Hi [[ session.user.profile.firstName ]]

End User Computing

  • GDPR: Headache or Opportunity?
    GDPR: Headache or Opportunity? Phil Richards, CSO and Simon Townsend, EMEA Field, CTO Feb 20 2018 9:00 pm UTC 60 mins
    Join Phil Richards and Simon Townsend to get both an EMEA and Americas perspective on how technology solutions such as Discovery, Patching, Application Control, Privilege Management and Service Management can help you minimize the headaches around GDPR.

    Attendees will learn:
    • How to navigate GDPR without a silver bullet
    • The importance of identifying PII data, protecting users, and securing endpoints
    • How to integrate, unify, orchestrate, and automate with service management
    • Ways to implement solutions that reduce the pain associated with GDPR

    It can be hard to see GDPR as anything more than a massive on-going headache. However, while GDPR requires companies to adjust how they handle data in many ways, it also helps organizations ensure overall compliance, protect against cybersecurity threats, manage their IT assets, and more. Register today and discover solutions to help you prepare for GDPR and accelerate your organization with fewer headaches.
  • Beyond Visualizations: Drive Revenue with Embedded Analytics
    Beyond Visualizations: Drive Revenue with Embedded Analytics Haarthi Sadasivam, Technical Product Manager, Looker Feb 21 2018 7:00 pm UTC 60 mins
    Incorporate data into your product, and take advantage of word class databases and a modern data platform. And learn from companies that have been there.

    Join this webinar and learn:

    - How to incorporate data into your product, and take advantage of word class databases and a modern data platform. And hear from companies that have been there.
    - Learn how PDX improved their in house analytical solution and offered their pharmacies a premium level of service — granting them access to collaborate and share the data that they need.
    - Learn how Namely, a HR platform, was able to leverage modern technologies ---databases optimized for performance, ETL tools, BI platforms that offer customization and can scale — to build out a scalable go to market solution in 3 months.
  • Stateful containers for DevOps and Beyond
    Stateful containers for DevOps and Beyond Michael Mattsson - Container Technical Marketing Engineer & Stacey Gilmore Product Marketing Feb 22 2018 4:00 pm UTC 60 mins
    2018 is the year for containers. IT teams are using them to bring new levels of cloud portability, infrastructure utilization, and micro-services to applications. There’s just one big catch: what about the data? How will you bring container-style automation, portability, and operations to enterprise applications and data? Attend this webinar and learn how to make it easy. HPE will share top use cases and show a demo of advanced data services with persistent storage for teams.
  • Bigger, Faster, Connected and More Valuable: Where Data Is Going
    Bigger, Faster, Connected and More Valuable: Where Data Is Going Daniel Mintz, Chief Data Evangelist, Looker Feb 22 2018 7:00 pm UTC 60 mins
    The world of data is changing at breakneck speed. Costs are dropping, speed is increasing, and centralization is getting easier. But getting more value from your data isn’t always easy. We’ll talk about the key trends in analytics and how to prepare your organization for this new world.

    Join this webinar and learn:

    - Which new analytic technologies and trends you need to be aware of and how they’ll impact your business;
    - How to use new technologies to actually empower business users to self-serve to answers and make better decisions using data in their day-to-day workflows
    - Pitfalls to avoid (and flashy technologies to ignore) when you’re planning your analytics strategy
  • Reducing data breaches by focusing on the people problem
    Reducing data breaches by focusing on the people problem Neil Larkins, Jeanette Garwood Feb 27 2018 3:00 pm UTC 60 mins
    We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.

    However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.

    Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.

    During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:

    •Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
    •The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
    •The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
    •Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
    •Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face
  • What are the full spectrum of mobile risks in 2018?
    What are the full spectrum of mobile risks in 2018? Burak Agca - System Engineer Feb 28 2018 10:00 am UTC 60 mins
    Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.

    With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.

    Register to today's webinar to learn about:
    - The threat landscape
    - The evolution of mobile threats
    - How does that impact your organization?
    - How other other organizations are doing?
    - The impact of a breach post GDPR
    - How to protect your enterprise data?

