Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Tech Demo - Pseudonymization and Data Masking for the GDPR
    Tech Demo - Pseudonymization and Data Masking for the GDPR Cheryl Tang - Director of Product Marketing, and Steve Pomroy - Chief Technologist, Camouflage Recorded: May 25 2017 35 mins
    This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.

    We’ll provide an overview of:

    o What the General Data Protection Regulation (GDPR) is
    o What is pseudonymization and the benefits of pseudonymizing data
    o How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities

    Hope you can join us!
  • How CloudCheckr Makes 1.7 Million EC2 Decisions Easy
    How CloudCheckr Makes 1.7 Million EC2 Decisions Easy Todd Bernhard, Product Marketing Manager, CloudCheckr Recorded: May 25 2017 20 mins
    Choosing to move to the Cloud is a great decision, but it’s the first of many more decisions. You have to choose from 70 instance types, with 14 purchase options, running your choice of 4 operating systems, across dozens of availability zones and regions with distinct choices for tenancy and block storage. When you add it up, there are over a million options. In fact, Gartner has calculated that the number of decisions just for deploying an EC2 instance is over 1.7 million.

    It’s easy to make the wrong decisions and spend too much or be underprepared to meet demand. There’s only one way to make such decisions reliably and efficiently and that is to automate and follow best practices. In this in-depth discussion and demonstration, Todd Bernhard, CloudCheckr Product Marketing Manager, will show how to use CloudCheckr's Best Practices tool to manage costs.

    Join us for a "Deep Dive" into some of the 450+ Best Practice Checks offered by CloudCheckr to:

    - Make sure you are not paying for unused resources

    - Ensure the resources you are indeed using are being used at a high level of utilization

    - Identify areas where you can save money
  • Performance Testing of Business Process Management Platforms: Vizuri Case Study
    Performance Testing of Business Process Management Platforms: Vizuri Case Study Kenneth Spokas, Technical Director, Vizuri & Phil Simpson, Principal Product Marketing Manager, Red Hat Recorded: May 25 2017 53 mins
    Assessing performance of a general and flexible business process management (BPM) products and solutions is challenging. It's notoriously difficult to assess, measure, and accurately predict how a product or solution will scale under normal use and load. Each user's unique business requirements and specific implementation design must be taken into account.

    Red Hat has partnered with Vizuri, an IT consulting firm, to provide you with a performance test tool for any BPM framework or process server. The BPM performance test tool can be used to model and assess many different scenarios simulating a set of reusable resources. The results will be a uniform performance evaluation that accounts for as much end-user process design and implementation variability as feasible.

    Join this webcast to learn more about this tool through a case study on Red Hat® JBoss® BPM Suite.
  • How Talkdesk Transformed Disparate Data into Tell-All Dashboards
    How Talkdesk Transformed Disparate Data into Tell-All Dashboards Ernest Wong, Product Manager, Talkdesk, Nouras Haddad, Director of Tech Alliances & Taylor Brown, Co-founder of Fivetran Recorded: May 25 2017 62 mins
    When you don’t have a solution for data, you fall back on slow, suboptimal tactics for accessing data, denying business users and decision makers access to the most accurate, up to date, and relevant information.

    Learn how Talkdesk went from a chaotic world like the one above to being a company where people can easily explore data and quickly get a 360° view of every account. Using FiveTran and Looker, Talkdesk’s product manager was able to tie all their now-centralized data together to create a powerful and stable environment for data discovery.

    From this webinar, you will learn:

    • What a centralized data store can do for you and how you can achieve that

    • Why you should be transforming your data at the time of query, not before you load it into your database

