Android TV?
    ➡️ What is the difference between Custom and Standard Launcher?
    ➡️ How does the collaboration with Google work?
    ➡️ What are the key success factors to ensure to launch in time and budget?

    Let's create the Future of Entertainment together!
  • Data Trust - Your Data, Your Confidence, Your Decision
    Data Trust - Your Data, Your Confidence, Your Decision
    ASG Technologies, Syncsort & Catapult BI Recorded: May 27 2020 47 mins
    The stakes for data compliance and reliability could not be higher. Our clients have told us that there is increased concern when regulators and management question the data and analytics in a report if the numbers reported appear to be implausible.

    Join ASG, Syncsort and Catapult BI to learn how implementing defensive and offensive data strategies by capturing and governing information supply chains, empower stakeholders to find, understand, share and analyze trusted data and remain compliant.

    In this webinar, you will hear from industry experts who will discuss:
    • How data quality and data intelligence enable cell to source traceability
    • Establishing a credible traceable path of data sources to reports
    • Benefits of automated metadata collection
    • The path to data quality ensuring completeness, validity, uniqueness, consistency, timeliness and accuracy for data driven decision making
    • Enrichment of data across multiple sources with geo-location and socio-demographic information for quicker profiling, segmentation and reporting.

    Register now to learn how to maintain trust in data with automated governance and data quality.
  • ¿Está listo su centro de datos para el futuro?
    ¿Está listo su centro de datos para el futuro?
    Said Espejel - Experiential Marketing Recorded: May 26 2020 62 mins
    Expert Talk: Nuestros Expertos de Dell Technologies discutirán soluciones que conectan todos los ambientes virtuales a nuevo concepto de Data Center, para implementarlo según la etapa en que se encuentre de su transformación digital.
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout Recorded: May 26 2020 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout Recorded: May 26 2020 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Kubernetes on Windows with WSL 2
    Kubernetes on Windows with WSL 2
    Alex Chalkias & Sohini Roy - Ubuntu Product Managers & Nuno Do Carmo - Ferring Pharmaceuticals Recorded: May 22 2020 21 mins
    Learn to unleash the power of Kubernetes on Windows easier and faster than before. Join us for a demonstration from Microsoft MVP and Docker Captain, Nuno Do Carmo as he guides us through how to configure a full Kubernetes on-rails on your Windows machine. This is made possible through two tools, MicroK8s and WSL2.

    During this session, you’ll learn how easy it is to not only access a full Linux terminal on Windows, and with the updates on the newest WSL2 (wide release in May) how you can enable MicroK8s, a lightweight, single-package application that brings a fully-featured, conformant and secure Kubernetes system directly on users machines.

    You’ll learn:

    What is the Windows Subsystem for Linux, and what’s are some of the great features that will be enabled in the newest version, WSL2, released in May by Microsoft
    What is MicroK8s
    How to install a local Kubernetes using MicroK8s with WSL2
    The advantages / what this combo can help you achieve
  • DevOps, Mainframes and the Economic Rebound
    DevOps, Mainframes and the Economic Rebound
    Anna Murray, ASG Technologies; Jeff Cherrington, ASG Technologies & Mitchell Ashley, Accelerated Strategies Group Recorded: May 21 2020 59 mins
    Disruption is upon us. Businesses are quickly dealing with the economic impact from COVID-19. At the same time, organizations must innovate by shifting to contactless services, increasing digital forms of commerce, and accelerating time to market in the post COVID-19 world.

    Mainframe applications underpin many critical business processes, executing vast numbers of financial transactions, storing terabytes of data and supporting major brands around the globe. Organizations continue to invest in software tools to move to DevOps, automated workflows, CI/CD and IDE integration to accelerate development and manage the complexity. Mainframes are and will be a critical part of organizations path to economic growth.

    On this webinar, ASG Technologies and Mitch Ashley, a former CIO and current CEO of the analyst firm Accelerated Strategies Group, share the importance of advancing mainframes with DevOps processes and toolchains and the vital role mainframes will continue to play in an organizations future.
  • Enterprise AI to Drive Business Outcomes
    Enterprise AI to Drive Business Outcomes
    Matt Fornito, Principal Consultant, Trace3 and Hoseb Dermanilian, Sr. Solutions Manager, AI, NetApp Recorded: May 21 2020 55 mins
    Join TRACE3 and NetApp on a journey to discuss how Artificial Intelligence is revolutionizing industries. As industries adjust to global changes, companies are looking at AI to help provide optimizations and solve business problems.

