Hi [[ session.user.profile.firstName ]]

End User Computing

  • Two-Factor Authentication - You are not as protected as you think
    Two-Factor Authentication - You are not as protected as you think
    Damon Tepe & Jeff Hickman Recorded: Feb 21 2019 60 mins
    Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.

    Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.

    Better breach protection starts with better identity trust!

    During this session you’ll learn how:
    • Attackers are getting around two-factor authentication
    • Risk and context checks can raise trust in identities and identify attackers
    • Adaptive authentication delivers better access security without slowing down your business


    Speakers:
    Damon Tepe - Director, Product Marketing, SecureAuth
    Jeff Hickman - Director of Sales Engineering, SecureAuth
  • Accelerate your Digital Transformation through PDF Productivity and eSigning
    Accelerate your Digital Transformation through PDF Productivity and eSigning
    David Bloxham, SoftwareONE; Kevin O'Donnell, Nitro Recorded: Feb 19 2019 33 mins
    Successful digital transformation begins by equipping all knowledge workers with strategic, easy-to-use tools. SoftwareONE and Nitro can provide you with tools to reduce printing and enable 100% digital workflows through PDF productivity, eSigning and usage insights.

    During this webinar, Nitro’s Director of Product, Kevin O’Donnell, will explain how these tools can be easily implemented and how they can benefit organisations of every size.

    • Learn the benefits of going paperless. Aside from saving trees a paperless office can help greatly with GDPR compliance and protects the confidentiality and integrity of documents.

    • eSigning tools are only available to a fraction of knowledge workers today; Kevin will discuss why this is the case and how this tool can be extended across the entire organisation in an affordable way.

    • Can every industry and organisation digitize their workflows? We will share how companies in various industries are using Nitro as part of their digital transformation initiative.


    Kevin has 16 years of experience in technology innovation, strategic leadership and delivering scalable, breakthrough global solutions. Kevin leads Nitro’s Product Management and UX teams to deliver innovative Digital Transformation breakthroughs across all platforms.
  • Cloud-Native Security: Understanding the Why and How
    Cloud-Native Security: Understanding the Why and How
    David M. Zendzian, CTO, at Pivotal and Jeff Williams, Co-founder and CTO at Contrast Security Recorded: Feb 14 2019 63 mins
    The latest Verizon Data Breach Investigations Report continues to confirm that top sources of data breaches continue to be at the application layer. DevOps and security teams are adopting modern, fully automated software delivery platforms to release apps to production environments multiple times a week or even daily. This has forced security teams to rethink the traditional processes and practices to make security a key component of their cloud-native transformation.

    Join Jeff and David to learn how enterprises are addressing cloud native application security at speed and scale. This session will cover:

    - Common security anti-patterns
    - What is Cloud-Native Security?
    - People: How to align Dev, Security and Ops teams to achieve Cloud Native Security
    - Process: How does Cloud Native change security processes to support the modern agile business?
    - Technology: Introducing Cloud Native Security tools to achieve continuous application security
    - Q&A


    This is the first webinar in a series presented by Pivotal and Contrast Security on Cloud-native Security best practices
  • An Introduction to IoT App Stores
    An Introduction to IoT App Stores
    Kyle Nitzsche Recorded: Feb 13 2019 48 mins
    The traditional approach to monolithic software flashing of devices at the manufacturing stage is not sustainable in the IoT era. Organisations need to take a more long term and future proofed view. In this webinar, learn how the use of an IoT app store can create a customised software portfolio for devices to address security concerns, whilst also supporting the addition of new features and the reduction of support times. The webinar will also cover the different types of stores available, how software updates can be managed in a scheduled manner and permissions set for different users.
  • Mission Leads, Technology Follows
    Mission Leads, Technology Follows
    Jeff Cherrington, VP, Product Management, Systems, ASG Technologies Recorded: Feb 13 2019 47 mins
    Technology serves business and people. Business serves people - not technology. Having a perfectly tuned mainframe, server, virtual, or cloud technology stack won’t provide your business with value – only the ability to leverage the technology to focus on business outcomes will add that insight.

