Hi [[ session.user.profile.firstName ]]

End User Computing

  • SQL Copy Data Management for Hybrid Cloud
    SQL Copy Data Management for Hybrid Cloud Bharath Ram Ramanatan - Technical Marketing Engineer - HPE Storage Recorded: Apr 19 2018 72 mins
    Data is the lifeblood of business. It’s so important that data copies now consume 60% of total storage capacity for the average enterprise – even more than production data1. So how do you protect this important asset, grant copies to all who need it, and avoid paying for extra storage capacity – on-premises and in the cloud? Join us and learn how to simplify these routine tasks using the industry’s most popular database: Microsoft SQL Server. We will demo and discuss popular use cases, such as data protection, business continuity, dev/test, and more.
  • Machine Learning: How data science is changing the art of security
    Machine Learning: How data science is changing the art of security Dr Michael Covington, VP of Product, Wandera, Miranda Mowbray, Industry Expert Recorded: Apr 17 2018 39 mins
    Machine learning has been a game changer. Companies such as Uber, Google and Netflix all use it to make their products better than ever. But how can machine learning be used to detect vulnerabilities and keep your data safe?

    Join this webinar to learn how machine learning is changing security with special guest Miranda Mowbray, who has 25 years experience in industrial research for cyber security, big data and IoT.
  • SD-WAN is Smart
    SD-WAN is Smart Riverbed Technology Recorded: Apr 12 2018 1 min
    Is your network not smart enough? Only Riverbed SD-WAN is smart enough to recognize and route traffic automatically.
  • Does Using Citrix Cloud Services Make Performance Monitoring Easier?
    Does Using Citrix Cloud Services Make Performance Monitoring Easier? Srinivas Ramanathan, CEO, eG Innovations Recorded: Apr 12 2018 64 mins
    Organizations now have a variety of cloud-based options for delivering virtualized applications and desktops. Cloud deployments are fast, involve a lower hardware footprint and simplify IT operations. A key question to answer in this context is: Does Citrix Cloud services make performance monitoring easier than it was for on-premise deployments?

    Watch this webinar by Srinivas Ramanathan, CEO of eG Innovations and increase your knowledge base about monitoring Citrix Cloud services.

    Questions that he answered during the webinar included:

    - What is Citrix Cloud and how does it work?
    - What are the deployment options available?
    - What performance challenges will they encounter?
    - What are the various monitoring tools and options available?
  • Paging Doctor IoT:  IoT’s growing influence in healthcare
    Paging Doctor IoT: IoT’s growing influence in healthcare John Spooner, Senior Analyst, IoT Recorded: Apr 12 2018 47 mins
    The ability to remotely connect and collect data, coupled with the immediacy, breadth and depth of the insights generated by all that data, will impact healthcare over the next 12-24 months, greatly influencing payers, providers and patients, alike, as all three seek better experiences, more proactive treatments and lower costs.

    Join 451 Research Senior Analyst John Spooner as he discusses his perspectives from HIMSS18 and beyond, including views on the overall status of healthcare digital transformation and its impact on payers, providers and patients as well as semiconductors, devices, infrastructure, applications and platforms that serve them.
  • SD-WAN is Secure
    SD-WAN is Secure Riverbed Technology Recorded: Apr 10 2018 1 min
    Is your network vulnerable to attack? Only Riverbed SD-WAN offers secure delivery of all your applications.
  • SD-WAN is Simple
    SD-WAN is Simple Riverbed Technology Recorded: Apr 4 2018 1 min
    Keep your SD-WAN simple. Enjoy SD-WAN capabilities in the cloud with a single click with Riverbed SteelConnect.
  • Responsible Rationalization: Reducing the Cost of IT Operations
    Responsible Rationalization: Reducing the Cost of IT Operations Steven Brasen, Managing Research Director, EMA & Gary Henderson, Director, ASG Technologies Recorded: Apr 2 2018 44 mins
    Discover how rationalization practices can substantially reduce the cost of maintaining IT infrastructures while accelerating their effectiveness and reliability. Join two thought leaders, Steve Brasen, Research Director from leading IT analyst firm, Enterprise Management Associates (EMA), and Gary Henderson, Director of Product Management at ASG Technologies, for an engaging webinar on this topic.