    With an increase in the amount of data collected, deep learning and neural networks can make sense of hidden connections and better understand how to drive optimal business outcomes that are revolutionizing organizations.

    By attending this virtual event, you’ll learn:

    •About the current state of AI and it’s exponential expansion into global industries
    •How different business verticals are applying AI to their enterprises to better understand their data, customers, and business drivers
    •How NVIDIA’s GPUs combined with NetApp’s AFF systems are providing accelerated deployment and success toward supercharging your AI/DL environments
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Jun 9 2020 12:00 am UTC 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Jun 9 2020 9:00 am UTC 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Remote Work: Lessons Learned from the Trenches Part 1
    Remote Work: Lessons Learned from the Trenches Part 1
    Ian Aitchison, Dallin Hudson Jun 9 2020 3:00 pm UTC 60 mins
    Overnight, nearly 100% of Ivanti's workforce went remote as a result of the global pandemic related to COVID-19. We've heard countless stories from other organizations that also followed suit. Ivanti's IT experts are sharing their experiences in supporting a global remote workforce to help you through this unprecedented time. Join us for the first webinar in this two part series as we share actual stories from the trenches on how to:

    - Support a nearly 100% remote workforce
    - Remotely provide critical IT services
    - Maintain continuity without sacrificing service quality, productivity, and security
    - IT's role in the future of how work gets done
  • Kafka in production - making sure your deployment is fast, reliable and secure
    Kafka in production - making sure your deployment is fast, reliable and secure
    Nilay Patel Jun 9 2020 4:00 pm UTC 30 mins
    Kafka is a key technology in the cloud datastack that enables data pipelines between apps and microservices. Increasingly, developers are accessing advanced features of Kafka and face challenges in deploying, configuring and then managing it.

    Configuring the correct amount of replicas and topic partitions to achieve the throughput and resilience an organisation needs can be challenging. Further, organisations that deploy Kafka for the first time want to make sure it's done correctly, whether that be on-premise or in AWS, Azure or Google Cloud.

    In this webinar you will learn:
    - Architecture, configuration and security recommendations for Kafka deployments on private cloud, container and public cloud environments
    - The challenges with Kafka operations around topic management, upgrading and scaling
    - A management solution to reduce strain, complexity and costs for DevOps teams

    Watch this webinar to understand the key design decisions in creating a resilient and secure Kafka streaming pipeline, and options to achieve operations at scale.
  • Wie fügt sich das Mainframe JCL Management in Ihre DevOps Strategie ein?
    Wie fügt sich das Mainframe JCL Management in Ihre DevOps Strategie ein?
    Boris Kraaz, Senior Solutions Engineer, ASG Technologies & David Fleishman, Senior Solutions Engineer, ASG Technologies Jun 10 2020 12:00 pm UTC 60 mins
    Mainframe JCL läuft schon so lange und zuverlässig, dass sie bei der Umsetzung einer DevOps Strategie leicht übersehen werden kann. Ein kurzer Blick auf Google Trends zeigt deutlich, dass das Interesse an DevOps so groß ist wie nie zuvor, es ist heute zehnmal größer als noch vor vier Jahren. Immer mehr Unternehmen erzählen uns von ihren DevOps-Initiativen und wollen wissen, wie sie das JCL-Management in diese Bemühungen mit einbinden können.

    Folgende Themen sind vorgesehen:
    - Was ist DevOps?
    - Wie ist der Zustand der JCL in Ihrem Rechenzentrum?
    - Wie kann eine hochwertige JCL-Management Lösung helfen?
    - Wie fügt sich das JCL-Management in die DevOps Toolchain ein?

    Abschließend werden wir über eine Fallstudie sprechen sowie eine Live-Demonstration unserer führenden JCL-Management-Lösung in Aktion als Teil einer DevOps-Toolchain unter Verwendung von Compuware Topaz Workbench mit einem Eclipse-Plugin zeigen.
  • DISRUPT Webinar Series 2020 - IGEL / Microsoft WVD Spring Update
    DISRUPT Webinar Series 2020 - IGEL / Microsoft WVD Spring Update
    Simon Townsend, CMO IGEL; Fredrik Brattstig, Technology Evangelist IGEL; Christaan Brinkhoff, Windows Global Blackbelt Jun 10 2020 3:00 pm UTC 112 mins
    Following the successful DISRUPT EUC events earlier this year, IGEL is pleased to bring the BEST of DISRUPT virtually, with content and presentations from Windows Global Blackbelt, Christiaan Brinkhoff and Fred Brattstig, IGEL expert and WVD evangelist.