    As Gartner wrote in its Insights from the 2018 CIO Agenda Report, “The CIO role is changing from IT-outcome-focused to business-outcome-focused." Does your enterprise support this view?

    In this session, find out what you should be looking for from software products and the vendors supplying them to ensure you can focus on mission critical processes, and less on the underlying technology.
  • 2FA is Not Enough
    2FA is Not Enough
    Rob Pakai and J.R. Miller Recorded: Feb 12 2019 31 mins
    Using two-factor authentication (2FA) alone is not enough to protect against determined attackers. If security is important, you need to look beyond just 2FA. The next generation of identity security uses risk checks to supplement 2FA, improving security and significantly reducing authentication disruptions for users.
  • Understanding & Safeguarding Credentials
    Understanding & Safeguarding Credentials
    Andy Brown, James Romer & David Thomas Recorded: Feb 12 2019 31 mins
    Cyber-attacks happen every day and law firms are a prime target because their intellectual property & client data can be easily monetized. Passwords, and even 2FA, alone are not enough. Ensure your data access is secured with multi-factor and adaptive authentication from the market leader, SecureAuth IdP.
  • Portal Protection Using Adaptive Authentication: Enable Users & Enhance Security
    Portal Protection Using Adaptive Authentication: Enable Users & Enhance Security
    Damon Tepe & Jeff Hickman Recorded: Feb 12 2019 6 mins
    An age-old dilemma: security versus user experience. Traditionally, hardening security adds to the user burden. But with 81% of reported breaches involving stolen or weak credentials, can you continue to sacrifice security for user convenience? Good news, you don’t have to. Raise security without raising disruptions, SecureAuth IdP.
  • SecureAuth Adaptive Access Control
    SecureAuth Adaptive Access Control
    SecureAuth Recorded: Feb 12 2019 3 mins
    SecureAuth Adaptive Access Control
  • Delivering Trusted Digital Customer Experiences with Adaptive Access Control
    Delivering Trusted Digital Customer Experiences with Adaptive Access Control
    Robert Block, SVP of Identity Security (SecureAuth) & Merritt Maxium, Principal Analyst (Forrester) Recorded: Feb 12 2019 42 mins
    Delivering Trusted Digital Customer Experiences with Adaptive Access Control
  • Over or Under Capacity? No Multi-Platform Plan? Lessons from the Industry.
    Over or Under Capacity? No Multi-Platform Plan? Lessons from the Industry.
    Denny Yost, Enterprise Systems Media; Gary Henderson, ASG Recorded: Feb 12 2019 25 mins
    Are you over-provisioning server capacity, experiencing unplanned capital expenditures or just lacking the necessary capacity planning information to help you make critical decisions? If you answered “YES!”, you are not alone. In a recent independent study conducted by Enterprise Systems Media, more than 50% of respondents acknowledged that they do not have a single, consistent multi-platform solution that provides information to managers, internal buyers, or end-users about performance and capacity across their enterprise. Additionally, close to 30% responded that they did not know if this capability even exists within their organizations.

    Watch this webinar featuring Enterprise Systems Media’s Denny Yost and ASG’s Gary Henderson to learn how your organization compares.

    During this presentation, the results of the survey will be reviewed and you’ll discover strategies for tackling challenges in enterprise capacity planning such as:
    -Accurate Tracking
    -Optimization of Resource Use
    -Controlling Costs
    -Improving Service Availability across all Platforms
  • Beyond Two-Factor: Secure Access Control for O365
    Beyond Two-Factor: Secure Access Control for O365
    James Romer, Chief Secuirty Architect (EMEA) Recorded: Feb 11 2019 36 mins
    Beyond Two-Factor: Secure Access Control for O365
    Prevent the Misuse of Stolen Credentials
  • The Death of 2FA and the Birth of Modern Authentication
    The Death of 2FA and the Birth of Modern Authentication
    Frank Dickson, Research Director (IDC) & Keith Graham, CTO (SecureAuth) Recorded: Feb 11 2019 61 mins
    The Death of 2FA and the Birth of Modern Authentication
  • Achieve Enterprise Scale with Microsoft Exchange on HPE Apollo Storage
    Achieve Enterprise Scale with Microsoft Exchange on HPE Apollo Storage
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE Recorded: Feb 7 2019 52 mins
    Abstract: Learn how HPE hardware brings out the best in Microsoft Exchange Server 2019. This newest version of the leading email product relies on specific hardware features as never before. This session highlights the key features and benefits of Microsoft Exchange on HPE Apollo Gen 10 storage, and what you can expect for improved performance, security, and administration for your email system.
  • Build for the future with voice search
    Build for the future with voice search
    Dustin Coates, Voice Search go-to-market lead at Algolia Recorded: Jan 31 2019 29 mins
    Speaking commands into actions isn’t a futuristic fantasy anymore - it’s the present. Voice as a user interface has arrived and it can elevate the search and discovery experience.

