Get powerful end user computing insights from influential EUC experts. Connect with thought leaders and colleagues to get the most up-to-date knowledge on effective approaches to get non-programmers to create working applications.
Keep your endpoint devices, apps and data securely managed on or off the domain. With VMware unified endpoint management, you’ll remediate vulnerabilities faster, deploy patches instantly and install Win32 software quickly, reliably and consistently.
•Consolidate Windows management across devices on or off the domain
•Deliver and install Win32 software reliably and quickly
•Deploy security patches instantly and remediate vulnerabilities faster
•Unify endpoint management functions across desktops and mobile devices
•Find out how other organizations are using unified endpoint management for Windows 10
The digital workspace is the defining model for end-user computing in the mobile cloud era, securely delivering anytime, anywhere access to any application to any device including desktops, smartphones, and tablets.
This session will provide strategic guidance to the major trends shaping the market and how VMware is delivering the innovation and market leadership across desktop, mobile and cloud infrastructure solutions, making the digital workspace a reality.
Identifying security incidents isn’t always easy. Properly scoping incidents can be difficult. And, most organizations admit they aren’t able to fully remediate every incident. On average, over 80% of organizations are concerned with their ability to address all three of the aforementioned tasks. Organizations struggle because they lack confidence in their endpoint data due to incomplete visibility, control, and accuracy.
64% of organizations believe that a successful attack on endpoints is likely to recur and succeed again. This cycle is doomed to repeat over, and over, and over again. However, it's possible to break out of the re-compromise cycle for good. As the endpoint security landscape evolves, what role does EDR play?
Join us for this webinar. Speakers will include:
1.Fernando Montenegro (Sr. Analyst at 451 Research) will provide an EDR market overview and trends
2.Erik Kristiansen (Sr. Director at Tanium) will explore the findings from a recent security survey
Cybercrime Taktiken & Methoden Webinar geben wir einen tieferen Einblick welche Bedrohungen unser grösstes Augenmerk in den vergangenen 3 Monaten hatten und was wir im letzten Quartal 2017 erwarten. Bisher hat uns dieses Jahr Ransomware Wellen und Sicherheitsbrüche rund um den Globus beschert und dies zeigt, warum ein mehrschichtiger Sicherheitsansatz implementiert werden muss, um diesen Gefahren zu begegnen.
Windows bleibt weiterhin das bevorzugte Ziel für Malware Angriffe
Malspam hat gezielte Geographische Kampagnen global gestartet
Malware Vorschau zum 4. Quartal 2017
The date for being compliant with the EU General Data Protection Regulations (GDPR) is getting closer. Many organisations are now seriously engaged in programs to ensure that they meet the new requirements and avoid the potential to incur large fines and brand embarrassment.
One of the key early steps is to create a baseline view of the Personal Data stored within your organization and mapping that to the applications that process it. If you have a packaged application from SAP, Oracle, Salesforce or Microsoft you probably already appreciate the difficulties involved in finding all the Personal Data locations.
ASG and Silwood Technology have combined to deliver a solution which will help you to complete this task quickly and accurately. Join us and learn how ASG and Silwood Technology can help you prepare for compliance with the GDPR.
Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.
Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:
•Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
•Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
•Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
Cybersecurity risks don’t begin and end with PCs. Your networked print devices can be just as big of a risk but often don’t get the right attention.
Watch this webinar to get a real-world look at print security from industry expert Ron Chestang of HP. He’ll detail some common and surprising security issues lurking in your print network and outline specific strategies and controls you can use to minimize the risk. Also on this webinar, Patrick Boyd of Staples Business Advantage will provide actual examples of security issues discovered during print network reviews with customers.
Workplace emergencies can happen at any time and employees need to know what to do in a worst case scenario, from finding the closest hard wall to knowing where the nearest evacuation point is. Watch the webinar to learn how you can help ensure the safety of building occupants when designing a new office space.
If ever there were a truly asymmetric battle, it’s in the war for the endpoint. Enterprises must apply defense as broadly and consistently across hundreds or thousands of endpoints as best they can. But to penetrate an organization, the attacker only needs to succeed with one that exposes a weakness. And from the network, to the endpoint itself, to the user that interacts with malicious content, these weaknesses may be many.
There is a new array of tools in the fight for the endpoint that go beyond traditional monitoring and controls, or the trend toward applying machine learning to the art of defense. In this webinar, Scott Crawford of 451 Research and Ofer Israeli of Illusive Networks will examine these issues and opportunities, and shed light on deception technology and other new tools for intelligent defense at the endpoint that can recognize and contain a threat before it has a serious impact.