    What's covered:

    WVD Spring Update - What's New in Windows Virtual Desktop - Christiaan Brinkhoff
    Come learn about all the new features of WVD in 30 minutes. What are the latest new improvements that we addressed as part of customer and beyond. This session will get you up to speed to know everything what is newly available and comes after - experience the new Azure Management Portal integration and other services at first!

    IGEL Spring Update
    A Session from Fredrik Brattstig on recent IGEL OS updates including changes to the WVD client

    Latest Deployments
    Interviews with Altios and Wortell on their most recent deployments
  • Migrating your infrastructure to Ubuntu 20.04 LTS: How, when and why?
    Migrating your infrastructure to Ubuntu 20.04 LTS: How, when and why?
    Lech Sandecki and Tytus Kurek - Canonical & Laszlo Angyal - Deutsche Telekom Pan Jun 10 2020 4:00 pm UTC 60 mins
    Ubuntu 20.04 LTS is the best Ubuntu yet. It’s been over a month since it got released, and it has excellent reception among both desktop and server users. Many organisations are already starting using the latest Ubuntu. Others might be using previous versions of Ubuntu which are still supported under LTS or ESM - such as 19.10, 18.04 LTS, 16.04 LTS or even 14.04 LTS. If you use the previous version of Ubuntu you are probably wondering if you should migrate, when is the right time, and what factors should you take into account when planning a migration. During this webinar, we will explore those questions and provide guidance from the industry and from Ubuntu developers.

    It is a highly practical webinar. We will explore factors that should be taken into account to deliver successful migration at the right pace covering most popular infrastructure components such as OpenStack, Kubernetes and Ceph. There is no one-size-fits-all solution, so we will explore different variants and scenarios driven by potential benefits and best practises from the industry. We will also point out some risks and mitigation strategies.

    Our special guest speaker expert - László Angyal from Deutsche Telekom Pan - Net Hungary Kft. will share a practical approach to managing migrations of Ubuntu on OpenStack in an NFVI environment. László is an expert in that area who has over 25 years of experience. From Canonical we will hear from Josh Powers - senior engineer who led Ubuntu 20.04 LTS delivery and Tytus Kurek - product manager for Ubuntu Server and OpenStack who will elaborate on best practises on migration to the latest Ubuntu 20.04 LTS in the business environment.
  • Save with Automated Invoice Processing
    Save with Automated Invoice Processing
    Jim Maguire, VP, Strategic Content Services, ASG Technologies & Mark Plunkett, Enterprise Sales Director, Zia Consulting Jun 10 2020 5:00 pm UTC 60 mins
    Many of our customers tell us they struggle with manual accounts payable invoice processing, exception handling and data validation. Most invoices are still processed as “paper”, regardless of whether they arrive as printed or electronic versions such as PDFs or Word documents.

    Studies show that companies with automated invoice processing spend up to four times less per invoice. Whether it’s the paper cost or people cost, missed supplier discounts or late payment penalties, the savings can be significant for companies of all sizes. So, what does a best-in-practice solution really include?

    Join our experts, Mark Plunkett, Enterprise Sales Director, Zia Consulting and Jim Maguire, VP Strategic Content Services, ASG Technologies and learn how to:
    • Automate invoice processing from any source, in any form
    • Automatically handle exceptions
    • View your invoice status and KPIs in real time with end to end analytics
    • Integrate SAP and store all documents in a modern content services platform, on premises or in a hybrid cloud environment
  • Remote Working: Lessons Learned from the Trenches Part 2
    Remote Working: Lessons Learned from the Trenches Part 2
    David Martinez, Adam Jones Jun 11 2020 3:00 pm UTC 57 mins
    IT teams are reacting to new remote work challenges as a result of the global spread of Coronavirus. The response to the virus will likely permanently change the way IT supports users and the business. Join Ivanti's David Martinez and Senior Director of IT, Adam Jones, as they share their experience and insights to help global IT teams adjust for the future of remote working.
  • Getting your network ready for remote work
    Getting your network ready for remote work
    Valerie Di Martino, Sr. Product Marketing Manager, for SD-WAN at Citrix & Derek Thorslund Sr. Director, product management Jun 16 2020 8:30 am UTC 46 mins
    A Citrix webinar examining the best-practices, lessons learned, and realities of a remote work world.
  • Construisez votre futur avec des données maîtrisées
    Construisez votre futur avec des données maîtrisées
    Alain Bueno, Data Intelligence Sales Expert, ASG Technologies & Eric Frances, Directeur Commercial, Information Builders Jun 16 2020 9:00 am UTC 60 mins
    Dans le nouveau monde qui se profile, les entreprises vont plus que jamais avoir besoin de trouver de nouveaux gisements de croissance.