    Live Q&A session at the end.
  • Introduction To Juju: Automating Cloud Operations
    Introduction To Juju: Automating Cloud Operations Tim Penhey Feb 28 2018 5:00 pm UTC 60 mins
    Modern software is getting complicated, and we’re simply not able to hire or train people fast enough to operate it due to the complexity of micro-services running across many machines. Juju from Canonical allows you to deploy open source operations code and model-driven operations at any scale on any cloud. Join the Juju team to find out:
    >The basics of Juju from Charms to Bundles
    >How to easily deploy solutions and scale up from one simple dashboard
    >How Juju can be used for deep learning, container orchestration, real-time big data, or stream processing
    >How you can use Juju to simplify your operations!
  • Data Breach Survival: How to Recover from a Crisis Without Causing a Catastrophe
    Data Breach Survival: How to Recover from a Crisis Without Causing a Catastrophe Paul Edon, International Services Director, Tripwire Mar 7 2018 3:00 pm UTC 60 mins
    We as cybersecurity professionals have witnessed firsthand how a mishandled data breach can cause far more harm to an organisation than it otherwise should have. From financial losses to reputational damage, breaches can leave companies suffering for months, or even years, thereafter when not handled properly. This presentation will share real-world examples of how organisations can effectively recover from a security incident, while minimising potential damage and risk. Regardless of their industry, session attendees will learn best practices for restoring system trust, proving compliance, and communicating to key stakeholders.

    • Discover how to quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems
    • Learn how to use a systematic approach to restore trust in affected systems
    • Understand how to apply a “standard of due care” in order to prove compliance to regulatory agencies
    • Understand key information that needs to be communicated to various stakeholders in the event of a breach

    Paul Edon

    A senior level Information Technology professional with over 30 years of experience in management, consulting and service provision. Paul has been at Tripwire for 8 years and is the International Services Director.
  • How Cloud & SDN will transform your network this year
    How Cloud & SDN will transform your network this year Ashley Nurcombe, CWNE Systems Engineer, UK Aerohive Networks Mar 14 2018 11:00 am UTC 45 mins
    How much time and missed opportunity is yesterday's network design costing today’s organisation? For many, cloud has already disrupted their software, communications and storage to scale and simplify operations – so why not networks?

    Join our CWNEs for this 30 minute workshop o review the benefits of today’s cloud networking offerings – and how to apply principles of software defined networking for radical simplification of the local and wide area network. Reviewed:

    How cloud networking compares to previous fixed network approaches
    How to remove limitations and achieve faster deployment, simpler management and instant adaptability
    Comparing clouds for your network’s future – scalability, security and performance
    How to automate complex operations and dynamically change network behaviour based on activity
    What cloud-powered big data, AI and analytics could do for you
  • 2018 Digital Commerce Fraud Outlook
    2018 Digital Commerce Fraud Outlook Jordan McKee, Principal Analyst Mar 14 2018 2:00 pm UTC 60 mins
    Transactions are migrating from offline to online channels, driving dramatic shifts in the fraud landscape. 2018 will be another challenging year as increasing EMV penetration in the US further throttles the counterfeiting market, shifting more fraudulent activity into digital channels. Join 451 Research Principal Analyst Jordan McKee as he discusses the major fraud trends to monitor in the New Year and shares market data on the current and future state of the digital commerce threat environment.
  • 11ax Wi-Fi What you need to know for 2018
    11ax Wi-Fi What you need to know for 2018 Nathanial Moore, CWNE Systems Engineer, UK Aerohive Networks Mar 28 2018 10:00 am UTC 45 mins
    Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.

    Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?
    Join us for this 25 minute quick-hit, reviewing 11ax’s most important components:

    PHY and MAC layer enhancements for better traffic management and efficiency
    Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
    Considerations for clients and wider network enhancements
  • How to use Predictive Flash to Improve the Performance of VMware Horizon 7
    How to use Predictive Flash to Improve the Performance of VMware Horizon 7 Mike Harding - Virtualization Solution Team, HPE & Bharath Ram - Virtualization Storage Engineer, HPE Mar 29 2018 3:00 pm UTC 75 mins
    Virtualized Desktop Infrastructure (VDI) has been beneficial for large organizations who could manage the complexity and capital expense of a new, high-performance infrastructure. Today many organizations of all sizes have highly distributed workforces running a mix of desktop and mobile (BYOD) devices who could also benefit from centralized virtual system management. This session shares how a Predictive Flash data infrastructure helps ensure the VDI benefits of lower TCO, increased agility and security, and not just for large enterprises. It will feature speakers from the HPE virtualization team along with technical details and demos of how this solution improves VDI performance.