Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • How Lending Tree built an automated, connected service experience
    How Lending Tree built an automated, connected service experience
    Esther Chen, Product Marketing at MuleSoft Recorded: Oct 17 2019 31 mins
    To automate business and service processes requires enabling faster integration between Service Cloud and the ecosystem of surrounding applications. See how LendingTree was able to digitally transform their service experience and provide agents with a single view of their customers. Learn how to use MuleSoft's API approach to integrate Salesforce faster and more efficiently.

    Key Takeaways:
    - Understand the power of MuleSoft + Service Cloud in building a personalized service experience
    - Learn how LendingTree was able to create a single view of their customer using API Designer and Flow Designer
  • How to Transform Your Wide Area Network with SD-WAN
    How to Transform Your Wide Area Network with SD-WAN
    Shamus McGillicuddy, Research Director, EMA Recorded: Oct 17 2019 59 mins
    What are the considerations, trade-offs, and keys to maximizing the impact of your WAN transformation project?
  • Why Rip and Replace Your VPN if You Don’t Need to?
    Why Rip and Replace Your VPN if You Don’t Need to?
    Richard Greenberg, CISSP, OWSAP Foundation; Eitan Bremler - Co-Founder & VP Technology Safe-T Recorded: Oct 16 2019 33 mins
    VPNs have been a cornerstone of secure networking for the last 20+ years. While VPNs have stood the test of time, today, we now know that a true security architecture is hinged upon the concept of Zero Trust Network Access.

    Most organizations have already poured a great deal of time and resources into building out their VPN infrastructure. Considering that the technology does exactly what it’s supposed to do, ripping and replacing it may not make much sense.

    What if we tell you that you don’t have to rip and replace your VPN in order to start your journey towards Zero Trust Network Access? Join us to this webinar to find out how.
  • How to enhance and manage your IoT security in a Microsoft Azure environment
    How to enhance and manage your IoT security in a Microsoft Azure environment
    James Penney, Device Authority and Ian Banham, Microsoft Recorded: Oct 16 2019 52 mins
    IoT platforms like Microsoft Azure IoT provide several capabilities and features to build and deploy IoT applications, solutions and services in a better, faster, more cost-effective and integrated way. IoT platforms also provide quick interconnection of assets and support a wide variety of operating systems and devices.

    While the IoT Platform vendors and ecosystem partners continue to evolve, security is still the #1 concern for its adoption. This is introduced by the scale of IoT, its unique characteristics, disparate components involved, as well as the consequences of compromised security. The IoT continues to grow rapidly but concerns about security remain a significant barrier and are hindering the adoption.

    Enterprise IoT security solutions typically use owner-controlled security posture
    and need to integrate with IoT Platforms’ device and data management.

    The webinar discussion will include:

    • Challenges of building, deploying and securing IoT – on premise and in the cloud
    • A real world Automotive / Connected Car use case; the problem/challenge and the solution
    • The value of Microsoft Azure IoT together with KeyScaler
  • Build your own BPM application
    Build your own BPM application
    Myriam Fentanes and Phil Simpson, Red Hat Recorded: Oct 16 2019 58 mins
    Have you ever built a working application that automates a business process? Now's your chance to try it hands-on. In this workshop, we’ll take you through the steps required to build a simple application based on a real-world use case: automating the handling of credit card disputes.

    We’ll use Red Hat® Process Automation Manager, a leading business process management (BPM) platform. Bring your laptop (no software installation required), and you’ll see how to get started with process modeling, decision modeling, and deploying your finished application to the cloud.

    We’ll cover:

    • How to create models of business processes and decisions using standard notations such as BPMN.
    • How to convert models into fully working applications with Red Hat Process Automation Manager.

    Myriam Fentanes, Principal technical marketing manager, Business Automation, Red Hat
    Phil Simpson, Senior principal product marketing manager, Red Hat
  • Streamline your Data Transformation to SAP S/4HANA
    Streamline your Data Transformation to SAP S/4HANA
    Susan Nee, Sr. Value Engineer at Syniti Recorded: Oct 15 2019 57 mins
    Running an on time, on budget migration is a daunting task. How do you ensure your source data is complete, your mappings are correct, and your team is used efficiently? How do you hit your timeline goals when your project is stalling? Get answers to these questions and more today.
  • Enterprise Content Management: A Digital Operations Future?
    Enterprise Content Management: A Digital Operations Future?
    John Newton, Founder, Alfresco / Charles Araujo, Principal Analyst, Intellyx Recorded: Oct 15 2019 56 mins
    What are the content management trends influencing the market and which new capabilities will help you unlock the value hidden in your organization's content?

    Alfresco founder John Newton, believes working towards a state of ‘Digital Operations’ is key to putting content at the heart of your digital transformation.

    Join him for this webinar, hosted by Charles Araujo, Principal Analyst at Intellyx, where they will explore:
    - Digital Operations that lead to meaningful Digital Customer Experiences and instant services.
    - Why several independent analysts all agree Alfresco is an ECM market leader.
    - The impact of Open Source, API-driven Microservices and Containerization and AI.
  • Cloud-Managed Smart Cameras - Everything You Need to Know
    Cloud-Managed Smart Cameras - Everything You Need to Know
    Saralyn Dasig | Product Marketing Manager, MV Smart Cameras Recorded: Oct 15 2019 45 mins
    MV security cameras leverage advances in solid state memory technology and Meraki expertise in cloud management. By removing the need for additional on premise hardware and standalone software packages, like the network video recorder (NVR) and video management software (VMS), Meraki MV streamlines and simplifies purchasing, deployment, and monitoring of video security systems. Join us on a live webinar to learn more!
  • Panel: Software for Next-Gen Medical Devices
    Panel: Software for Next-Gen Medical Devices
    Davide Ricci Director, EMEA Medical Business - Wind River and Prof. Dr. Christian Johner - Johner Institute for Healthcare IT Recorded: Oct 11 2019 60 mins
    Transforming Medical IoT space: The role of technology and regulations

    The medical device industry is undergoing a fast and profound transformation. The healthcare market is facing unprecedented challenges as it tries to cope with an aging population that drives up the spent pro-capita, and tighter controls over public budget. Technology is looked upon as the solution to the problem, yet innovation cannot come at the cost of introducing uncalculated risks to the life and privacy of patients. Regulators play a critical role: that of having to strike the right balance between progress, safety and security. Come join our panel of experts as they debate the ambitions of the medical device industry and the balancing act of the different forces at play: business, innovation and regulatory.