    Key topics of discussion include:
    •Understanding rationalization and the core processes essential to improving returns on investment in IT
    •Reducing the size of a hardware and software footprint for a more streamlined operational environment
    •Eliminating “finger pointing” between solution providers to enable faster mean times to resolution (MTTR)
    •Simplifying administration to enable more response and effective IT support
    •Reducing application sprawl on large systems such as mainframes
    •The step-by-step processes for effectively introducing rationalization practices in your organization that will pragmatically align with production requirements and budget limitations.
  • Mobile Malware Uncovered
    Mobile Malware Uncovered Michael Covington, VP of Product, Wandera & Michelle Base-Bursey, Product Marketing, Wandera Recorded: Apr 2 2018 46 mins
    Hi there,

    Malware outbreaks have become an all-too-familiar experience for IT staff at global organizations and small, regional businesses alike. 2017 has seen its fair share of high profile malware attacks, including the proliferation of ransomware like NotPetya, WannaCry and SLocker.

    But what is malware and how can the enterprise protect against it? Join our webinar where Wandera’s Product Marketing Manager, Michelle Base-Bursey will be joined by our VP of Product, Michael Covington to discuss:

    The evolution of malware and the shifting objectives of the attacker
    The most common infection vectors utilized to compromise a system
    Specific examples of malware that are targeting mobile devices
    Best practices on protecting mobile users and devices within your organization
  • Setup Cloud Connectivity: SD-WAN vs. Legacy WAN - IT Olympics
    Setup Cloud Connectivity: SD-WAN vs. Legacy WAN - IT Olympics Riverbed Technology Recorded: Mar 30 2018 1 min
    In the IT event of setting up WAN connectivity to and within the cloud, who takes the gold medal? Will it be the legacy WAN with complex and inflexible configurations or the SD-WAN with one-click cloud deployments and integrations? Find out who wins and who doesn't place in the IT Olympics.
  • How to Improve the Performance of VMware Horizon 7 with Predictive Flash Storage
    How to Improve the Performance of VMware Horizon 7 with Predictive Flash Storage Bharath Ram-Virtualization Storage Engineer, HPE & Bhumik Patel - Director of Technical Alliances, VMware Recorded: Mar 29 2018 63 mins
    Virtualized Desktop Infrastructure (VDI) has been beneficial for large organizations who can manage the complexity and capital expense of a high-performance infrastructure. Today, however, many organizations of all sizes have distributed workforces running a mixture of desktop and mobile (BYOD) devices that would also benefit from centralized management of a virtualized end user computing environment.
    This session demonstrates how a Predictive Flash data infrastructure, including HPE InfoSight Cross-Stack Analytics, delivers the benefits of VMware Horizon 7 including lower TCO, increased agility, and data security, and how it’s not just for large enterprises. The webinar also includes a talk from a VMware Technical team member covering what’s new in the latest version of Horizon including enhancements for NVIDIA GRID vGPU.
  • How to Combat Phishing: Mobile's New Biggest Threat
    How to Combat Phishing: Mobile's New Biggest Threat Dr Michael Covington, VP of Product, Wandera Recorded: Mar 28 2018 47 mins
    The number of mobile phishing attacks is doubling every year, and phishing has now become the no.1 threat on mobile. While employers are largely aware of phishing attacks over corporate email, they may be surprised to learn that the attackers are moving to where employees spend the majority of their time: on SMS, instant messaging clients and social media apps and websites.

    Join our webinar to discover:

    - What makes mobile such a unique and vulnerable attack vector
    - How phishing attacks have evolved to effectively threaten company, employee and customer data
    - Why Wandera’s intelligence engine, MI:RIAM, is well-positioned to protect your customers' mobile fleet
  • 11ax Wi-Fi What you need to know for 2018
    11ax Wi-Fi What you need to know for 2018 Nathanial Moore, CWNE Systems Engineer, UK Aerohive Networks Recorded: Mar 28 2018 36 mins
    Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.

    Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?