    Pour ce faire, les programmes de transformation doivent démarrer par un investissement stratégique sur les données et ainsi capitaliser sur son patrimoine pour construire les fondations de tout projet digital innovant.

    Lors de ce webinaire, vous découvrirez comment construire le futur de vos données grâce à :
    - Une vue à 360° de votre patrimoine de données
    - Une traçabilité de bout en bout des données critiques - de la source à leur consommation
    - Des mesures pertinentes de qualité de données
    - Des analyses d’impact et d’écarts impactant la qualité dans les phases de transformation des données

    ASG et Information Builders proposent un socle complet de Data Management pour valoriser vos données facilement et rapidement. Basées sur des approches très structurantes et itératives, les solutions offrent un retour sur investissement (ROI) dès 3 mois.
  • Continuous Vulnerability Management: Adapting to Threat Actors
    Continuous Vulnerability Management: Adapting to Threat Actors
    Chris Goettl, Melanie Karunaratne Jun 16 2020 3:00 pm UTC 69 mins
    Without treating security as an ongoing process, hackers will find, weaponize, deploy, and attack your infrastructure faster than your team can patch. At the same time, the experience of your IT team working with the security group is frustrating and leads to many, many hours of manual work. Learn how to stay ahead of the bad guys and improve the experience for your team with continuous vulnerability management.
  • Ubuntu Core: A cybersecurity analysis
    Ubuntu Core: A cybersecurity analysis
    Trent R. Hein, Co-CEO - Rule4 Jun 16 2020 4:00 pm UTC 60 mins
    We provide substantial documentation and content to share and support the Ubuntu Core architecture and approach, but we don’t want anyone to have to take our word for it when choosing Ubuntu: We brought in Rule4 for an independent, third-party review of Ubuntu Core’s security architecture controls.

    In this webinar, we’ll talk about the testing process and findings, digging into hardening, complexity management, DevOps and SOAR alignment, high velocity deployment, lifecycle management, sandboxing, and more. We’ll discuss strengths and operational security considerations, and find out why Rule4 concluded that Ubuntu Core “provides a comprehensive, secure ecosystem that solves many of the challenges associated with traditional Linux distribution models while providing developers with flexibility and control.”
  • A zero trust model: continuous security for remote digital technology users
    A zero trust model: continuous security for remote digital technology users
    Akhilesh Dhawan, Director, Product Marketing and Florin Lazurca, Sr. Technical Marketing Manager, Secuirty, of Citrix Jun 16 2020 6:00 pm UTC 49 mins
    In these trying times of catastrophic business disruptions, IT teams around the world have heroically implemented remote access for millions of displaced employees. But the rules of engagement continue to change as workers’ personal and corporate devices intermingle, introducing an exponentially larger attack surface. Have you developed a long-term strategy for secure remote access?

    Using a zero trust approach to deploy a secure digital workspace mitigates risk, providing access policies for the time of authentication and continuing protection while the user is working. Security remains in place across all types of applications in the cloud, on premises, or delivered through SaaS.

    Join this webinar as Akhilesh Dhawan, Director, Product Marketing and Florin Lazurca, Sr. Technical Marketing Manager, Secuirty, of Citrix, discuss:

    - Why fine tuning with security must be part of any savvy long-term strategy
    - How to implement a single, secure point of access for corporate resources
    - Why VPN solutions may not be the best answer for your workers or your enterprise
    - How Citrix defines “zero trust” and why it’s critical for remote working and BYOD scenarios.
    - Register now to learn how to add contextual and continuous security to your remote access strategy.
  • Securing Traffic Flows Across Citrix ADC
    Securing Traffic Flows Across Citrix ADC
    Rónán O'Brien - Citrix Networking System Engineer Jun 17 2020 9:00 am UTC 78 mins
    Ronan provides a really detailed walk through of Application security and how adding this layered approach can be applied to an application with infrastructure security.

    This session is a bit longer than an hour, as he had some much to cover, but naturally you can dip in and out as required on this platform.