Renting infrastructure on demand is the most disruptive trend in IT in decades. In 2016, enterprises spent $23B on public cloud IaaS services. By 2020, that figure is expected to reach $65B. The public cloud is now used like a utility, and like any utility, there is waste. Who's responsible for optimizing the infrastructure and reducing wasted expenses? It’s DevOps.
The excess expense, known as cloud waste, comprises several interrelated problems:
•Services running when they don't need to be
•Improperly sized infrastructure
There are a few core tenets of DevOps that can be applied to reducing cloud waste:
•Rapid useful feedback
Join Chris to learn why you should include continuous cost optimization in your DevOps processes. Automate cost control, reduce your cloud expenses, and make your life easier.
Have you ever wondered why so many companies struggle to implement an effective S&OP strategy? We've had thirty years to fine tune the process and make it flawless. Yet, research shows over two-thirds of companies are not gaining business value from their process. Are we just slow learners, or is S&OP just an illusion?
•Alternative ways to look at the current gaps in your organization and how all the components of a successful business process come together
•Key questions to ask regarding your S&OP and planning processes
•Building blocks of a best-in-class S&OP process
J. Eric Wilson, Advisor, Demand and Sales & Operations, Institute of Business Forecasting
So why is it in our professional life we tend to take things at face value? Your top notch negotiation skills assured you left nothing on the table. You've squeezed that lemon dry, right? Are you sure?
•The Importance of Supplier Relationship Management
•10 places to search for additional savings after the contract is signed
•Benefits to Be Gained From Contracted Suppliers
•Supplier Management Techniques to Capture Greater Value
•Five "No Cost" Sources for Immediate Value
For years, supply chain executives have asked how can they reduce inventory without affecting customer service levels or shifting cost to other supply chain partners? The answer could be a new inventory management strategy.
•Why this new approach reduces total supply chain costs instead of pushing inventory carrying costs onto suppliers
• How to reduce the informational delays that add hidden costs to the supply chain
•Demonstrate how the use of real-time consumer demand can drive time-phased shipments and production through the supply network
Wesley S. Randall, Professor & Chair, Department of Marketing, Logistics, & Operations Management, College of Business, University of North Texas
David R. Nowicki, Director, Center for Logistics & Supply Chain Management, Associate Professor of Logistics, University of North Texas
Jonathan Fife, President of the Professional Development Institute, University of North Texas
Natural disasters. The bankruptcy of a major ocean carrier. Cyber attacks. And exploding batteries. These are just a few of the risks that have laid supply chains low in recent years. Yet the more firms work on risk and resiliency, the more new issues and challenges seem to pop up.
In this webinar, Michigan State professor Steven A. Melnyk will:
•Outline the issues critical to most supply chain managers
•Present the new view of risk management and resiliency at leading firms
•Provide a task list for managers focused on protecting their supply chains and brands
•How to align supplier segmentation to bottom-line results
•Best practices for engaging with suppliers in various tiers
•The most effective supplier stratification tiers and criteria
Amy Fong, Senior Procurement Advisor and P2P Program Leader, Hackett Group
Ms. Fong is an Associate Principal in The Hackett Group’s Procurement Executive Advisory program and Program Leader for the Purchase to Pay Advisory Program.
Jaime Steele, Senior Director Procurement Operations & Center of Excellence Staples Inc.
Jaime Steele has 17 years of experience in procurement and sourcing. She began her career at FreeMarkets Inc., the first provider of online reverse auctions. That experience led to a mix of both advisory and client-side roles in multiple industries, most recently at grocery and retail companies.
Join Staples Business Advantage and GP PRO as we will spend time highlighting ways that you can uncover waste and unnecessary spend in your restroom and help you identify methods for maximizing your restroom spend. By implementing a few simple changes, you will be able to identify some long term cost savings for your facility and be able to reallocate that spend to other areas of your day-to-day business.
Neal Duffy, Sr. Mgr. Facilities Solutions Training
Neal Duffy has more than 40 years of experience in the janitorial and sanitary maintenance (Jan/San) industry on both the manufacturing and distribution sides of the business.
Dr. Ronnie Phillips, Director Omnichannel & eCommerce, GP PRO
Dr. Ronnie Phillips has extensive Jan/San industry experience in product development and innovation, marketing and sales. He graduated from Georgia Institute of Technology with a B.S. in Biochemistry and PhD in Organic Chemistry.