    Panel Moderator: Dr. Juergen Pesara, Draeger Medical
  • API monitoring and troubleshooting in a hybrid world
    API monitoring and troubleshooting in a hybrid world
    Kevin Balaji, Product Marketing Manager at MuleSoft and Andrew Bragdon, Director of Product Management at MuleSoft Recorded: Oct 10 2019 34 mins
    Today’s enterprises are increasingly dependent on all types of APIs and apps for flexibility and rapid development. However, if even one component of this chain breaks, it can have a ripple effect on its dependents, ultimately sacrificing customer experience and impacting the overall business. As traffic increases, organizations need real time visibility, proactive notifications of issues, and an efficient way to mitigate problems in order to deliver on customer expectations.

    Anypoint Monitoring helps you to proactively identify and resolve issues, all in one place with real time visibility into your APIs and integrations. Ensure business continuity with real time visibility into app performance, customizable dashboards, advanced alerts, and instant access to historical log data.

    Watch this live demo to learn:
    - How MuleSoft customers leverage Anypoint Monitoring to enable best practices and steps towards operational monitoring of their application network.
    - Advanced Monitoring capabilities, including advanced alerts, log management, and custom metrics/events.
    - How Anypoint Monitoring provides real time visibility into your APIs and integrations with easy to use out-of-the-box and customizable dashboards.
  • Enterprise IoT Security: Connect and Protect
    Enterprise IoT Security: Connect and Protect
    Momenta Partners Oct 24 2019 4:00 pm UTC 60 mins
    Security remains a top priority in today’s connected world. The market landscape is dynamic, innovative and confusing at the same time. Navigating the ever emerging threats requires vigilant expertise, which is always in short supply in a digitally accelerated world. Every connected device and service has potential vulnerabilities. Join Momenta Partners as we highlight the most relevant issues of today in Enterprise IoT Security: Connect and Protect.

    In this webinar, Momenta's Managing Director Ken Forster will be joined by a panel of IoT security experts; Duncan Greatwood, CEO of Xage Security, Nicole Ford, VP, Chief Information Officer of Carrier, and Julie Fitton, VP, Digital Product Security of Stanley Black & Decker Inc. to discuss these key themes in digital security:

    - What is enterprise IoT security?
    - Current state of the security market
    - What are the risks?
    - IT - OT gap
    - Solutions and use cases
  • Enter the Era of Attended Automation 2.0 with Human-Bot Orchestration Technology
    Enter the Era of Attended Automation 2.0 with Human-Bot Orchestration Technology
    Craig Le Clair, Vice President, Principal Analyst - Forrester Research & Ritu Kapoor, Director - Automation Anywhere Recorded: Oct 10 2019 62 mins
    The new human-bot orchestration capability in your Automation Anywhere RPA can help managers easily orchestrate workstreams across a pool of employees and bots, for higher levels of employee productivity and improved customer experience. Automate more processes than ever before while maintaining the same level of central governance, security, and analytic capability you are used to from your product.

    Join Automation Anywhere and Forrester Research, as they walk through the capability and the market need for front office automation and human-bot collaboration.


    Craig Le Clair - Vice President - Principal Analyst, Forrester

    Craig serves enterprise architecture and business process professionals. He is an internationally recognized expert in automation, AI, and the future of work. His technology coverage areas include robotic process automation, AI solutions in financial services, and the potential workforce disruption due to these technologies. His 2019 book, Invisible Robots in the Quiet of the Night, has been met with wide acclaim. A prolific writer and speaker, Craig is frequently quoted in The Wall Street Journal, New York Times, USA Today, Forbes, and many other publications and media outlets. Dynamic case management, electronic signature, and customer communications management round out his coverage.

    * More about Craig: https://www.forrester.com/Craig-Le-Clair
    * Find Craig on Twitter: https://twitter.com/CSleclair
    * Read Craig's Blog Posts: https://go.forrester.com/blogs/author/craig_le_clair/
  • [PANEL] Data Governance & Compliance Strategy in the GDPR Era
    [PANEL] Data Governance & Compliance Strategy in the GDPR Era
    David Ginsburg, Cavirin | Matt Walmsley, Vectra | Joseph Carson, Thycotic | Rishi Bhargava, Demisto Recorded: Oct 10 2019 59 mins
    Two months after the implementation of GDPR and many companies are still struggling to address the challenges of stricter compliance requirements and regulations. With data-generated revenue on the line, ensuring a firm handle on your businesses' approach to data governance and compliance will help ease the transition into the new GDPR era and keep your data flowing.