    • How one man created a company-wide data platform in one month
    Watch to understand how to take control of your data and use it to drive results.
  • Convirtiendo visión en realidad: Roadmap producto para minoristas especializados
    Convirtiendo visión en realidad: Roadmap producto para minoristas especializados Maarten Tromp, Director de Product Management en Openbravo Recorded: May 25 2017 56 mins
    En este webinar, aprenderá sobre los principales pilares que impulsan la estrategia Retail First de Openbravo y entenderá cómo se traducen en innovaciones tangibles de producto diseñadas para ofrecer una ventaja competitiva a minoristas especializados. Describiremos las mejoras ya liberadas como parte de nuestro Roadmap estratégico de producto y presentaremos alguna de las innovaciones hoy en día en desarrollo para su incorporación en futuras versiones del software.
  • Supermicro Rack Scale Design: Enabling Large Scale Modern Data Centers
    Supermicro Rack Scale Design: Enabling Large Scale Modern Data Centers Marc Fisher, RSD Solution Sales Manager, Intel & Ray Pang, Director of Technical & Solutions Marketing, Supermicro Recorded: May 25 2017 58 mins
    Over the past 20 years, Enterprise IT has evolved from a rigid, buying all IT equipment up-front and provisioning for the next 5 years approach, to the on-demand, agile, scale-out, software defined data centers that the hyperscale companies enjoy today. But if you are not one of those hyperscale companies and need to compete with them, what do you do? Then you will need a solution like Supermicro Rack Scale Design (RSD).

    Based on Intel® Rack Scale Design software framework, Supermicro RSD is a total solution comprised of Supermicro server/storage/networking hardware and an optimized rack level management software. Designed with the whole rack as the new management unit in mind, Supermicro RSD leverages industry standard Redfish RESTful APIs developed by DMTF (Distributed Management Task Force) and provides the agility and efficiency for cloud scale data center operators to perform operations such as resource pooling and composability.

    In this webinar, experts from Intel and Supermicro will discuss motivations behind Intel® Rack Scale Design software foundation and the unique benefits Supermicro RSD brings to cloud service providers, telecoms, and Fortune 500 companies to build their own agile, efficient, software-defined data centers.
  • Turning Vision into Reality: Openbravo Product Roadmap for Specialty Retailers
    Turning Vision into Reality: Openbravo Product Roadmap for Specialty Retailers Maarten Tromp, Director of Product Management at Openbravo Recorded: May 25 2017 56 mins
    In this webinar you will learn about the business drivers for Openbravo’s Retail First strategy and understand how these translate into tangible product innovations designed to give retailers a competitive edge. We will describe the enhancements already delivered as part of our Strategic Technology Roadmap and discuss the product innovations currently being developed for future releases of our software.
  • Next-generation Security for the Public Cloud
    Next-generation Security for the Public Cloud Matt Keil, Director of Product Marketing at Palo Alto Networks Recorded: May 25 2017 60 mins
    As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

    Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

    The webinar will cover:
    • Overview of the VM-Series next-generation firewall
    • How the VM-Series prevents cyberattacks in the public cloud
    • Key differences between the VM-Series and other cloud security offerings
  • How to Develop a Container Migration Strategy for your Organization
    How to Develop a Container Migration Strategy for your Organization Eric Sauer, Red Hat Consultant, Architect, PaaS & DevOps Recorded: May 24 2017 49 mins
    In the next 2 years, over 90% of organizations will make net new investments in technologies, like containers, that facilitate DevOps. But as more organizations consider container adoption, a sound approach to workload migration is necessary to ensure the successful introduction of a container-based Platform-as-a-Service (PaaS).

    In this webinar, you'll learn the essentials for building a successful container migration strategy, including how to:

    -Evaluate and understand the value and impact of PaaS in your organization
    -Devise a migration vetting process
    -Create a migration plan to optimize business value
    -Use lessons learned from other organizations
  • Connected Healthcare: How to Prepare for Future Bandwidth Demand
    Connected Healthcare: How to Prepare for Future Bandwidth Demand Susan Larson, Marketing Communications Manager Recorded: May 24 2017 27 mins
    The healthcare sector is experiencing explosive growth in bandwidth demand. From transmitting MRI images to wearable devices to video consultations, networks must work at higher-than-ever speeds to deliver services that ensure patient safety. It’s clear that this demand will continue to grow exponentially, putting more and more strain on your network infrastructure. Topics to be covered include:

    - How IP convergence is driving explosive growth in bandwidth demand, particularly in the healthcare sector
    - Healthcare requirements and trends that are contributing to ever-increasing need for more bandwidth
    - Cabling best practices that will help you avoid costly mitigation and/or reinstalls in the future
  • Bigger, better, faster subscription commerce growth
    Bigger, better, faster subscription commerce growth Emma Clark, Senior Product Manager, Recurly Recorded: May 24 2017 60 mins
    Better, stronger, faster subscription commerce growth

    The value of a subscription business model is its consistency: predictable revenue to lifetime customer value, you've got a solid foundation to start seeing incredible growth—and that comes directly from becoming the 6 million dollar man of customer acquisition.