As more and more applications move to the public cloud, many wonder if it still makes sense to maintain a data centre apart from regulated workloads. In this presentation Andres Rodriguez, MAAS engineering manager, will look into how devops and infrastructure managers can build an agile data centre with a developer agility and a cost base that can compete with public cloud.
In this presentation you will learn:
* How to build a low cost / high usage smart data centre based on automation
* Most common use cases best suited for bare metal provisioning
* How MAAS, Canonical's server provisioning tool, can be used to build your agile data centre
Of course you know Ubuntu. Your developers use it everywhere. But you're from an enterprise, where the IT Security team has the final say. As they should. Before your app built on Ubuntu can go into production, you need their signoff. So what's the security story with Ubuntu? How is it hardened? Are there best practices around patch management? What about standards and compliance? How can Canonical help?
In this webinar, join Dustin Kirkland to learn:
>How Ubuntu is secured out of the box
>How we ensure that we are compliant
>How Canonical ensure customers get a first class support experience
>Why Ubuntu has the leading edge in security
In his introduction keynote to the Ubuntu Enterprise Summit Mark Shuttleworth, founder and CEO of Canonical, will be explaining his vision for the future of enterprise architecture.
In his presentation Mark will look into the various trends at play that are currently transforming the way IT infrastructures are being built and managed. From technology to operations, Mark will expose how enterprises are taking new approaches to containing costs and giving developers the freedom to build new breakthrough services.
More about Mark:
Mark Shuttleworth is Founder of Ubuntu and CEO of Canonical. Mark founded Thawte, an internet commerce security company in 1996 while studying finance and IT at the University of Cape Town before selling the company to VeriSign in 1999. In 2000 he founded HBD, an investment company, and created the Shuttleworth Foundation to fund innovative leaders in society with a combination of fellowships and investments. In 2002 he flew to the International Space Station as a member of the crew of Soyuz mission TM34, after a year of training in Star City, Russia. In 2004, he founded Ubuntu and Canonical.
Consumers are enjoying a rapidly expanding choice of how, when and where they bank. However, banks must now manage the extra responsibilities and risks these new channels bring.
In APAC, the Unisys Security Index™ revealed consumers are more concerned about bankcard fraud, ID theft and cyber security than about physical threats like the threat of war/terrorism and natural disasters.
So how can banks balance the need to digitally transform, maintain privacy and security but still provide a seamless, personalized and trustworthy customer experience?
We will cover:
The 10 steps banks need to take to get digital transformation right, and how to improve customer experience and trust during this journey.
How the CISO’s office can be part of the digital transformation journey, embedding security as part of the development lifecycle from the start as a value added component and not a burden as an afterthought.
Innovative technologies like predictive analytics and biometrics can help provide a seamless, frictionless experience for customers. But how can they be applied without seeming invasive?
Nicholle is an experienced senior financial services executive with almost 20 yrs experience working in financial institutions and corporates. She has extensive knowledge across financial services, payments, consumer and business banking, IT, analytics, marketing and strategy.
Leon Manson, Lead Cybersecurity Architect for Unisys APAC, is responsible for the range of real-time protection solutions delivered through Unisys Managed Security Services. Leon has over 25 years IT security industry experience in consulting and systems engineering for startups, tier-one vendors, and as a business owner.
Ian Selbie is responsible for Unisys Financial Industry solutions in APAC focused on enhancing business processes and compliance in financial institutions including omnichannel, financial crime prevention, enterprise payments and case management solutions.
In our fourth Cybercrime Tactics & Techniques webinar, we are going to take a deep look at what threats got our attention the most during the last three months and what we expect to happen moving into the last quarter of 2017. Thus far, the year has brought us outbreaks of ransomware and breaches across the globe, making it more important than ever to implement multi-vector protection.
HP and Staples Business Advantage present:
Governance, Compliance & Print Security - Three keys to protecting business
• The rise of IoT and its evolving role in Security Challenges
• IoT Standards & Framework Developments in CyberSecurity
• Governance and its role in mitigating risk
• And More: Influential Mega Trends, Risks & Hidden Costs
Ron Chestang – GCIH, CEH, CISM
Print Security Advisor
Ron joined HP, Inc. from one of the big four consulting firms where he performed IT Security consulting in Oil and Gas Industry in Houston, Texas. Ron also has over 15 years’ experience as a Cyber Officer in the US Air Force where he received the nation’s most comprehensive cyber security training and the highest level AF security certifications. During his tenure with the AF, Ron participated in numerous cyber exercises and operations including wartime cyber efforts coordinating defense of the nation’s top secret information and coordinating offensive efforts.