    Tune in as this panel of experts take a deep-dive into data governance best practices, the challenges businesses are facing with GDPR, how to navigate common compliance hurdles and more.
  • Is Developer Satisfaction Critical to Business Outcomes?
    Is Developer Satisfaction Critical to Business Outcomes?
    Scott Willson and Ron Gidron Recorded: Oct 10 2019 37 mins
    Of all the metrics associated with DevOps, continuous delivery, and agile practices, the job satisfaction of developers gets overlooked. Is there a correlation to DevOps metrics and developer satisfaction? At this webinar, we will be discussing the importance of developer satisfaction and ideas of how to drive it and the impact it will have on other measurable outcomes.
  • SD-WAN Confessions: My 3-month Onboarding Experience
    SD-WAN Confessions: My 3-month Onboarding Experience
    Lars Norling, ADB SAFEGAT; Joost van der Struijk, Videns; Eyal Webber-Zvik, Cato Networks Recorded: Oct 10 2019 31 mins
    Learn how ADB SAFEGATE, together with Videns IT Services, had successfully migrated 24 global sites from MPLS to SD-WAN. Join us as we uncover the challenges, and offer a walkthrough for a successful global SD-WAN project - sharing insights and tips on how to avoid common pitfalls.
  • Ask the Malware Expert: Ethics in AI
    Ask the Malware Expert: Ethics in AI
    Alexey Malanov, Malware Expert, Kaspersky Lab Recorded: Oct 10 2019 48 mins
    Alexey Malanov joined Kaspersky Lab in 2004, where he began his work as a virus analyst. He has since been appointed Head of Kaspersky's Anti-Malware Team and in 2012, shifted his focus to analyzing technology trends and risks.

    The threat posed by a Strong AI (artificial intelligence where the machine's intellectual capability is functionally equal to a human's) is well-considered in many science fiction films. But the invention of a Strong AI will take many years, so we can afford not to hurry with the study of "laws of robotics."

    However, we are already facing growing concerns. The use of machine learning in various fields has shown that algorithms often make strange, discriminatory and difficult-to-understand decisions. Moreover, it has been clearly demonstrated that a person can cheat algorithms to achieve desired results.

    Alexey addresses some of the looming issues surrounding the AI algorithms that are becoming a part of our daily lives, and will increasingly affect us and our decisions.
  • AWS WEBINAR: Design & Migration von Daten und Datenbanken zu AWS
    AWS WEBINAR: Design & Migration von Daten und Datenbanken zu AWS
    Maik Ellerbrock (Solutions Architect at Rackspace) Nov 8 2019 10:00 am UTC 60 mins
    Erwägen Sie, Ihre Daten und Datenbanken in die AWS Cloud zu verschieben, um Ihre Abläufe zu verbessern? Benötigen Sie Beratung bei der Konzeption und Planung einer reibungslosen und nahtlosen Migration?

    Registrieren Sie sich für den 8. November 2019 und erfahren Sie, wie der Wechsel von einem herstellergebundenen Datenbankanbieter zu Open Source auf AWS mit Rackspace zur Erhöhung der Zuverlässigkeit, Leistungssteigerung und gleichzeitigen Bereitstellung von Backup- und DR-Vorteilen beitragen kann. Wir zeigen Ihnen, wie Sie die Lizenzierung für Oracle und MS SQL optimieren können und damit Kosten reduzieren. Unser Webinar wird vom Rackspace Solution Architect Maik Ellerbrock durchgeführt– er ist auf AWS spezialisiert:

    •Auswahl der richtigen Datenbankdienste auf AWS
    •Optimierung der Lizenzierung für Oracle- und MS SQL-Datenbanken
    •Vorteile und Ansätze für die Migration auf Open Source und Managed Services
    •Architektur für Backup und DR in hochverfügbaren Lösungen

    Buchen Sie Ihren kostenlosen Webinar-Platz und lernen Sie, wie Sie das Beste aus Ihrer Cloud-Migration herausholen.

    Rackspace ist ein von AWS geprüfter Managed Service Partner mit mehr als 1.000 Zertifizierungen und außerdem ein AWS Premier Consulting Partner.
  • How to accelerate digital transformation with Enterprise Architecture
    How to accelerate digital transformation with Enterprise Architecture
    Henrik Soegaard, Co-founder, Bizcon & Romain Ionas, Account Director, MEGA International Recorded: Oct 10 2019 34 mins
    Digital transformation can be a daunting concept for some organisations, but there are great rewards in getting it right.

    This live webinar will show you how a wide-ranging EA strategy can help you efficiently drive digital transformation efforts and bottom line growth.

    It will help you consider:

    - How to plan IT based on business strategy
    - Redesign processes to offer a flawless customer experience
    - Turn your data into a valuable asset for digital transformation & governance efforts

    You'll take away a clearer idea of "where to start" with digital initiatives, and how enterprise architecture helps build strong foundations for continued success.

    Who should attend?

    - Enterprise Architects
    - Business Process Managers
    - Digital officers
  • Rescue Your Service Desk with Advanced ITSM Superpowers
    Rescue Your Service Desk with Advanced ITSM Superpowers
    George Spalding, Executive Vice President, Pink Elephant Recorded: Oct 9 2019 57 mins
    Are you sensing that your service desk might be in trouble? There are many threatening issues out there that can wipe out your team if you aren’t careful. But, there are also many evolving ITSM strategies you can incorporate into your service arsenal to become a real hero for your team.

    In this webinar, get lessons directly from the spectacled IT crusader George Spalding, executive vice president at Pink Elephant. You will learn about future service desk superpowers you can use to boost performance like:

    •Enhancing vision with intelligent service KPI reporting
    •Increasing strength with iterative process design
    •Running faster with superior service automation processes
    •Increasing agility by incorporating lean practices

    We look forward to seeing you on the webinar!