    Join us for this 30 minute quick-hit, reviewing 11ax’s most important components:

    • PHY and MAC layer enhancements for better traffic management
    and efficiency
    • Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
    • Considerations for clients and wider network enhancements
  • Ubuntu Core针对物联网设计的Ubuntu
    Ubuntu Core针对物联网设计的Ubuntu Orange Pi : 夏翡, Ubuntu: Yung Shen Recorded: Mar 27 2018 42 mins
    Ubuntu Core是基于 Ubuntu 的精简版系统,现在已成为物联网以及边缘(Edge Computing)的首选平台。 本期将由Canonical的技术专家以及特邀嘉宾Orange Pi来为大家介绍Ubuntu Core的最新技术动态以及应用。
  • Setup WAN: SD-WAN vs. Legacy WAN - IT Olympics
    Setup WAN: SD-WAN vs. Legacy WAN - IT Olympics Riverbed Technology Recorded: Mar 23 2018 1 min
    In the IT event of setting up a WAN, who will win? Will it be the legacy WAN using CLI or the SD-WAN with rules-based policy creation and deployment? Watch to see who takes the gold in the IT Olympics!
  • Single Pane of Glass Application and Infrastructure Monitoring
    Single Pane of Glass Application and Infrastructure Monitoring John Worthington,Director of Product Marketing, eG Innovations Recorded: Mar 20 2018 36 mins
    Application architectures have become more distributed, heterogeneous, and reliant on supporting infrastructure tiers. The new year will see customers beginning to realize they need to expand their APM monitoring capabilities to provide visibility of these supporting IT infrastructure components.

    Application managers and IT teams are realizing that they need contextual visibility into how an infrastructure problem affects application performance, and seek APM solutions that can cross-correlate code-level and transaction-level performance with the health of the supporting physical, virtual, container and cloud infrastructures.

    Join this webinar, as John Worthington, Director Product Marketing at eG innovations, discusses why this cross-correlation is so important and what's required to achieve it.

    In this webinar, you will discover:

    -Why monitoring applications in isolation will not be enough to monitor digital business service performance
    -What's required for the enterprise to achieve total performance visibility
    -How you can build an incremental plan for achieving transparency in digital service performance monitoring
  • Die neue Freiheit des Arbeitens
    Die neue Freiheit des Arbeitens Michael Collins, Global Vice President, Workspaces Practice, ASG & Manfred Bremmer, Senior Editor IoT & Mobile, COMPUTERWOCHE Recorded: Mar 18 2018
    Zwei Drittel aller Arbeitnehmer wünschen sich flexible Arbeitszeitmodelle – und den standortunabhängigen Zugriff auf alle Daten. So das Ergebnis einer aktuellen IDG Research Services-Studie.
    Doch welche konkreten Vorstellungen und Wünsche sind mit dem Arbeitsplatz der Zukunft verbunden und welche Lösungen gibt es dazu bereits?
    Im Webinar von IDG Research Services am 15. März diskutiert COMPUTERWOCHE-Redakteur Manfred Bremmer mit Michael Kelch von ASG u.a. über:
    •die zeitgemäße Bereitstellung von Daten, Services und Applikationen – gemäß Richtlinien, Kontext und Endgerät
    •die neuartige Nutzererfahrung als Konsument von Enterprise-Infrastruktur, Verteilung und flexibler Verwaltung
    •einen spannenden HR-Use-Case – mit einer deutlichen Zeit- und Kosteneinsparung beim „Mitarbeiter-Onboarding“
  • Die neue Freiheit des Arbeitens
    Die neue Freiheit des Arbeitens Michael Collins, Global Vice President, Workspaces Practice, ASG & Manfred Bremmer, Senior Editor IoT & Mobile, COMPUTERWOCHE Recorded: Mar 15 2018 55 mins
    Zwei Drittel aller Arbeitnehmer wünschen sich flexible Arbeitszeitmodelle – und den standortunabhängigen Zugriff auf alle Daten. So das Ergebnis einer aktuellen IDG Research Services-Studie.
    Doch welche konkreten Vorstellungen und Wünsche sind mit dem Arbeitsplatz der Zukunft verbunden und welche Lösungen gibt es dazu bereits?
    Im Webinar von IDG Research Services am 15. März diskutiert COMPUTERWOCHE-Redakteur Manfred Bremmer mit Michael Kelch von ASG u.a. über:
    •die zeitgemäße Bereitstellung von Daten, Services und Applikationen – gemäß Richtlinien, Kontext und Endgerät
    •die neuartige Nutzererfahrung als Konsument von Enterprise-Infrastruktur, Verteilung und flexibler Verwaltung
    •einen spannenden HR-Use-Case – mit einer deutlichen Zeit- und Kosteneinsparung beim "Mitarbeiter-Onboarding“
  • 2018 Digital Commerce Fraud Outlook
    2018 Digital Commerce Fraud Outlook Jordan McKee, Principal Analyst Recorded: Mar 14 2018 53 mins
    Transactions are migrating from offline to online channels, driving dramatic shifts in the fraud landscape. 2018 will be another challenging year as increasing EMV penetration in the US further throttles the counterfeiting market, shifting more fraudulent activity into digital channels. Join 451 Research Principal Analyst Jordan McKee as he discusses the major fraud trends to monitor in the New Year and shares market data on the current and future state of the digital commerce threat environment.
  • How Cloud & SDN will transform your network this year
    How Cloud & SDN will transform your network this year Ashley Nurcombe, CWNE Systems Engineer, UK Aerohive Networks Recorded: Mar 14 2018 45 mins
    How much time and missed opportunity is yesterday's network design costing today’s organisation? For many, cloud has already disrupted their software, communications and storage to scale and simplify operations – so why not networks?