    Join Dustin Coates, Voice Search Go-to-Market Lead, to learn how voice search and its capacity to transform everyday, conversational speech into functional, relevant responses can redefine the way you interact with the world.

    In this session we will cover:

    Why your business should implement voice search
    - Where voice search is useful
    - What good voice search UX looks like
    - How relevancy differs between voice search and typed search
  • An Introduction to Ubuntu Core 18
    An Introduction to Ubuntu Core 18
    Eric Jensen - Head of IoT product management Recorded: Jan 30 2019 50 mins
    Ubuntu Core is a tiny, transactional version of Ubuntu for IoT devices and large container deployments. It runs a new breed of super-secure, remotely upgradeable Linux app packages known as snaps ‐ and it’s trusted by leading IoT players, from chipset vendors to device makers and system integrators. In this introductory webinar you will learn about the latest version of Ubuntu Core, snaps, and how they all fit into the IoT.
  • Data Center Transformation with HPE Microsoft Storage Solutions
    Data Center Transformation with HPE Microsoft Storage Solutions
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE Recorded: Jan 24 2019 53 mins
    Learn how leading companies are improving application performance, reducing IT cost and simplifying their IT administration with Microsoft solutions from HPE. This free webinar introduces HPE Microsoft Storage Solutions that are ensuring business-critical performance and availability for Microsoft SQL Server, Exchange, SharePoint, Windows cloud and Azure Stack infrastructure. Customer case studies and solution offering details will show how to get enhanced SQL Server performance, Higher-density and scale Exchange environments, and simplified administration across your Windows environment with free plug-ins and automation tools.
  • Control Monthly License Charges and Contain MIPS Growth on IBM Z with TMON PA
    Control Monthly License Charges and Contain MIPS Growth on IBM Z with TMON PA
    Frank Alber, Solutions Architect, ASG Technologies Recorded: Jan 23 2019 27 mins
    Today’s business demands are fueling application growth and increases in computing capacity at record rates. One of IT’s primary objectives must be to allow for business growth while controlling costs and capacity. Understanding how existing MIPS capacity is being utilized and where you can make adjustments is key! Watch this 30-minute demo to find out how ASG-TMON Performance Analyzer can help you manage MLC and prevent unnecessary MIPS upgrades by effectively using GPU and lower cost zIIP processor resources.
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Recorded: Jan 22 2019 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • XG Firewall: See It. Stop It. Secure It.
    XG Firewall: See It. Stop It. Secure It.
    Chris McCormack, Firewall Product Specialist, Sophos Recorded: Jan 17 2019 60 mins
    Sophos XG Firewall gives you everything you need to secure your network against advanced threats like ransomware, bots, worms, hacks, breaches and APTs. In addition, you get unparalleled network visibility that no other firewall on the market can deliver.

    Join this webcast to see how XG Firewall can transform your network security and performance. You’ll see:

    - How the threat landscape is evolving
    - How ransomware gets onto your network and spreads – fast
    - Essential protection you need in your firewall to secure your network
    - Best practices for deploying your firewall to provide a solid defense
  • Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Tom Patterson, Chief Trust Officer, Unisys Recorded: Jan 16 2019 44 mins
    Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.

    Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.

    Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
  • Don’t Take the Bait. Stop the Phishing
    Don’t Take the Bait. Stop the Phishing
    Rippy Sekhon, Channel Sales Engineer, Sophos Recorded: Jan 3 2019 49 mins
    While big-name ransomware like WannaCry grabs the headlines, phishing is the cybercrime that’s consistently hooking organizations week in and week out. In fact, over 77% of organizations experience a phishing attack at least once a month.

    Join us for this informative webinar to learn more about phishing and how to stop it, including:

    - The evolution of phishing
    - How phishing works: the business behind the emails
    - Common tactics hackers use in their phishing attacks
  • Modernizing CA SiteMinder with Simeio IDaaS
    Modernizing CA SiteMinder with Simeio IDaaS
    Vipin Jain, Senior IAM Architect (Simeio), Ed Pascua, SVP Sales (Simeio) Recorded: Dec 28 2018 47 mins
    CA SiteMinder is installed in complex multi-product environments. Many times, customers can benefit from decreased costs and simplification and ease of operation by consolidating heterogenous IAM environments on a single vendor IDaaS platform. Listen in to see how Simeio Solutions helped a Fortune 500 retailer modernize its on-prem CA SiteMinder environment.
  • What’s Ahead in Data Management in 2019?
    What’s Ahead in Data Management in 2019?
    Philip Russom, Senior Research Director for Data Management, TDWI; Sue Habas, VP, Strategic Technologies, ASG Recorded: Dec 19 2018 60 mins
    According to Bob Dylan, “The times they are a-changin’.” In the field of data management today, this means a number of exciting but challenging developments.

    Data itself is evolving into larger volumes from new sources in a broadening array of structures, containers, interfaces, and latencies. New data-driven business use cases are rising in prominence, especially those for analytics, self-service, and agile operations. In response to user demands, the software vendor and open source communities are supplying many new data platforms, tools, and capabilities—all purpose-built for modern data and its use cases.

    This webinar is a “must see” for technical users and business managers who are facing these changes. The expert panel on this webinar will help you understand what’s ahead in 2019 and beyond for data management. Attendees can then apply that information to prioritize the data management changes they must address and how they will prepare via hiring, training, budgeting, making a business case, and adopting the right data platforms and tools.

    The webinar panel, moderated by Philip Russom, TDWI’s lead analyst for data management, brings together a number of experts including Sue Habas, VP, Strategic Technologies at ASG Technologies.

    The panel discusses the hotter trends in data management, including:

    - Evolving data volumes, structures, sources, interfaces, and latencies
    - New data platforms, such as Hadoop, clouds, object store, and databases based on columns, NoSQL, graph, etc.
    - Cloud for data management, including data warehousing, integration, and analytics
    - Advancements in catalogs, glossaries, and metadata
    - Automation for development productivity and production optimization
    - Data-driven business practices that need modern technologies, namely analytics, self-service, intelligent operations, and data governance, stewardship, or curation
    - Examples of what successful real-world organizations are doing today
  • Demo: True IT Performance Optimization Needs to be Proactive, Not Reactive
    Demo: True IT Performance Optimization Needs to be Proactive, Not Reactive
    Frank Alber, Solutions Architect, ASG Technologies Recorded: Dec 19 2018 24 mins
    IT must ensure that capacity meets current and future business requirements in a cost-effective manner, but it takes more than just monitoring your infrastructure for current problems. It’s about preventing issues tomorrow, through proper planning and implementation today. Watch this 30 minute demo to find out how ASG-TMON Performance Analyzer can help you move beyond reaction to prevention.

    During this demo, you will discover how TMON PA can:
    - Help improve IT systems and business application availability while controlling costs
    - Achieve IT utilization competency by providing an integrated and consolidated ASG-TMON performance management solution
    - Enable cross team collaboration and uniformity with centrally stored data that is summarized, analyzed, and presented/reported in commonly used distributable formats
  • Streamline Software Procurement Processes with PyraCloud
    Streamline Software Procurement Processes with PyraCloud
    Rhys Williams Feb 22 2019 11:00 am UTC 45 mins
    Many procurement professionals we speak with struggle to get the insights into software purchases, software and cloud usage, contract terms, outstanding invoices, expired quotes and renewal information that they require to do their roles effectively.