    Speaker Info:

    George Spalding,
    Executive Vice President, Pink Elephant

    In addition to co-authoring the ITIL® V3’s Continual Service Improvement core volume, George Spalding was honored with the 2012 Ron Muns Lifetime Achievement Award from HDI and is one of the world’s most insightful and engaging IT Service Management and Support experts. In addition to his extensive commitment to moving the industry forward, George spent several years as a consultant to the White House on technical presentations and White House conferences. He also coordinated technical presentations for members of the President's cabinet, the Smithsonian Institute, and the Federal Bureau of Investigation. George is an ITIL Expert, the highest level in the ITIL certification program, is a regular author of IT articles and white papers, and a frequent presenter at global IT conferences and events.
  • DevOps Transformation: Value Stream Management – Insight and Control
    DevOps Transformation: Value Stream Management – Insight and Control
    Julian Fish, Director of Product Management, Micro Focus Recorded: Oct 9 2019 62 mins
    High performing enterprises have used DevOps transformations to improve efficiency, increase delivery velocity, and reduce time to market. Practices such as Agile project management, continuous integration, and continuous delivery and automation have simplified lifecycle management and application delivery. But as organizations continue to mature, lifecycle management improvement practices such as Value Stream Management have increasingly gained traction as a way for enterprises to align IT & business goals, validate IT deliverables, and track enterprise process efficiency.

    Join us for this live webinar as Julian Fish, Director of Product Management, explains:
    • How Value Stream Management practices can positively affect your organization
    • How to align DevOps practices with business objectives
    • How end to end value can be delivered in an efficient manner
  • How to achieve GRC maturity using ServiceNow? - Part 3
    How to achieve GRC maturity using ServiceNow? - Part 3
    Clara Abraham, GRC Consultant; Vignesh Mohan, ServiceNow Specialist; Lalith Boovaragavan, Assistant Marketing Manager Recorded: Oct 9 2019 61 mins
    Stage-3 of this GRC webinar series is – Predict and Prioritize Risks.

    From this session you can:
    · Get an executive view into compliance requirements, monitor enterprise compliance and demonstrate compliance with policies and external standards and regulatory requirements
    · Use the risk dashboard to prioritize and respond to risks
    · Get insights on enterprise risks
    · Plan and execute audit engagements
    · Report and track audit observations
    · Get a view of audit results and engagement breakdowns by task, allowing areas of concern to be identified quickly

    Key takeaways:
    · Using compliance dashboard to demonstrate and manage enterprise compliance
    · Using risk dashboard to prioritize, manage and monitor enterprise risks
    · Planning and execution of audit engagements using Audit Management
    · Viewing audit results and identify areas of concerns using Audit overviews
  • Retimers to the Rescue: PCI Express® Specifications Reach Their Full Potential
    Retimers to the Rescue: PCI Express® Specifications Reach Their Full Potential
    Kurt Lender, Intel and Casey Morrison, Astera Labs Recorded: Oct 9 2019 60 mins
    As PCI Express® (PCIe®) specifications continue to double the transfer rates of previous generations, the technology can address a variety of needs for data-demanding applications. However, along with the progression of PCIe specifications, challenges like signal integrity and channel insertion loss arise as well. Retimers are mixed signal analog/digital devices that are protocol-aware and have the ability to fully recover data, extract the embedded clock and retransmit a fresh copy of the data using a clean clock. These devices are fully defined in the PCI Express base specification, including compliance testing, and are used to combat issues that PCI Express faces.

    In this PCI-SIG® hosted webinar, Kurt Lender of Intel and Casey Morrison of Astera Labs will offer solutions to conquer signal integrity and channel insertion loss challenges, explain the diagnostic capabilities of retimer technology and more.

    About the Presenters
    Kurt Lender is an Ecosystem Enabling Manager for Intel Corporation and a Marketing Workgroup Chair at PCI-SIG
    Casey Morrison is the head of Systems and Applications at Astera Labs and a PCI-SIG member
  • Deutsch - Einführung in Cloud-Managed Switching
    Deutsch - Einführung in Cloud-Managed Switching
    Joel Vilaca | Cisco Meraki Recorded: Oct 9 2019 43 mins
    Nehmen Sie teil an einer Vorstellung unserer Cloud Managed Switches und erfahren Sie wie Sie anhand von Meraki vollste Kontrolle über Ihr Netzwerk erhalten. Überblicken Sie tausende von Ports gleichzeitig, reagieren Sie pro-aktiv auf Fehler mit live Diagnose-Tools und optimieren Sie somit Ihr Netzwerk und täglichen Betrieb um ein Vielfaches - und das von überall aus, zu jeder Zeit und für so viele Standorte wie Sie möchten. Lernen Sie in unserem Webinar mit anschaulicher Live-Demonstration, wie Sie mit Cloud Managed IT Ihre Netzwerke einfach und verlässlich verwalten und somit fast 50% der Kosten gegenüber herkömmlicher Switches reduziert werden.
  • Fuzzing Infotainment Systems and Telematics Units With Agent Instrumentation
    Fuzzing Infotainment Systems and Telematics Units With Agent Instrumentation
    Dennis Kengo Oka, Senior Solutions Architect, Synopsys & Rikke Kuipers, Product Manager, Synopsys Recorded: Oct 8 2019 58 mins
    In the past few years, cybersecurity has become more intertwined into each step of the automotive development process. In particular, fuzz testing has proven to be a powerful approach to detect unknown vulnerabilities in automotive systems. However, with limited instrumentation, especially on systems such as in-vehicle infotainment (IVI) system and telematics units, there are several types of issues that go undetected, such as memory leaks and cases where the application crashes but restarts quickly. Since these systems are typically based on operating systems providing more functionality such as Linux and Android, it is possible to use appropriate tools to collect additional information from the system under test (SUT) to determine whether there were any exceptions detected during the fuzz testing. Furthermore, it would be possible to gather more details about the detected exceptions on the SUT which helps developers to better understand and identify the root cause of the issues and fix the problems more efficiently. To this end, we introduce the Agent Instrumentation Framework and explain how it can be used to improve fuzz testing of IVIs and telematics units. We show how additional information can be collected from the target system and used to identify whether there are exceptions on the SUT and additionally help developers identify the underlying cause of any issues detected. Finally, to showcase the effectiveness of the agent instrumentation framework we built a test bench based on this approach and performed fuzz testing on multiple SUTs. Based on our findings we highlight several examples of issues that would have not been detected unless we used agent instrumentation.
  • Shoot for the Cloud...? Getting Started with Security in AWS.
    Shoot for the Cloud...? Getting Started with Security in AWS.
    Josh Frantz, Lead Security Consultant, Rapid7 Recorded: Oct 8 2019 35 mins
    Is your organization moving to Amazon Web Services? Or are you a seasoned AWS pro, but need to know where to start to secure it?