    Join our CWNEs for this 30 minute workshop o review the benefits of today’s cloud networking offerings – and how to apply principles of software defined networking for radical simplification of the local and wide area network.

    Reviewed:

    •How cloud networking compares to previous fixed network
    approaches
    •How to remove limitations and achieve faster deployment, simpler
    management and instant adaptability
    •Comparing clouds for your network’s future – scalability, security
    and performance
    •How to automate complex operations and dynamically change
    network behaviour based on activity
    •What cloud-powered big data, AI and analytics could do for you
  • Data Breach Survival: How to Recover from a Crisis Without Causing a Catastrophe
    Data Breach Survival: How to Recover from a Crisis Without Causing a Catastrophe Paul Edon, International Services Director, Tripwire Recorded: Mar 7 2018 45 mins
    We as cybersecurity professionals have witnessed firsthand how a mishandled data breach can cause far more harm to an organisation than it otherwise should have. From financial losses to reputational damage, breaches can leave companies suffering for months, or even years, thereafter when not handled properly. This presentation will share real-world examples of how organisations can effectively recover from a security incident, while minimising potential damage and risk. Regardless of their industry, session attendees will learn best practices for restoring system trust, proving compliance, and communicating to key stakeholders.

    • Discover how to quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems
    • Learn how to use a systematic approach to restore trust in affected systems
    • Understand how to apply a “standard of due care” in order to prove compliance to regulatory agencies
    • Understand key information that needs to be communicated to various stakeholders in the event of a breach

    Paul Edon

    A senior level Information Technology professional with over 30 years of experience in management, consulting and service provision. Paul has been at Tripwire for 8 years and is the International Services Director.
  • Introduction To Juju: Automating Cloud Operations
    Introduction To Juju: Automating Cloud Operations Tim Penhey Recorded: Feb 28 2018 42 mins
    Modern software is getting complicated, and we’re simply not able to
    hire or train people fast enough to operate it due to the complexity of
    micro-services running across many machines. Juju from Canonical allows
    you to deploy open source operations code and model-driven operations at
    any scale on any cloud. Join the Juju team to find out what Juju is, and
    what benefits it can bring to your company.
  • What are the full spectrum of mobile risks in 2018?
    What are the full spectrum of mobile risks in 2018? Burak Agca - System Engineer Recorded: Feb 28 2018 35 mins
    Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.

    With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.

    Register to today's webinar to learn about:
    - The threat landscape
    - The evolution of mobile threats
    - How does that impact your organization?
    - How other organizations are doing?
    - The impact of a breach post GDPR
    - How to protect your enterprise data?

    Live Q&A session at the end.
  • Reducing data breaches by focusing on the people problem
    Reducing data breaches by focusing on the people problem Neil Larkins, Jeanette Garwood Recorded: Feb 27 2018 45 mins
    We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.

    However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.

    Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.

    During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:

    •Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
    •The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
    •The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
    •Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
    •Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face
  • Bigger, Faster, Connected and More Valuable: Where Data Is Going
    Bigger, Faster, Connected and More Valuable: Where Data Is Going Daniel Mintz, Chief Data Evangelist, Looker Recorded: Feb 22 2018 45 mins
    The world of data is changing at breakneck speed. Costs are dropping, speed is increasing, and centralization is getting easier. But getting more value from your data isn’t always easy. We’ll talk about the key trends in analytics and how to prepare your organization for this new world.