Ron has numerous industry Cyber Security Certifications including the EC Council Certified Ethical Hacker, SANS GIAC Certified Incident Handler, and the ISACA Certified Information Security Manager Certification.
Technology Account Executive
Staples Business Advantage
Mike Mayberry our Staples Technology Solutions Healthcare Technology Account Executive has been part of the Staples family for 10 years. Mike started with Staples on our Small Business Account sales team before moving to our retail team as a Sales Manager. Mike joined the Technology Commercial Contract team in 2011 providing IT solutions to our Mid-Market customer. After spending two and a half years with the Mid Market team Mike transitioned to the Commercial team working with F-500 customers. Recently Mike helped launch the new Healthcare team within Staples Technology Solutions and is now working to provide relevant IT solution thought-out our Healthcare base.
Virtual desktop infrastructure (VDI) has seen tremendous growth over the past few years as organizations look to securely and cost-effectively support their ever-increasing mobile workforce. Now VMware is introducing Horizon Cloud, making it easier than ever to deliver on-premises or cloud-hosted virtual desktops and applications from an easy-to-use control plane in the cloud.
In this webcast, you’ll learn how your organization can reap the many benefits of virtual desktops and applications with the speed, simplicity, and predictable pricing of a cloud service.
Join Principal Analyst Dr. Andreas Stiehler from PAC, and Michael Collins from ASG as they present current trends, and discuss the concept of employee experience and its impacts on the consulting and managed services business in the workspace segment.
In this webinar you will learn how:
- To expand revenue opportunities by hosting and managing customizable desktops for your customer base regardless of job role, enterprise and industry
- To differentiate your offerings through a customizable platform to deliver applications, services, content and self-service
- A context-aware and policy-driven solution allows administrators to control access to content and services based on context and policies
- We will also showcase the brand new ASG Technologies’ Workspaces 10 – exclusively for Managed Service Providers and Systems Integrators
Webinar topics include:
• Ergonomics 101
How it impacts workplace productivity
• Sitting vs. Standing
The benefits and costs
• Employee Retention
Why comfort makes employees happy
Tom Albin PhD is a licensed professional engineer (PE) and a certified professional ergonomist (CPE). He holds a PhD from the Technical University of Delft in the Netherlands. He is a Fellow of the Human Factors and Ergonomics Society. Tom divides his professional life between the Office Ergonomics Research Committee (www.oerc.org), where he is the Executive Director, and his consulting practice, High Plains Engineering Services. He has extensive experience as a researcher, corporate ergonomist, and product developer. In addition, he has been active in the US and International Standards community. He is accredited as a US expert to several International Standards Organization working groups and is Vice-Convenor of the ISO committee revising the standards for input devices and workstation layout/postures.
Cristina Ainslie brings a wealth of knowledge to her role as Field Sales Director, Furniture as she has been in the industry for over 30 years. Her tenure in the industry ranges from working as Regional Manager for Teknion and as a Principle for a LEED consulting firm. She is passionate about bringing value to your project by putting together a team that is best in class and will ensure your project is planned, design and executed to your specific needs. She was instrumental in helping her teams create furniture programs for Yahoo, Netflix, Cisco Systems, Polo/Ralph Lauren and YouTube. Her experience in sustainability helped her act as an owner’s rep to assist her clients in obtaining LEED Certification for their projects. She assembled project teams that included architects, contractors, MEP and furniture vendors.
Higher productivity and efficiency, greater employee satisfaction, a better positioning in the war for talents: these and other aspects are in the minds of companies when developing a strategy for new work and mobility concepts.
But the way to get there is not easy. In addition to the implementation of modern technologies, the organizational and cultural changes also play a decisive role in the success of a company.
Based on a recent study by IDG Research Services, we will inform you about the goals, wishes and concerns associated with the topic "workplace of the future“ – not only from the company’s point of view but also from the perspective of the employees.
Michael Collins from ASG Technologies will address details like:
- How to close the gap between the needs of the enterprise and personalization
- Why it is important to include employees in the planning of their workplace at an early stage;
- How to implement the right mix of standardization and individualization and:
- Why more flexibility & agility for employees leads to higher productivity.
In addition, Michael will share a use case with you to demonstrate the advantages of modern workplace concepts, e.g. in the HR department (employee onboarding).
When you’re responsible for the care and feeding of packaged business applications, it can be quite challenging if not impossible to make meaningful changes that improve responsiveness, especially when the underlying database is struggling to keep up.