    It’s a fact—Cloud environments aren’t going away anytime soon. Cloud adoption is expected to grow at 12.4% annually until 2025. When you need to get started in a new cloud environment, or secure an existing one, vulnerability management is the place to start.

    Join Josh Frantz to learn the fundamentals of setting up vulnerability management in your cloud environment and common pitfalls to watch out for. You may even pick up a few good wise cracks along the way.

    In this webinar we will cover:

    1. The future of the cloud infrastructure landscape
    2. Some common misconceptions. Did you know AWS doesn’t secure your environment for you?
    3. Vulnerability Management best practices
    4. How Rapid7 and InsightVM can help
  • Why config matters in DevSecOps
    Why config matters in DevSecOps
    Ben Riley, Technical Director at Sweagle & Emily Tippins, Global Marketing Director, Sweagle Oct 22 2019 2:00 pm UTC 30 mins
    In this upcoming webinar, Ben Riley, Technical Director, will demonstrate the vital role of fighting bad config data and how you can help save your CI/CD pipeline from falling foul of violations, errors, and security risks.

    Topics we will cover in this session:

    1. Secrets management
    Join us to see how sweagle will scan through your config data and discover and automatically encrypt sensitive data such as plain text passwords, API keys, and access tokens.

    2. Fine granular RBAC
    We will demonstrate how you limit access based upon the type of config data and the stage (whether it's for DEV, STAGING, or PROD) for human users, software systems, UI users, and API integrations.

    3. GDPR compliancy, validation & mitigating risks
    We'll show you how you can prevent data transfer violations through geographic validation rules and how to detect bad configurations to cloud resources which could be opening up vulnerabilities in your release process.

    4. CI/CD evidence repository
    We'll clearly demonstration how you can turn collected config data into an unalterable evidence repository that's available for analytics, reporting, and automated diff comparisons. A solid evidence repository is a prerequisite for everyone looking at reducing the effort of self-audit.

    Join us for this technical webinar to see demos and practical illustrations of how you can secure, validate and audit your config data automatically.
  • Transforming Customer Service in Insurance with Intelligent Automation
    Transforming Customer Service in Insurance with Intelligent Automation
    Ken Mertzel – Global Industry Leader, Financial Services at Automation Anywhere Oct 22 2019 3:00 pm UTC 45 mins
    Transforming Customer Service in Insurance with Intelligent Automation

    InsurTechs and new online insurance companies are disrupting the industry, forcing insurers to rethink how they interact with customers and deliver a high-quality customer experience. With the emergence of attended automation capabilities, Robotic Process Automation (RPA) is a critical technology solution empowering customer-facing associates to quickly deliver exceptional service by putting critical information at their fingertips, automating manual tasks and enabling real-time collaboration across the organization.

    Automation Anywhere, the leading provider of RPA and cognitive intelligence solutions, will offer insights on how insurance organizations are using RPA, machine learning and attended automation to transform customer service.

    During this session, we will discuss:
    •Robotic Process Automation trends and benefits
    •Use cases describing where companies typically apply RPA in the insurance industry
    •Specific examples showing how RPA and attended automation can be used to improve customer service in insurance organizations

    About the speaker - Kenneth Mertzel, Global Industry Leader – Financial Services

    Ken Mertzel is the Global Industry Leader for Insurance and Banking at Automation Anywhere, a leader in robotic process automation (RPA). Ken brings more than 25 years of experience as a Financial Services industry executive improving business performance and organizational effectiveness. Previously, he served as chief financial officer of the Insurance Group at Bank of America as well as associate partner at Accenture, finance controller at Progressive Insurance and consultant at Bain & Company. At Automation Anywhere, Ken leads a team that develops customized RPA and intelligent automation solutions to help insurance, banking and finance customers improve productivity and lower operating costs.
  • When to Leverage the Internet for SD-WAN
    When to Leverage the Internet for SD-WAN
    John DeBella, Director of Infrastructure Management at Teradyne, and Aryaka experts Oct 22 2019 5:00 pm UTC 60 mins
    SPECIAL GUEST SPEAKER: John DeBella, Director of Infrastructure Management at Teradyne


    Global networking needs of enterprises have shifted dramatically. It is no longer just about having a static and eminently fair and stable network infrastructure of manually configured routers and deterministic - yet static - MPLS.

    The new digital enterprise model demands an underlying global network that is easy to consume, agile to react to business needs and simple to manage. Hence enterprises have turned to SD-WAN with alternative direct internet access (DIA) site-to-site connectivity that augments and replaces MPLS for business-critical applications.

    Join us as we discuss:

    >> How Teradyne leverages private and public internet connectivity to deliver an optimal application experience for all stakeholders

    >> New, recently-released built-in technologies that enable Ayaka to deliver on the needs of WAN transformation for digital enterprises

    >> What’s in it for network managers as they drive a Netops approach for their enterprises

    >> How to deliver on ‘internet-first’ approaches connectivity, tracking the ‘cloud-first’ approach for applications
  • How AI is transforming customer reviews into crucial business intelligence
    How AI is transforming customer reviews into crucial business intelligence
    Trust Pilot Dec 3 2019 6:00 pm UTC 60 mins
    Getting a ton of customer reviews is great. But if you don't have a way to analyze them for patterns and trends, you're missing out on some business-changing data. Artificial intelligence now offers a fast, efficient, and cost-effective way to unlock insights from your reviews, highlighting trends and customer pains automatically. That means you can focus your time on solving customer issues instead of chasing them down, and learn what it takes to delight, surprise, and keep your customers coming back.