    Join this webinar and learn:

    - Which new analytic technologies and trends you need to be aware of and how they’ll impact your business;
    - How to use new technologies to actually empower business users to self-serve to answers and make better decisions using data in their day-to-day workflows
    - Pitfalls to avoid (and flashy technologies to ignore) when you’re planning your analytics strategy
  • How Predictive Analytics makes YOU and everyone else smarter
    How Predictive Analytics makes YOU and everyone else smarter Jorge Maestre - HPE Storage Evangelist Apr 24 2018 3:00 pm UTC 75 mins
    In the storage community, flash is definitely the new normal; so much so that box-to-box or array-to-array comparisons aren’t all that differentiated these days. So what separates the average from the outstanding, when it comes to flash storage arrays? HPE believes that it is storage that 1.) leverages predictive analytics, 2.) is cloud-ready and is able to understand your application, regardless of where it resides, and 3.) is timeless, with characteristics that protect your IT investment. In this webinar, Jorge Maestre, HPE Storage evangelist and influencer, drills down into these new age storage requirements. Take predictive analytics for example. Think about the possibilities in your datacentre, when storage can take advantage of intelligence coming from 10’s of thousands of arrays, to make your experience better – from a support perspective, from a usability perspective, and from an all-around ownership perspective. You’ll come away with a new appreciation on how predictive analytics is a game changer for storage.

    Presenter Bio: Jorge Maestre, Senior Technologist & Strategist for Worldwide Storage at Hewlett Packard Enterprise, also known as “The World’s Strongest Technologist” because of his rare combination of powerlifting and long-standing technical experience. He started his career on the customer side as a Data Center Architect, then moved into a sales role. Jorge left the block storage world to take on the role of evangelist for a small startup focused on a File and Database solution, and then for a second startup focused on Container/Application Virtualization technology. After a successful acquisition, Jorge returned to the world of block storage with HPE. As a subject-matter expert & strategist Jorge has forged a unique perspective of the storage industry by developing a deep understanding of the market, and the individual vendors, through thorough examination of their financial position, technological offerings, & strategic directions.
  • GDPR: but what about mobile?
    GDPR: but what about mobile? Dr Michael Covington, VP of Product, Wandera Apr 25 2018 3:00 pm UTC 60 mins
    It's the buzziest of buzzwords, but ensuring compliance with GDPR is a very real and pertinent concern for many businesses. An overlooked area in many strategies is mobile - what should companies be thinking about when it comes to mobile devices?

    Join this webinar to get a quick overview of the aspects you should be considering for complying to GDPR from a mobile perspective
  • Migrating to Citrix XenApp & XenDesktop 7.x – Trends, Challenges and Performance
    Migrating to Citrix XenApp & XenDesktop 7.x – Trends, Challenges and Performance George Spiers, Infrastructure Consultant, Srinivas Ramanathan, CEO, at eG Innovations May 2 2018 5:00 pm UTC 60 mins
    With the end of maintenance of Citrix XenApp 6.5 approaching quickly (June 30, 2018), there is increased adoption of Citrix XenApp & XenDesktop 7.x. eG Innovations and DABCC have conducted a joint survey to understand this migration trend, challenges involved, and performance expectations.

    Watch this webinar and understand how the industry is gearing up for Citrix XenApp and XenDesktop 7.x adoption. In this webinar, you will learn:

    - The expectations from Citrix admins about the migration to XenApp/XenDesktop 7.x
    - Key factors driving adoption of 7.x
    - Challenges expected before, during and after migration
    - Citrix Cloud adoption trends
    - Performance management concerns and expectations

    Get expert feedback and analysis of the migration trends and take away useful tips for successful and seamless upgrade to Citrix XenApp and XenDesktop 7.x!
  • How to Avoid Java/.NET App Performance Issues Using Business Transaction Tracing
    How to Avoid Java/.NET App Performance Issues Using Business Transaction Tracing John Worthington,Director of Product Marketing, eG Innovations May 9 2018 5:00 pm UTC 60 mins
    Most APM tools offer user experience monitoring and transaction tracing capabilities, however APM by itself may not enable you to isolate performance issues across an entire digital business service ecosystem.