    This information is often spread across multiple paper documents, systems, spreadsheets or databases, which makes it tedious and time consuming to gather the necessary data and often leaves Procurement Specialists unprepared at the time of software renewals.

    Lack of visibility into software and cloud spend makes it difficult to negotiate optimal commercial terms and contracts.

    This is why we developed the new Procurement Workbench in PyraCloud.

    We wanted to provide Procurement Specialists with a quick and easy way to see all relevant information and insights needed for their role.

    Join one of our experts, Rhys Williams, and learn how the PyraCloud Procurement Workbench can help you streamline your process by:

    • Simplifying the management of quotes, orders and invoices
    • Improving product search capabilities across multiple products and services in global catalogues
    • Tracking software previously purchased, product favourites and subscriptions
    • Consolidating multiple aspects of the procurement process in one place


    PyraCloud provides a single platform to manage the software procurement process in one place – no need to login to multiple systems – saving you time and money. Join us on the webinar to find out more.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Feb 26 2019 12:00 pm UTC 37 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • 4 Things to Consider with Multi-Cloud and Hybrid Cloud Application Delivery
    4 Things to Consider with Multi-Cloud and Hybrid Cloud Application Delivery
    Sean Leach, Fastly and Sophia Vargas, Forrester Feb 26 2019 5:00 pm UTC 18 mins
    Organizations today are facing 4 main challenges when adopting cloud infrastructure and delivering apps in a multi cloud environment.

    Join this webinar with experts from Fastly and Forrester to learn how to:

    - Maximize availability by ensuring sufficient redundancy and failover options
    - Maintain visibility and control to guarantee app performance
    - Optimize performance across a diverse set of resources, locations and workload types
    - Address interoperability and leverage hybrid app components as one dynamic system

    Tune in with Sophia Vargas from Forrester and Sean Leach from Fastly as they discuss the state of cloud adoption, what to consider when delivering apps in a hybrid/multi cloud and the new approaches to cloud app delivery at the edge.
  • 451 Research & Citrix: Accelerating Productivity without Compromise
    451 Research & Citrix: Accelerating Productivity without Compromise
    Chris Marsh of 451 Research & Matt Crawford of Citrix Feb 28 2019 12:00 pm UTC 54 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • New Approaches for Addressing Consumer Privacy Regulations with Mobius
    New Approaches for Addressing Consumer Privacy Regulations with Mobius
    Greg Wilson, ASG Technologies & Steve Studer, Zia Consulting Feb 28 2019 6:00 pm UTC 60 mins
    Are you struggling to keep up with new regulatory and corporate policies?

    The new wave of consumer privacy regulations and the explosive growth of unstructured data are challenging organizations to rethink how they define, implement, adhere to and track their content governance practices.

    Traditional approaches—often manually executed tactics—are siloed, expensive, inconsistent, and not scalable. A fresh approach is required when it comes to governing these large volumes of content and wide array of data types that are spread across disparate systems.

    Join ASG and Zia Consulting to learn best practices for addressing consumer privacy regulations, including:

    • Defining content policies to comply with governance and regulations
    • Managing the enormous volumes of electronic records with a solution that automates all processes
    • Using ASG Mobius to create a granular, event-based retention and deletion process

    Register today to ensure you are part of the conversation.
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure
    Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Mar 5 2019 1:00 pm UTC 47 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • How to Build a Simple and Profitable Business Through CSP Indirect
    How to Build a Simple and Profitable Business Through CSP Indirect
    Paul O'Connor, Global Lead CSP Indirect Program; Clare Richards, Partner Business Manager; Kathy Jones, SPLA Business Manager Mar 6 2019 11:00 am UTC 60 mins
    If you are a Microsoft partner that falls into one of the following categories and you are unsure what benefits the new Microsoft CSP Indirect program brings to you, we recommend joining this webinar:

    •System Integrator (SI) Partners – these partners will now be able to offer software and support to customers that they were not able to access in the past providing the partner with new sources of revenue and a differentiated value proposition.