    Join this VB Live event to learn how AI, natural language processing, and machine learning can help you become more customer-focused, turn good feedback into great product, improve the areas that need your attention, uncover what really matter to your customers, and more.

    Registration is free!

    You'll learn:
    *How to find themes in your customer reviews so that you can fix the real pain points instead of putting "band-aids" on each unhappy customer

    *Steps to guide your business decisions around what your customers say they want, not what you think they want

    *The importance of addressing your most common negative issues first to see an immediate change in your customer satisfaction level

    *The concept of always improving your customer experience - searching for trends in your good reviews to turn them into great reviews

    *Ramin Vatanparast, Chief Product Officer, TrustPilot

    More speakers coming soon!
  • Migrating to Microservices? Hacks to follow & Pitfalls to Avoid
    Migrating to Microservices? Hacks to follow & Pitfalls to Avoid
    Jothi Rengarajan – Principal Architect, Chandramouli Parasuraman – Technical Architect Oct 22 2019 5:00 pm UTC 60 mins
    Many organizations that have made the decision to move to Microservices from monolith architecture struggle with the strategy and process rather than the technology itself. This webinar digs deep in to the common pitfalls and the best practices involved in Microservices adoption.

    Key Takeaways:

    • Common Pitfalls in Microservices that may lead to loss of high productivity
    • Best architecture practices and patterns involved in implementing Microservices
    • Implementation and Process Do’s and Don’ts
  • How SAP Advanced Data Management simplifies your SAP S/4HANA Migration
    How SAP Advanced Data Management simplifies your SAP S/4HANA Migration
    Kate Holthouse, Sr. Value Engineer at Syniti Oct 22 2019 3:00 pm UTC 60 mins
    The demonstration will focus on Syniti's SAP Solution Extension – SAP's Advanced Data Migration. You will see how to transform your project by streamlining the migration using an agile methodology in a web-based platform. This solution provides a simple, auditable and reusable workflow to enhance collaboration between IT and business users to drive the success of your SAP S/4HANA migration.
  • Cloud-Managed IT - Everything you always wanted to know
    Cloud-Managed IT - Everything you always wanted to know
    Amelie Sutsakhan, Product Marketing Manager, Cisco Meraki Oct 23 2019 9:00 am UTC 68 mins
    Join us for an introduction to Cisco Meraki and our cloud-managed IT products, including wireless APs, security appliances, switches, cameras, and EMM. You'll learn how cloud management offers greater reliability, easier management, and a lower TCO - and we'll show you a demo of the exciting features in the Cisco Meraki dashboard.
  • Broadly Adopted SD-WAN Use Cases of 2019
    Broadly Adopted SD-WAN Use Cases of 2019
    Yishay Yovel, Chief Marketing Officer at Cato Networks Oct 23 2019 2:00 pm UTC 45 mins
    SD-WAN is all the rage in enterprise networking these days. IT teams are excited about the opportunities SD-WAN creates to transform their WAN to become simple and agile, while improving security, and reducing costs.

    As you review and look at your WAN challenges, we would like to share insights and takeaways, following hundreds of SD-WAN customer deployments worldwide, to better aid and inform your enterprise network decisions.
  • Prognosis for UC Live Demo [October 2019]
    Prognosis for UC Live Demo [October 2019]
    IR Senior Solutions Engineer Oct 23 2019 3:00 pm UTC 45 mins
    Live demo session of Prognosis for UC with one of our Senior Solutions Engineers.
  • The Digital Workforce in HR Process Delivery
    The Digital Workforce in HR Process Delivery
    Tarun Mehta, Global Industry Leader – BPO at Automation Anywhere and Randhir Narayan and Upendra Kartik from Accenture Oct 23 2019 4:00 pm UTC 60 mins
    There is no doubt that a more automated future is coming. One of the most impacted departments by digital transformation is Human Resources. For HR, automation increasingly affects workforce strategy. It also transforms how traditional HR functions are delivered. Are you moving with the speed of the industry?

    Join Tarun Mehta, Global Industry Leader for BPO at Automation Anywhere, along with Accenture’s Randhir Narayan, Sr. Manager, RPA Solution Architect, and Upendra Kartik, Manager of Business Excellence, as they discuss the application of digital workers in HR process delivery.

    During this session, we will discuss:

    •The definition of a Digital Workforce
    •Accenture’s journey to automation in the HR function
    •Use cases showcasing Accenture’s Digital Workforce in their HR function
  • CCS [Ep.5]: Application Security Meets Multicloud
    CCS [Ep.5]: Application Security Meets Multicloud
    John Burke, CIO and Principal Research Analyst, Nemertes Research Oct 23 2019 5:00 pm UTC 60 mins
    Cloud and Cybersecurity Series [Ep.5]: Application Security Meets Multicloud

    Enterprises are developing and buying applications to run everywhere: across multiple clouds, multiple data centers, desktops, mobile devices, and IoT devices. In a multicloud environment, IT needs to take a multipronged approach to securing applications.

    We'll how organizations approach securing their applications for the multicloud, ranging from changes in the development process to the embrace of security technologies including IAMaaS, microservice authentication, and enterprise secure cloud access and policy enforcement (ESCAPE).