    That's where the subscription model delivers another distinct advantage: The capability to identify your most profitable customers, and the technology—a wealth of key data about marketing, customer and billing events—right at your fingertips.

    Now how do you turn that data into insights to optimize subscriber acquisition and accelerate your business growth up to 60 mph or more? Join this interactive VB Live event to learn how, plus tap into the latest research and benchmarks on key subscriber acquisition metrics.

    In this webinar, you'll:

    * Identify the most effective subscription plans and promotions
    * Compare your trial program performance against industry benchmarks
    * Use best practices to create a frictionless subscription experience
    * Capture the key metrics for measuring acquisition performance--plan performance, MRR, LTV and more.

    Speakers:

    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
    * Emma Clark, Sr Product Manager, Recurly

    Sponsored by Recurly
  • What Makes a Storage Solution TRULY  Software-Defined?
    What Makes a Storage Solution TRULY Software-Defined? Scott Sinclair, Senior Storage Analyst, ESG's Enterprise Strategy Group & Ashok Rajagopalan, Head of Product at Datera Recorded: May 24 2017 59 mins
    It seems like every storage company these days is talking about software-defined storage (SDS)… and for good reason. Software-defined storage provides transformational benefits for companies on a wide scale. For IT organizations, SDS technology enables infrastructure to scale to meet modern data demands, while reducing cost, improving hardware flexibility, speeding deployments, and dramatically simplifying storage infrastructure management.

    Register for a chance to win an Apple Watch 2.

    As excitement mounts around SDS, a wide variety of storage industry solutions have begun leveraging the term. Some solutions, however, may not deliver all the expected benefits of SDS despite leveraging the name. The result has generated some confusion that in turn may lead some to delay SDS-based deployments. In response, it is important to understand what SDS technology provides in order for the technology to be effectively leveraged to transform IT infrastructure.

    In this session, we will discuss:

    - What constitutes SDS technology, and more importantly how to identify solutions that may leverage the term but may not meet expectations
    - What benefits your organization should expect from SDS technology
    - What advanced capabilities and features to look for in order to ensure that your organization is able to maximize the benefits of SDS.

    Join Enterprise Strategy Group and Datera to learn how to understand software-defined storage and the transformational benefits it provides.
  • Delivering the value of IoT in the retail industry
    Delivering the value of IoT in the retail industry Paul Edrich, CTO of IMS Evolve & Tom Hurlbut, Strategist Executive at Dell Recorded: May 24 2017 62 mins
    IoT is being embraced by an increasingly diverse set of sectors and one which is reaping the benefits is the retail sector, specifically supermarkets and how they are using data in cold-chain (refrigeration) solutions. For this webinar, join Paul Edrich, CTO of IMS Evolve, who is helping major supermarket chains to manage billions of data points in real time to inform operational processes, reduce energy consumption and increase product quality.

    This webinar will include the following topics:

    - Refrigeration and IoT: problems, new industry trends and benefits
    - What IMS Evolve does to solve the problem
    - The technologies enabling their solution today
  • APT32: New Cyber Espionage Group
    APT32: New Cyber Espionage Group Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company Recorded: May 24 2017 57 mins
    Learn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How your organization can improve your ability to detect, prevent and remediate APT32 attacks
  • Journal Entry: Curing Common SAP Financial Pains with Excel
    Journal Entry: Curing Common SAP Financial Pains with Excel Melissa Neil - SAP Product Manager, Simon Parkes - SAP Solution Consultant Recorded: May 24 2017 59 mins
    Are you or your finance users struggling with time constraints in entering manual FI/CO type entries into SAP? Are you limited by your current financial custom uploading tool? Don’t worry, there is a cure.