    •Hosters/SPLAs – the CSP Indirect program allows these partners to forego their existing infrastructures, which may not be viable long-term, and work through SoftwareONE and Microsoft to help end-customers.

    •ISVs – providing help with scale and reach; working with SoftwareONE’s CSP Indirect team can help them get to market faster and at a greater scale ensuring faster returns for ISV startup stakeholders.

    Finding new business in your customer base this year may seem daunting. Building a new practice may be a costly venture that won’t return value to the business for years. However, delivering long-term customer value is paramount and critical to growing your business.

    SoftwareONE is a certified member of the CSP Indirect program and it’s an exciting time for those in the Microsoft ecosystem, benefiting partners and end customers alike.

    Find out more about the new opportunities available to you and specifics about SoftwareONE’s additional value and services delivered through our unique CSP Indirect program called ONEClub.
  • Intelligent Communication and Collaboration with Microsoft Teams and SoftwareONE
    Intelligent Communication and Collaboration with Microsoft Teams and SoftwareONE
    Peadar O'Sullivan, Solutions Architect; Tim Bennett, Solutions Specialist Mar 12 2019 10:00 am UTC 60 mins
    Microsoft has announced the integration of Skype for Business Online into Microsoft Teams.

    We are also excited to announce the launch of UCSimple into the UK, Ireland and South Africa markets.

    Would you like to know what this Microsoft change means to your organisation and the opportunities Microsoft Teams and SoftwarONE’s UCSimple solution offers as part of your workplace strategy?

    In this 60 minute webinar our experts will discuss:

    •The features and use cases of Microsoft Teams and the UC roadmap
    •How you can meaningfully plan your UC transformation and find the right tools for your organisation
    •How you can technically compose and implement your UC strategy without losing the commitment of your employees
    •How you can make sure your new UC environment is running smoothly with no interruptions after the implementation


    The future workplace has arrived. Technology is changing the way we work, and businesses are using more advanced tools to help people communicate and collaborate.

    Unified Communications (UC) brings together a variety of communication services, including email, telephony, and web conferencing, enabling unrestricted communication and collaboration - in real time, across multiple devices, and without media disruption.

    To be successful in your migration, you need to define your UC strategy and implement and maintain the appropriate infrastructure. We are happy to help you in finding the right strategy for your future workplace and optimally utilising your transformation journey.
  • 4 Practical Ways Cloud Simplifies Managing Apps, Devices, and Data
    4 Practical Ways Cloud Simplifies Managing Apps, Devices, and Data
    Vishal Ganeriwala Sr. Director, Workspace Marketing, Citrix Mar 13 2019 4:00 pm UTC 34 mins
    Traditionally, apps, desktops, devices and data are all managed through different systems, which is complex and time-consuming. Unifying management as cloud services with a single control plane improves the delivery and management of the apps and data employees need. Citrix delivers a complete, secure digital workspace.

    Join this webinar to learn more about how managing apps, desktops, devices and data with Citrix Workspace is:

    • Fast: Deploy apps and desktops, or complete secure digital workspaces in hours, not weeks.
    • Simple: Implement a fully-integrated portfolio via a single-management plane to simplify administration.
    • Adaptable: Choose to deploy on any cloud or virtual infrastructure — or a hybrid of both.
    • Secure: Keep all proprietary information for your apps, desktops and data under your control.
  • Best Practices for Windows Server 2019 on Intelligent Infrastructure
    Best Practices for Windows Server 2019 on Intelligent Infrastructure
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE; Chris Lionetti, Nimble Storage Technical Marketing Manager Apr 11 2019 3:00 pm UTC 60 mins
    Abstract: With Microsoft releasing a new set of server products, 2019 will be a busy year for Windows Admins and IT staff responsible for managing them. Learn how the right enterprise infrastructure products and tools will help ensure smooth upgrades, and the ability to unlock the highest levels of performance, availability & new functionality. Windows solution experts share info on best practices and the latest HPE Storage Integrations, plug-ins and tools covering SCOM, SCVMM, PowerShell and more.