    Ronan covers, some basic networking security approaches and then adds Web application Firewall and Bot mitigation.
  • Citrix Webinar Featuring Forrester:The New State of Business Continuity Strateg
    Citrix Webinar Featuring Forrester:The New State of Business Continuity Strateg
    Andrew Hewitt (Forrester Analyst/Guest speaker) and Carisa Stringer (Citrix Sr. Dir of Product Marketing) Jun 17 2020 1:00 pm UTC 59 mins
    We are past the first phase of the COVID-19 pandemic. Most organizations have successfully transferred their workforces from the office to the home, with only few exceptions. As we move into the next phase of pandemic management, companies will reexamine their investments and start to plan for the future of work in a post-pandemic world. One thing is clear: remote work isn’t going anywhere. Ensuring a productive and secure remote working experience for the long-term will be key to weathering the remainder of this crisis and future crisises to come.

    In this webinar, digital workspace thought leaders Andrew Hewitt (Forrester Analyst/Guest speaker) and Carisa Stringer (Citrix Sr. Dir of Product Marketing) will explore how organizations should build remote working into their current and future business continuity strategies.

    Attendees of the webinar will come away with:

    •Lessons learned from phase one of the remote work transition
    •Strategies for optimizing your new remote working program.
    •A framework for understanding business continuity planning post-pandemic
  • Citrix SD-WAN - Work at your best with a secure, reliable SD-WAN solution
    Citrix SD-WAN - Work at your best with a secure, reliable SD-WAN solution
    Francois van Deventer - Sr Networking Sales Specialist Citrix South Africa Jun 18 2020 9:00 am UTC 74 mins
    Your digital transformation depends on how well your virtual, cloud, and SaaS apps perform - across the enterprise and in branch locations.

    It's time for a secure, high performance, always - available WAN Edge solution that provides exceptional experience and seamless business continuity.

    In this webinar see how Citrix SD-WAN transforms your business!
  • BigFix User Roundtable: Endpoint Management During a Crisis Part 2
    BigFix User Roundtable: Endpoint Management During a Crisis Part 2
    Dan Wolff Jun 18 2020 4:00 pm UTC 45 mins
    Join our virtual roundtable where you’ll hear Industry Leaders discuss best practices on these topics and more:

    -What are the unique challenges in dealing with new remote workers?
    -Are you seeing new or different types of security threats?
    -Best practices for ensuring compliance?
    -Are you deploying more tools?
    -What is the impact on your budgets?
  • Privilege is Everywhere–Why You Need a Universal Privilege Management Framework
    Privilege is Everywhere–Why You Need a Universal Privilege Management Framework
    James Quick, Director, Solutions & Advisory at Simeio Solutions, and Dan DeRosa, Chief Product Officer at BeyondTrust Jun 18 2020 6:00 pm UTC 60 mins
    Virtually every cybersecurity breach today involves the exploitation of privileged access. Privileges are initially exploited to infiltrate an IT environment, and once compromised by threat actors, privileges are further leveraged to move laterally, access assets, install malware, inflict damage, and exfiltrate sensitive data.

    What is privileged access? It used to be just admin accounts, root access, DBA accounts. But today? Every account should be viewed as privileged, including service accounts, IoT device accounts, and even ordinary user accounts logging in to laptops or desktops.

    In this session, we’ll explore how an innovative Universal Privilege Management model can be used to secure every user, session, and asset across your IT environment. We’ll consider:

    •Why passwords alone aren’t good enough
    •How you can use privileged access security controls to disrupt the cyberattack chain
    •Ways to reduce your risk surface
    •And most significantly, how and why you should make PAM easy and frictionless for your end users
  • Niedrigere Kosten, smartere Prozesse – Vorteile des modernen Content Ökosystems
    Niedrigere Kosten, smartere Prozesse – Vorteile des modernen Content Ökosystems
    Jan Falkenstein, Senior Solutions Engineer, ASG Technologies & Dr. Martin Böhn, VP and Head of CRM and ECM, BARC Jun 19 2020 12:30 pm UTC 60 mins
    Zielgerichtetes digitales Arbeiten ist ein wesentlicher Erfolgsfaktor – das ist in jüngster Zeit sehr deutlich geworden. Dabei hilft es nicht, möglichst viele Informationen zu speichern, sie müssen auch genutzt werden können. Die Praxis zeigt allerdings, dass Informationen nur eingeschränkt verfügbar und über verschiedenste Anwendungen und Repositories verteilt liegen. Gleichzeitig wachsen die Datenmengen exponentiell. Wie gelingt es also, Content aus diversen Anwendungen zentral verfügbar zu machen und zu nutzen, um Prozesse zu optimieren und Wert aus den Informationen zu generieren?