    Entering financial or journal entries into SAP efficiently is essential to managing all aspects of your business, yet manually keying all those entries (one line at a time) into inflexible SAP T-code entry screens can be time consuming and painful. The IT Department can build your staff a home-grown custom loader for loading journal entry information into SAP; however, these batch loaders tend to be limited and inflexible, don’t handle errors well, and require ongoing IT support and maintenance. It is merely a band aid to a larger issue.

    GLSU is an Excel add-in for uploading financial data into SAP. It streamlines financial data entry and reporting without the dependency on IT making it the ultimate cure. Additional GLSU features include:
    1. Park and Post all from Excel
    2. Sophisticated error handling and business logic
    3. Excel templates created and modified in seconds with no programming or scripting.

    Attend this webinar to learn:
    • What current SAP financial uploading tools are often used today
    • The limitations for SAP users in their current FI/CO entry process
    • How GLSU, a financial spreadsheet uploader for SAP, can help reduce the manual waste and increase efficiency.
  • Generating Insights from IoT Data Using Amazon Machine Learning
    Generating Insights from IoT Data Using Amazon Machine Learning Neeraj Kumar, Solutions Architect, AWS Recorded: May 24 2017 34 mins
    If you knew the state of everything in the world, and could apply logic on top of the data, what problems could you solve?

    AWS IoT Services help you collect and send data to the cloud, make it easy to load and analyse that information, and provide the ability to manage your devices, so you can focus on developing applications that fit your needs.

    Amazon Machine Learning is a service that makes it easy for developers of all skill levels to use machine learning technology. Amazon Machine Learning provides visualisation tools and wizards that guide you through the process of creating machine learning (ML) models without having to learn complex ML algorithms and technology.

    In this webinar, Neeraj explains how you can use AWS IoT and Amazon Machine Learning together to build smart IoT applications. We will demonstrate how to setup Amazon Machine Learning, create and train Machine Learning models for your applications. We will then use these models in our IoT Applications, in real time.

    Learning objectives:

    - Understand why you may use Amazon Machine Learning with IoT and how to set it up.
    - Understand how to use IoT Rules Engine
  • Bizagi  - The Digital Business Platform Demonstration
    Bizagi - The Digital Business Platform Demonstration Laurie Sinnett, Senior Consultant, Bizagi Recorded: May 24 2017 61 mins
    Watch a demonstration of an end to end loan application built with Bizagi. The demonstration will show you how you can deliver a customer experience across multiple channels both from the perspective of the customers and the employees. Also, walk you through the process model for this application, designed in the Bizagi Modeler.

    Bizagi is a digital business platform that wraps around existing legacy systems to transform organizations into agile, engaging and connected digital businesses. The platform comprises of Bizagi Modeler to design the process models, Bizagi Studio to turn process models into running applications and Bizagi Engine to run the applications enterprise-wide.

    Headquartered in the UK with customers across the world, Bizagi is a global leader in digital business platforms. With a global user community of over 650,000 process pioneers, Bizagi has helped over 500 enterprises in 50 countries to survive and thrive in the digital age.

    For more information, please visit www.bizagi.com
  • Application & Middleware Services in a Container Environment
    Application & Middleware Services in a Container Environment James Falkner, Technical Marketing Manager, Red Hat Recorded: May 23 2017 64 mins
    Developers must often build and deploy applications that rely on isolated products. Instead of focusing on development, they find themselves worrying about the deployment and management of underlying services, as well as the configuration of historically error-prone areas like clustering, resource constraint tuning, and software updates.

    Red Hat addresses this challenge by making its middleware portfolio available as containerized services, transforming them from isolated products to integrated application services running in a managed container environment.