Watch this webinar to learn:
- What could be the root of the problems you are experiencing
- Ways to identify your problems
- Simple solutions you can implement without anyone else’s help
Software is driving the digital economy. Combining insight across key areas of the software market, we look ahead at what we think will transform in 2018, using predictions from four of our Research Channels: Customer Experience & Commerce, Data Platforms & Analytics, Development, DevOps & ITOps and Workforce Productivity & Compliance.
Join 451 Research’s leading software analysts, Nick Patience, Sheryl Kingstone, Chris Marsh, Matt Aslett, and Carl Lehmann on February 7 for a live webinar as they review and discuss the trends expected to shape the software landscape and the level of impact those changes will have. Please come armed with questions, as there will be a live Q&A session at the end of the webinar.
What if you could move your Linux Virtual Machines straight to containers, easily, without modifying the apps or administration processes? LXD from Canonical is a pure-container hypervisor that takes the speed and latency of containers and brings them to the hypervisor world. LXD is a machine container, meaning they’re just like traditional physical and virtual machines. Join our webinar on February 7th with Technical Lead Stephane Graber to learn...
>The difference between application & machine containers
>How pure-container hypervisors such as LXD can reduce overhead
>How to use LXD in practice from deployment to operations
It’s no longer business as usual in the multibillion-dollar tech M&A market. New buyers are displacing many of the long-time leaders, while other companies from far outside the tech industry are suddenly looking for ways to buy into new trends. To help you navigate this changing M&A landscape, join Brenon Daly, 451 Research’s Director of Financials, for a look ahead to activity in 2018. Drawing on data and insight from across 451 Research, our annual Tech M&A Outlook webinar will highlight specific trends in key enterprise IT markets – including information security, software, mobility and IoT -- that will shape dealflow and valuations in the coming year.
We’re entering the era of cloud consumption. The market is transitioning from one that has been defined mostly by building clouds to one in which cloud service acquisition is the primary driver of IT spending. For enterprises seeking to take advantage of cloud, the key question is ‘how fast can I go?’ As both the foundation for digital transformation and as the platform to support innovation, cloud will bring profound change in 2018.
Join 451 Research’s leading cloud analysts, William Fellows, Melanie Posey, Katy Ring and Owen Rogers on February 9 for a live webinar as they review and discuss the trends expected to shape the cloud landscape in 2018, and the level of impact those changes will have. Please come armed with questions, as there will be a live Q&A session at the end of the webinar.
What if you could package, distribute, and update any application for Linux Desktops, Servers, Clouds, and IoT devices? Snaps are containerised software packages that are simple to create and install, safe to run, and can work on all major Linux systems without modification. Whether you’re a developer, desktop user, or even a device manufacturer; you won't want to miss this!
Want to know even more about Snaps? In our second webinar on the topic we’ll be taking a technical look at Snaps themselves, our writing and publishing tool Snapcraft, how you can convert your existing applications, and the insight you’ll need to start building your first snaps! Ready to start building? You won’t want to miss this one.
The world of data is changing at breakneck speed. Costs are dropping, speed is increasing, and centralization is getting easier. But getting more value from your data isn’t always easy. We’ll talk about the key trends in analytics and how to prepare your organization for this new world.
We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.
However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.
Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.
During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:
•Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
•The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
•The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
•Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
•Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face
Modern software is getting complicated, and we’re simply not able to hire or train people fast enough to operate it due to the complexity of micro-services running across many machines. Juju from Canonical allows you to deploy open source operations code and model-driven operations at any scale on any cloud. Join the Juju team to find out:
>The basics of Juju from Charms to Bundles
>How to easily deploy solutions and scale up from one simple dashboard
>How Juju can be used for deep learning, container orchestration, real-time big data, or stream processing
>How you can use Juju to simplify your operations!
We as cybersecurity professionals have witnessed firsthand how a mishandled data breach can cause far more harm to an organisation than it otherwise should have. From financial losses to reputational damage, breaches can leave companies suffering for months, or even years, thereafter when not handled properly. This presentation will share real-world examples of how organisations can effectively recover from a security incident, while minimising potential damage and risk. Regardless of their industry, session attendees will learn best practices for restoring system trust, proving compliance, and communicating to key stakeholders.
• Discover how to quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems
• Learn how to use a systematic approach to restore trust in affected systems
• Understand how to apply a “standard of due care” in order to prove compliance to regulatory agencies
• Understand key information that needs to be communicated to various stakeholders in the event of a breach
A senior level Information Technology professional with over 30 years of experience in management, consulting and service provision. Paul has been at Tripwire for 8 years and is the International Services Director.