    This webinar presents data from Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.
  • Using Evidence-Based Security in Your Secure Development Life Cycle
    Using Evidence-Based Security in Your Secure Development Life Cycle
    Andrew van der Stock, Senior Principal Consultant, Managed Services SIG Consulting​, Synopsys Oct 23 2019 5:00 pm UTC 60 mins
    All too often, security is stuck in the 1960s doing slow desk checks, the results of which are out of date before the PDF report lands on an auditor’s desk. If developers see this report, they’ll find it’s full of hot garbage. Security folks must become agile, thinking like developers and helping build secure applications, not criticizing and using recommendations from the last century. In this talk, you’ll learn how you can contribute data, offer better remediation advice, and use modern evidence-based standards such as the forthcoming OWASP Top 10 2020 and the OWASP Application Security Verification Standard 4.0 in your development pipeline. Security professionals have heard this all before, but we persist in doing the wrong things. Let’s not do security like it’s 1998; let’s build assurance in from the get-go, with each and every build.
  • Deutsch - Einführung in Cloud Managed IT
    Deutsch - Einführung in Cloud Managed IT
    Joel Vilaca | Cisco Meraki Oct 24 2019 9:00 am UTC 53 mins
    Nehmen Sie Teil an einer Einführung in Meraki und in unsere Cloud Managed IT Produkte. Die Einführung beinhaltet eine Vorstellung unserer Wireless-Access Points, Security Devices und Features, Switches, Mobile Device Management und Überwachungskameras.

    Sie erfahren, wie unsere Produkte Ihr Netzwerk verlässlicher machen, das Netzwerkmanagement dramatisch vereinfacht und Ihre TCO- Kosten gesenkt werden.
  • Single and cohesive view into your healthcare IT environment
    Single and cohesive view into your healthcare IT environment
    Chuck Petrie & Peter Haagenson Nov 21 2019 4:00 pm UTC 60 mins
    Join Blue Medora experts, Chuck Petrie & Peter Haagenson, as they discuss the benefits of building a single view for end-to-end monitoring of your healthcare environment. Learn how monitoring Epic alongside the rest of your IT environment can increase reliability, improve productivity and lower cost of ownership.
  • Transforming accounts receivables in Oracle financials with RPA
    Transforming accounts receivables in Oracle financials with RPA
    Arshad Imran, Ramesh Muniyandi Oct 24 2019 5:00 pm UTC 60 mins
    The webinar will take you through Oracle ERP Financials and the AR process along with the challenges faced by the organizations due to manual ERP process. The solution experts will give insights on the ways to overcome the challenges with the help of RPA. Furthermore, the RPA process will be dealt in detail covering the step by step approach to automate AR process with the help of RPA. This webinar will also take you through the role of RPA in helping Oracle ERP customers maximize their ROI and productivity. The case study explaining how Aspire Systems have helped one of the clients to automate legacy processes with RPA along with a demo on AR process automation is the highlight of this webinar.

    Key takeaways:

    • End-to-end knowledge tablet on Oracle Financial suite and AR processes.
    • Insights on generic challenges organizations face due to manual ERP process.
    • Solutions to the challenges with the help of RPA.
    • RPA and AR process automation.
    • RPA’s role in maximizing ROI and productivity for Oracle ERP customers.
    • Case study on automation of legacy process with RPA and demonstration on AR process automation.
  • Accelerate Life Sciences R&D with the Veeva Vault Connector
    Accelerate Life Sciences R&D with the Veeva Vault Connector
    Henry Galio, Senior Director, Veeva Vault CTMS and Kevin Flanagan, Life Sciences Product Marketing Manager, MuleSoft Oct 24 2019 5:00 pm UTC 42 mins
    Veeva Systems is a cloud solution for the global life sciences industry. Veeva helps hundreds of top life sciences companies accelerate critical functions from R&D pipeline through commercial. Join this webinar to learn how MuleSoft's new Veeva Vault Connector enables Veeva and Salesforce customers to accelerate R&D, drive new capabilities for on-premises clinical data analysis, and improve marketing operations.

    Watch this webinar with a Veeva Vault Connector demo to learn how to:
    - Securely integrate Veeva Vault with ERP, MDM, legacy third-party systems, and business applications with MuleSoft’s Veeva Vault Connector.
    - Easily surface clinical data to power new R&D initiatives while ensuring compliance every step of the way.
    - Deliver omnichannel customer interactions with integrated customer data and digital asset management.
  • Heute die Datenplattform für morgen bauen!
    Heute die Datenplattform für morgen bauen!
    Barbara Hofmann & Kolja Rödel - Woodmark Consulting, Carsten Weidmann - Exasol Oct 25 2019 8:00 am UTC 60 mins
    Im Zuge des Digitalisierungstrends haben sich neue Gruppen von Datenkonsumenten und Datennutzern herausgebildet. Neben den Business Anwendern finden sich mittlerweile auch Data Driven Developer und Data Scientists, welche Anforderungen an moderne analytische Architekturen stellen.

    Zu den klassischen Data Warehouse Architekturen haben sich in den letzten Jahren Data Lakes gesellt, welche die Lücke zu polystrukturierten Daten geschlossen haben. Es ergibt sich eine hybride Landschaft, die einen ganzheitlichen Ansatz erfordert, um effektiv Mehrwert zu schaffen.

    Zum Thema Integration neuer Datenquellen in eine moderne hybride Analytics- Architektur zeigen wir anhand eines Use Cases zu Twitter Daten die Verknüpfung der heterogenen Technologien Rest-API, Kafka, Spark, HDFS, Hive, Exasol aus dem BI- und Big Data Einsatzfeld auf.
  • Want to make your Digital Transformation vision a reality? Join us!
    Want to make your Digital Transformation vision a reality? Join us!
    John Master, CMO Extra Technology. Matthew Falconer, Senior Sales Engineer Automation Anywhere. Oct 29 2019 2:00 pm UTC 60 mins
    Learn how Digital Transformation - in the form of the Digitally Enabled Workplace - delivers immediate benefits, allowing organizations to innovate and reinvent themselves more rapidly by making beneficial change happen more swiftly and accurately.

