Hi [[ session.user.profile.firstName ]]

Securing Your Applications – Get Started Now

Today’s headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications. If your organization hasn’t gotten started yet in the area of application security – in spite of the dynamic nature of
Today’s headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications. If your organization hasn’t gotten started yet in the area of application security – in spite of the dynamic nature of the application security threat landscape, the size and diversity of your application software portfolio, and the significant financial impact of the average application security-related incident – do it because of the positive impact on your bottom line. This web seminar will outline and provide tangible directives for you to build and execute an Application Security initiative.
Recorded Oct 27 2011 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Derek Brink, VP
Presentation preview: Securing Your Applications – Get Started Now
Recommended for you:
  • Date
  • Rating
  • Views
  • Financial advisors espouse that proper asset allocation during times of market volatility can help us sleep better. There is a parallel in the IT world. With volatility driven by technology advancement, virtual & cloud environments, and consumer demand for the newest applications and hardware, a good night’s sleep for an Asset Manager requires properly managed and optimally allocated hardware and software assets in a constantly changing environment.

    This session explores this intimidating world, common pitfalls, prescriptive actions and what the latest technology can do to make sure your assets, licenses and infrastructure are optimally aligned to drive wealth in IT…and let the Asset Manager sleep well without the fear of negative audit findings and exorbitant fines.
  • Making the transition from service provider to trusted adviser to the C-Suite can be a difficult task. Join Jeanne Morain with special guests Lorenzo Hines (Executive Citi) and Marco Bussadori (GM BMC Software) as they provide prescriptive guidance on aligning Technology and Business initiatives. This session will explore use of mobility and the growing dependency on it as a use case to bridge the chasm between technology leaders and their counterparts based on common ground.
  • The business trust in IT starts in how it sees IT lead the evolution toward digital systems. If your Self-Service Catalog is simply a listing of information with a basic request portal, adoption and reputation are at risk. ITSM Expert Matt Hooper will discusses how modern self-service systems are focused on creating a delightful user-experience. How the under-pinnings of this experience must leverage modern digital transformation techniques, in order to be truly transformative to how the organization works faster, increases knowledge sharing, and leverages human performance to drive business performance.
  • Radio Resource Management (RRM) is a feature that automates access point (AP) power and channel configuration. Most enterprise and mid-market Wi-Fi infrastructure providers have this feature, and Wi-Fi engineers are divided on whether or not RRM is beneficial and/or trustworthy, given the extremely diverse range of deployment models and RF environments. In today's market, network stability, dependability, and low TCO are paramount. This presentation takes a comprehensive look at RRM, providing attendees with both immediately useful and longer-term reference information.

    Join NetScout and Devin Akin as we deep-dive on this controversial topic.

    Devin Akin is the founder of Divergent Dynamics, a Wi-Fi Systems Integrator, Value-Added Reseller (VAR), and Training organization. Akin has over 20 years in IT, with 15 years in WLAN specifically, and was recently named to the TWW Top 100 Wireless Technology Experts list for 2014.
  • After a record-setting year in 2015, where will the tech M&A market go in 2016? What trends that pushed M&A spending to its highest level since the Internet Bubble burst will continue to drive deals and which ones will wind down? What other sectors are likely to see the most activity this year? And most importantly, what valuations will be handed out in deals over the coming year? Drawing on data and views from across 451 Research, the Tech M&A Outlook webinar maps many of the major developments in the IT landscape (IoT, Big Data, cloud computing) to how those influence corporate acquisition strategies. Join us for a look ahead to what we expect for tech M&A in 2016.
  • Hear about Playtech’s story of a successful deployment of predictive analytics monitoring method. Playtech implemented the Predictive Analytics as a complementary monitoring to allow additional fault detection in places where standard monitoring can’t be applied. Using its business activity as a health indicator, problems are detected faster, sooner and even before it gets to a complete downtime.

    Join us to hear about:

    How monitoring your business metrics can provide another method of monitoring

    How Predictive Analytics can help detect faults

    Why dynamic thresholds can be better than static thresholds.

    How easy it is to implement Predictive Analytics and help reduce the MTTR in your organization
  • Corporations increasingly rely on their enterprise services bus (ESB) as the communication center to link multiple IT systems, applications and data. Unfortunately, when something goes wrong in the ESB it can have a cascading affect, impacting critical applications. Determining the root cause of the problem is a challenge for most IT organizations, since ESBs serve as a ‘black box’, offering little insight into the issue.

    Now, you can assess and resolve performance issues for applications that communicate across your ESB, before they affect your users. Join Richard Nikula, Vice President, Product Development and Support at Nastel, to learn how Nastel AutoPilot for CA Cross-Enterprise APM lets you analyze application behavior in real-time in production, test and development environments.
  • It’s 2016. If you were born after 1980, you probably don’t remember a time without the Internet and the Web. You reach for your smartphone as your go-to device to answer questions, order pizza, find the score of a football game, and check the address of your child’s next soccer game.

    It should come as no surprise, that you reach for your smart phone or use your browser at work to search for an answer when you have a technical issue. The bottom line is that more and more business users are bypassing the service desk and the self-service portal because they believe they can get answers quicker on the web.

    Could this be the beginning of the end for IT Self Service as we know it? Join George Spalding, EVP, Pink Elephant and Jim Blayney, Sr. Product Marketing Mgr. CA Technologies, as they tackle the thorny and divisive issue of whether it’s actually more productive for users to get their own solutions from the web.
  • Please join the DevOps / Agile CoI for a BrightTalk Session, “Enterprise DevOps – Lessons Learned”, scheduled for 1PM EST on Wednesday, January 27, 2016.

    DevOps is a cornerstone to concepts used to drive the implementation, with continuous integration and delivery as methods to deliver the actual solution. In a large enterprise, there are many front-end and back-end systems/processes that need to "talk". This presentation focuses on highlighting and breaking down the silos that exist in order to redirect energy and attention on (the more important) outcomes that are generated from lighter methods to delivery IT systems. This includes establishing similar light weight methods for all groups in the organization to publish updates and changes in the environment with, again, a focus on the values, practices, and outcomes.

    Jason Walker, the Lead DevOps Engineer at Target Corporation, will discuss many of the lessons learned and best practices during the adoption of DevOps at Target.
  • APIs have become a strategic necessity for your business because they facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. We will explore in depth the main security concerns API providers and consumers need to consider and how to mitigate them.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Your Applications – Get Started Now
  • Live at: Oct 27 2011 5:00 pm
  • Presented by: Derek Brink, VP
  • From:
Your email has been sent.
or close
You must be logged in to email this