    Join this webcast to learn how to quickly and easily build a wide range of application types using Red Hat® JBoss® Middleware as containerized services on Red Hat OpenShift Container Platform.
  • Cloud First: A New Competitive Advantage for Modern Enterprises
    Cloud First: A New Competitive Advantage for Modern Enterprises Todd Bernhard, Product Marketing Manager, CloudCheckr Recorded: May 23 2017 19 mins
    The cloud has the potential to eliminate overhead, waste, security risks, and human error, without the hassles of running a traditional data center. Savvy enterprises are taking a “Cloud First” approach to computing resources as a major competitive advantage, enabling organizations to stay lean and increase operational efficiencies, mitigate risks, and save money as they grow.

    During this webcast, CloudCheckr Product Marketing Manager Todd Bernhard will uncover why and how modern enterprises are transitioning to a Cloud First approach, including:

    - Going all-in with the cloud as a major competitive advantage

    - Understanding the differences between on-prem vs. operating in the cloud

    - Choosing the right cloud management tools to gain complete visibility
  • Conversational Technologies- The Catalyst For Customer Service Experience
    Conversational Technologies- The Catalyst For Customer Service Experience Sheryl Kingstone, 451 Research; Jordi Torras, Inbenta; & Phil Jennings, Ticketmaster Recorded: May 23 2017 56 mins
    The shift of customer service from a cost center to an engagement center will spur investments in more intelligent automation and conversational approaches to service and commerce. With 76% of customers preferring digital channels to communicate with businesses, and roughly 40% choosing to chat with a business through SMS, social media or Facebook messenger, conversational technologies have forever changed the customer service experience. Learn first-hand, from industry peers, how smart chatbots are improving how businesses converse with customers, and nurture relationships across the customer journey.

    Join the 451 Group, Ticketmaster and Inbenta for this session to discover how:

    •Digital engagement will shift commerce and service from interactions to conversations [The 451 Group predicts that 80% of all customer interactions will eventually be contained in a self-service channel].

    •Customers want self-service options on their own terms, in their preferred channels, including SMS, web or mobile chat. [The 451 Group data shows 55% of survey respondents prefer self-serve tools to avoid calling a customer service agent]

    •How businesses like Ticketmaster leverage enterprise-class chatbots; key factors to include and what to to avoid when launching a chatbot pilot [55% of companies employ self-service solutions; and 26% say they plan to build a chatbot as part of their self-service strategy]
  • Inside The New Generation of Phishing Attacks
    Inside The New Generation of Phishing Attacks Michael Landewe, Researcher, Avanan Cofounder Recorded: May 23 2017 37 mins
    What we know and have trained users about phishing attacks has changed. Old methods no longer apply.

    IT teams have deployed filters and taught our users to detect phishing attacks by scanning for suspicious URLs, spoofed login pages, and unrecognized senders. We've told people to change passwords, turn on two factor authentication and watch for suspicious logins.

    None of these methods can defend against the next generation of automated, malicious API-based phishing attacks that are invisible to users and unmonitored by SaaS.

    Once exclusive to advanced state-sponsored actors, the recent Google Docs worm pushed this sophisticated method into the headlines.

    In this webinar we will dig deep into the next generation of phishing attack and describe the new methods every IT team must deploy to defend against them. Because the vulnerability is not unique to Google, we will also discuss Office 365, Box, Salesforce and other popular business apps.
  • Credential Theft:  A Perspective From the FBI & Unit 42 Threat Intel Team
    Credential Theft: A Perspective From the FBI & Unit 42 Threat Intel Team SSA John Caruthers, FBI & Jen Miller-Osborn Palo Alto Networks Recorded: May 23 2017 62 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join the FBI and our own Unit 42 threat intelligence team as they present their insightful perspective on the cyberthreat landscape in 2017, with an emphasis on credential-based attacks and phishing. In addition to presenting their unique attack lifecycle, they will:

    * Identify trends and techniques in methods used for credential theft and abuse.
    * Review how cybercriminals have changed their tactics to compromise networks.
    * Examine who is being targeted, and why.
    * Discuss techniques to stop credential leakage.
    * Review the FBI’s role in combating this destructive attack.

    Defending against cyberattacks is tough enough, especially when attackers pose as authenticated users on your network.

    Join the FBI and Palo Alto Networks® Unit 42 to learn what to do when you discover intruders on your network, and how to prevent their attacks from succeeding