    In this webinar, John Masters, Sr. Manager at Extra Technology will explain how - with Automation Anywhere deployed by Extra Technology - you can effect Digital Transformation at the employee level, making their work more human by concentrating on tasks requiring judgement, collaboration and decision-making.

    Results? Huge gains in employee productivity, satisfaction and efficiency and huge reductions in human error and employee churn.

    Matthew Falconer, Senior Sales Engineer at Automation Anywhere will let you take a peek into their kitchen of the Automation Anywhere platform and its capabilities.

    Register, mark your calendars and join us!
  • Salesforce Lightning Platform and MuleSoft: Deliver employee apps, fast
    Salesforce Lightning Platform and MuleSoft: Deliver employee apps, fast
    Alexis Kushner, Director of Product Marketing, Salesforce and Sam Steiny, Product Marketing Manager, MuleSoft Oct 30 2019 3:00 pm UTC 44 mins
    Business efficiency is the No. 1 priority for CEOs and CIOs. In fact, 84% of IT leaders say improving employee-facing technology is critical for their company’s success.

    Join this webinar for a live demo of Salesforce Lightning Platform with MuleSoft-powered integrations. Learn how to:
    - Deliver a connected experience by integrating back-office applications and systems like Workday and Salesforce.
    - Overcome data silos, IT backlogs, and outdated development tools.
    - Modernize and automate internal processes like onboarding to improve employee experience.
  • 5 MPLS Migration Challenges SD-WAN Solves
    5 MPLS Migration Challenges SD-WAN Solves
    Yishay Yovel, Chief Marketing Officer at Cato Networks Oct 30 2019 3:00 pm UTC 52 mins
    It’s no secret that enterprises are looking beyond MPLS for their new WANs. For some, it’s the rigidity and high costs of MPLS services; for others, it’s MPLS’s complexity and incompatibility with the cloud. But how exactly will migrating to SD-WAN help you overcome MPLS’s limitations?

    Find out on our next webinar, as Yishay Yovel, Chief Marketing Officer at Cato Networks shares the stories of businesses from around the globe who made the transition to SD-WAN.

    Join us to hear:

    - How DSM Pharmaceuticals and Fisher & Company solve global latency issues without paying through the nose.
    - The ways UMHS and Pet Lovers Center, with its 100+ site Cato implementation, deliver direct, secure Internet access without deploying a heap of branch office security appliances.
    - What Brady PLC and Adroll did to optimize cloud access at the branch and on the road.
    - How companies reduce costs and optimize global voice and UCaaS delivery without relinquishing the control of MPLS.
  • How AI-driven Automation Scales Digital Experiences
    How AI-driven Automation Scales Digital Experiences
    Som Chandra Oct 31 2019 3:00 pm UTC 60 mins
    Modern enterprises are facing a maze of challenges in delivering consistent experience across on-prem and multi cloud. In this environment, enterprises want more than just elimination of alert fatigue. They seek remediation, not just awareness. They seek big picture awareness, not just event insight. They seek proactive, automated remediation that help IT teams deliver superior customer experiences. Join the discussion and learn how Automic and AIOps helps enterprises deliver on enhanced experiences.
  • CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization
    CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization
    Johna Till Johnson, CEO and Founder, Nemertes Research Oct 31 2019 3:00 pm UTC 60 mins
    Cloud and Cybersecurity Series [Ep.6]: Next-Generation Cybersecurity: Policy Process and Organization

    Resources are finite. So deploying them wisely is what differentiates successful cybersecurity organizations from those that are less successful. Find out how these successful cybersecurity organizations are structured, what policies they have in place, and what strategies they do—and don’t—follow to protect their enterprise organizations.
  • Building a platform for digital insurance
    Building a platform for digital insurance
    Ben Turner, CTO, Legal and General and Dan Snowdon, UK&I Financial Services Marketing Lead, MuleSoft Nov 6 2019 5:00 pm UTC 43 mins
    Digital insurance platforms enable insurance companies to connect with their ecosystem of customers, partners, and vendors on a single, unified platform. Hear firsthand from CTO Ben Turner how Legal and General’s digital insurance platform helped the company diversify product offerings, and scale quickly to meet customer expectations.

    Key Takeaways:
    - How industry leaders have digitally transformed insurance offerings with a platform business model.
    - How to build an integrated insurance platform to connect your ecosystem of suppliers and exceed customer expectations.
    - Best practices to increase customer retention and profitability with a single view of the customer.
  • Understanding Fibre Channel Scaling
    Understanding Fibre Channel Scaling
    Mark Rogov, Dell EMC; Brandon Hoff, Broadcom; J Metz, Cisco Nov 6 2019 6:00 pm UTC 75 mins
    One of Fibre Channel’s greatest strengths is its ability to scale to thousands and thousands of nodes, while providing predictable performance. So, when we say that Fibre Channel has unmatched scalability, what does that actually mean? And how does it work?

    We often hear about “designed from the ground up,” but in this case it’s actually true. From each individual link, to the overall domain architecture, each step along the way is intended to be approached in a scalable fashion.

    In this webinar, we’ll be breaking down the pieces of the puzzle that help give Fibre Channel its robustness when you’re working at fabrics even greater than 10,000 nodes. We’ll be talking about:

    •What a deterministic storage network is
    •Fabric management principles
    •Negotiated credit transfers (buffer-to-buffer credits)
    •Network Engineering/Design Principles
    •Oversubscription and Fan-In Ratios
    •Topologies that help scale
    •Domains and Fabric limits
    •Consistency of performance at scale

    Along the way, we’ll be talking about some of the ways that Fibre Channel differs from other popular storage networks as they approach large-scale environments, and how it handles issues that arise in such cases.

    Please join us on November 6th at 10:00 am PT/1:00 pm ET for another educational webinar on Fibre Channel!