    Join us as John Worthington, Director of Product Marketing with eG Innovations, describes how real user monitoring and transaction tracing can be part of a unified monitoring strategy that leverages converged application (APM) and infrastructure (IPM) performance monitoring.

    In this informative session, you will see how:

    -Business transaction tracing works to deliver code-level visibility, and why it is important for diagnosing web application slowdowns

    -The convergence of APM and IPM can provide holistic visibility and performance analysis of end-user experience, business transactions, application code, and infrastructure dependencies – all from a single pane of glass

    -A unified view of the application environment allows line of business owners and IT admins to easily isolate the root cause of issues

    Join us for an informative webinar and live demonstration and learn how you can ensure peak performance of your business-critical applications through development, testing, pre-production, and production rollout.
  • Cutting Through the Noise: The Role of Documents in Digital Transformation
    Cutting Through the Noise: The Role of Documents in Digital Transformation Melissa Incera & Chris Marsh of 451 Research, Sam Chandler of Nitro Software and David Floss of Zebra Technologies May 16 2018 3:00 pm UTC 60 mins
    Join our webinar to learn how democratizing PDF productivity and electronic signatures can save money, modernize information management, and advance digital transformation across your organization.

    As the most prevalent document format in any organization today, PDF was meant to simplify formatting, fuel collaboration, and improve productivity. But prolific paper-based processes and the failed promises of expensive, legacy technologies have made it impossible for many enterprises to keep up with the explosion of digital documents.

    On May 16th, Melissa Incerna and Chris Marsh of 451 Research invite Zebra’s Global Client Support Manager David Floss and Nitro’s Founder and CEO Sam Chandler for the live panel: Cutting through the Noise: The Role of Documents in Digital Transformation.

    Together they’ll discuss:

    •The state of today’s landscape
    •The power of simple, flexible solutions
    •The importance of partnership in achieving DX

    Register now to discover how enabling your workforce with the right tools can boost your bottom line, drive customer loyalty, and progress your digital transformation journey.

    CTA: RSVP now to reserve your spot
  • Transform Your Business with Intelligent Information Management: Mobius 8
    Transform Your Business with Intelligent Information Management: Mobius 8 Greg Wilson, Director, ASG & Jack Marcus, Solutions Engineer, ASG & Jarein Vlesveld, Director, ASG May 23 2018 5:00 pm UTC 30 mins
    Digital information is the lifeblood of every enterprise business. You need content services that integrate with your existing on premise and Cloud technologies to ingest your content and store that information in accessible pieces so it can be found, managed and viewed across the globe in real time. Join ASG’s Product and Solutions Consulting team to discover how the powerful content services offered by Mobius can help transform the way you do business and access information.

    During this 30 minute webinar, you’ll explore the granular policy management that lies at the foundation of Mobius’ architecture and see how Mobius allows your teams to manage content easily through regulations and corporate policies while ensuring your business remains competitive.
  • Managing Massive Data Growth
    Managing Massive Data Growth Christopher Donohoe - Scality, and Charles Tierney HPE Storage May 24 2018 3:00 pm UTC 75 mins
    Managing Massive Data Growth. It’s true – it is all about you–your data that is. Several different trends have converged to accelerate the creation of valuable data, presenting new challenges to enterprise storage management teams. Many customers along with some analysts suggest object-based storage as a key element in managing the growth of data. What is it that they see in object storage? Join us as we discuss: Recent Trends leading data growth, the benefits of software-defined object storage features to consider, and real-world examples where object solutions are managing data growth issues.
  • GDPR compliance on mobile devices, how secure is your organization?
    GDPR compliance on mobile devices, how secure is your organization? Aaron Cockerill, Chief Strategy Officer, Lookout May 29 2018 11:00 am UTC 60 mins
    Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.

    On the agenda:
    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    Did you know?

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
  • Automate Storage Provisioning using VMware vRealize Orchestrator, Ansible, and C
    Automate Storage Provisioning using VMware vRealize Orchestrator, Ansible, and C Chris Snell - HPE Storage Technical Marketing & Srik Venkata - HPE Storage Product Management May 31 2018 3:00 pm UTC 75 mins
    Learn how to use the new HPE 3PAR plugin for vRealize Orchestrator (vRO), Ansible, and Chef. Learn the benefits of automating HPE Storage within your companies Private Cloud and DevOps initiatives. This session will be covering Use Cases, and Demos, for the plugins for HPE 3PAR.