    Lernen Sie von Dr. Martin Böhn, VP und Head of CRM und ECM von BARC, und Jan Falkenstein, Senior Solutions Engineer von ASG Technologies, vor welchen Herausforderungen Unternehmen stehen und welche Lösungsansätze Erfolg versprechen.

    Folgende Aspekte werden angesprochen:
    - Aktuelle Herausforderungen beim Umgang mit Informationen, dem Prozessmanagement und der Nachweisführung
    - Wie können die Anforderungen aus Sicht des Anwenders realisiert werden, der eine bedarfsgerechte, flexible und komplette Sicht auf die Inhalte benötigt?
    - Informationen zusammenführen, analysieren, klassifizieren und bedarfsgerecht bereitstellen => smarte Wege zu einem Content Ökosystem
    - Wie gelingt eine mögliche Umsetzung, und welche Potenziale ergeben sich daraus?
  • Citrix ADM a Management Platform to cover Multi-Cloud Deployment
    Citrix ADM a Management Platform to cover Multi-Cloud Deployment
    Terry Hooper. Senior System Engineer, Citrix Networking Jun 23 2020 9:00 am UTC 58 mins
    Terry runs through the updates for ADM version 13.0. He covers a number of things including some options for enabling analytics, the revised GUI in the latest release and gives a run through of the Tech Preview that allows you to take a running config and convert it to a Stylebook..
  • Factor SD-WAN into your BCP now in time for a return to a new ‘normal’
    Factor SD-WAN into your BCP now in time for a return to a new ‘normal’
    Simon Morris, Network & Security Specialist – SDWAN, Citrix and Stephen Molloy, Networking Systems Engineer, Citrix Jun 23 2020 1:00 pm UTC 57 mins
    What will happen when we eventually go back to ‘normal’, with users returning to offices with a completely different view as to how applications, data and services need to be accessed?

    By taking the time to consider SD-WAN now, you can capitalize on a number of advantages now that will better enable you to service your end users in a post COVID-19 world.

    Watch this webinar where you will learn how to:


    • Take advantage of Zero Touch Deployment now to minimize implementation time, risk and cost, compared to normal operating periods.

    • Transform the branch network to allow it to suitably service the requirements of the end users.

    • Deliver deep analytics across the network to allow network administrators to fully understand how new ways of working will impact on network delivery.

    • Adapt the security layer to meet the security challenges that invariably arise once workers transition back to a more balanced working environment.

    • Deliver a network environment that can effectively and efficiently capitalize on the rapid move to Cloud during the COVID-19 pandemic in order to minimize risk of stranded investment.
  • Maximice su Experiencia ProSupport Suite con SupportAssist para PC Empresariales
    Maximice su Experiencia ProSupport Suite con SupportAssist para PC Empresariales
    Hector Valdes | Alejeandro Castiglioni - Question Moderator Jun 23 2020 2:00 pm UTC 75 mins
    Conoce a las características de SupportAssist para PCs de negocios como parte de ProSupport Suite. Los gerentes de IT van a aprender cómo conectarse con una demostración de implementación en vivo y cómo administrar su flota de Dell en TechDirect, el portal de autoservicio en línea de Dell. Experimente el acceso a información y herramientas que ofrecen el mejor rendimiento de PC en su clase y una resolución rápida de problemas para su equipo. De esa manera, puedan trabajar en cualquier lugar, en cualquier momento, sin el estrés de los problemas tecnológicos.
  • Millennialization of the Mainframe and Beyond
    Millennialization of the Mainframe and Beyond
    Jeff Cherrington, VP, Product Management, Systems, ASG Technologies Jun 23 2020 5:00 pm UTC 49 mins
    The mainframe market is experiencing a generational shift among its infrastructure support professionals. Those who extend to the earliest days of the mainframe have reached the point where they will no longer be part of the day-to-day workforce and millennials are emerging as the new mainframe mavens.

    The mainframe remains a critical component of the IT Infrastructure for many enterprises and, whether in-house, outsourced to a GSP, or in zCloud, the transitioning workforce requires changes to the tools, utilities and applications used to perform functions such as Performance Management and JCL Configuration.

    Join this ASG webinar to learn more about what these unavoidable changes mean for the user experience administering the mainframe, and how that experience can be provided.
  • Enabling an External Workforce with Simeo, Saviynt and PING Identity
    Enabling an External Workforce with Simeo, Saviynt and PING Identity
    Batool Aliakbar-Simeio, Chris Gregory-Saviynt, & Aubrey Turner-Ping Jun 23 2020 6:00 pm UTC 60 mins