Hi [[ session.user.profile.firstName ]]

IT Service Management

  • A predictive cybersecurity approach to ransomware protection
    A predictive cybersecurity approach to ransomware protection Charles Lim: - Frost & Sullivan; Zhanwei Chan - Dimension Data; Kevin Leahy - Dimension Data; Al Huger - Cisco Recorded: Oct 17 2017 52 mins
    We invite you to join Frost & Sullivan and our panel of experts as they discuss the growing threat of ransomware, and provide practical advice on raising your cybersecurity defences using a predictive cybersecurity approach to ransomware protection.

    Panel of speakers

    Charles Lim: Industry Principal - Cybersecurity Practice, Frost & Sullivan
    Zhanwei Chan: Group Security Senior Product Manager, Dimension Data
    Kevin Leahy: Senior Vice President, Data Centre, Dimension Data
    Al Huger: VP Engineering - Security, Cisco
  • What is Modern Service Management? with John Clark
    What is Modern Service Management? with John Clark IT Chronicles Media Recorded: Oct 16 2017 11 mins
    Modern Service Management is not another framework, or set of books or IP. It is designed to enable ITSM professionals to focus on business outcomes.
  • Service Asset and Configuration Management – Experiences from implementation
    Service Asset and Configuration Management – Experiences from implementation Lari Peltoniemi Recorded: Oct 13 2017 59 mins
    Service Asset and Configuration Management (SACM) has been in the core of IT Service Management since the very beginning. As the world changes and different isms come and go, SACM not just remains important but it becomes ever more important. In this presentation we will cover experiences from implementing SACM as well as look to future via fresh perspectives e.g.:
    - How SACM is key capability when doing Service Integration and Management;
    - How Agile method ideas and SACM fit together;
    - How evolvement of technology has affected the perspective what needs to be managed with SACM;
    - How SACM is one of the best friends of Privacy and the coming GDPR legislation;
    - What are the current challenges in developing SACM and getting the benefits.

    SACM is even more relevant today as it was before. As the world changes also SACM needs to develop. Welcome to hear fresh thoughts about hoe to manage the core information that your IT Service Management runs on.

    Presenter's bio:

    Lari Peltoniemi has worked within IT Service Management for 15 years and 12 years of that with Service Asset and Configuration Management. He has helped both IT Service consumer and IT Service Provider companies and organizations to successfully utilize SACM to enable it ITSM, IT and Business goals of organization. Lari has worked with many of the major tools and his expertise covers industries widely from MSP IT service providers, Telecom, Banking and Finance, Energy, Education and Public Sector. Lari works as consultant and trainer on ITIL, CMDB and ITSM area in general.
  • Cloud Leaders Panel: Expert Insights for Developing a Cloud-First Approach
    Cloud Leaders Panel: Expert Insights for Developing a Cloud-First Approach Bob Hale: CEO at Alterian, Mike Pinch: CISO at University of Rochester, Dan Wacker: CFO, ClubReady Recorded: Oct 12 2017 49 mins
    Cloud adoption represents a major IT transformation, a shift in culture and a new way of financing your infrastructure. It presents new cost and security challenges, requiring governance and control across the organization. And it also needs a proactive team to take ownership and direction of the migration process.

    In this Cloud Leaders Panel: Industry Perspectives from a CEO, CISO, & CFO, Steve Hall, VP of Marketing at CloudCheckr, will be joined by Bob Hale - CEO at Alterian, Mike Pinch - CISO at University of Rochester, and Dan Wacker - CFO at ClubReady. During this interactive discussion, we’ll uncover what the cloud means to each panel expert from their own unique perspective and learn what the key drivers are to successfully shift an organization to a cloud-first approach.
  • DevOps Automation - The real business value - Steve Brodie
    DevOps Automation - The real business value - Steve Brodie IT Chronicles Media Recorded: Oct 12 2017 12 mins
    Steve Brodie talks about how to create a simple, repeatable way to collect and view information from any DevOps tool along the pipeline in the context of a single release, and deliver metrics that provide real business value.
  • How To Map Applications & Infrastructure for GDPR, Change control and Risk
    How To Map Applications & Infrastructure for GDPR, Change control and Risk David Cuthbertson Recorded: Oct 12 2017 46 mins
    David Cuthbertson will show you methods and techniques to help achieve a baseline map of your IT systems, supporting not just GDPR issues but also change control, operational management and risk assessment.
  • Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments
    Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments Kelly Morgan, Research VP, Services at 451 Research; Nathan Vandenberg, GM, Data Centre at Dimension Data Recorded: Oct 12 2017 50 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?

    Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.

    Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.

    We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.

    Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
  • How to Effectively Upgrade from SQL Server 2008
    How to Effectively Upgrade from SQL Server 2008 Jeff Duncan, Senior Tier 3 SQL DBA Recorded: Oct 11 2017 59 mins
    The end of Extended Support for SQL Server 2008 and 2008R2 is coming faster than you know, as of July 2019. It’s important that your organization takes the necessary steps so you’re prepared for the migration.

    A database migration is not always straightforward and requires preparation, testing and implementation and these processes could take up to 9 months depending on environment size.

    In this webinar, Jeff Duncan will discuss the steps that you need to ensure that you have the smoothest migration to the SQL Server 2016 and beyond.
  • How Performance Management can Drive Growth & Loyalty: An Allscripts Case Study
    How Performance Management can Drive Growth & Loyalty: An Allscripts Case Study John Worthington, Director of Product Management at eG Innovations and Mike Montano, CDO of Strategy at Allscripts Recorded: Oct 11 2017 61 mins
    In a fast-moving, 24/7 healthcare environment, doctors and nurses cannot afford any impediments to delivering the best possible patient care. To ensure that the hospitals, physicians, nurses and other care providers it serves receive the best client experience possible, Allscripts offers a proactive application monitoring service that checks for potential problems that could slow down or disrupt the use of its mission-critical healthcare IT systems.

    Initially launched in 2006, the proactive support offering monitors clients’ IT infrastructure and use of Allscripts solutions. Since its introduction, Allscripts has been able to improve client experiences in a way that has had a significant impact on business growth and client retention.
  • The Service Desk on the Front Lines of Cyber-Resilience
    The Service Desk on the Front Lines of Cyber-Resilience Bob Rice Recorded: Oct 11 2017 61 mins
    Don’t be the next news headline!

    Recent theft of business critical information occurred because a Service Desk provided information to a cyber-crook that allowed access to internal business critical servers. The information stolen could impact national security interests.  Why did that happen?  How could it happen? Expensive technology did not stop this breach. How could the Service Desk have been better prepared?

    Security breaches and the theft of intellectual property and personal and financial information are too common. The service desk is KEY to ensuring the early detection of security events and providing the first-line response. So what role should the service desk play in early identification of security events, and how can the service desk best be prepared to respond?

    Are there best practices to provide guidance to develop robust cyber-protection? This session explores cyber-resilience best practices and the impact the service desk plays in response and cyber-resilience.
  • Why Boeing, Vodafone, SPAR and many others love Operations Bridge and What’s New
    Why Boeing, Vodafone, SPAR and many others love Operations Bridge and What’s New Harald Burose and Ian Bromehead Recorded: Oct 11 2017 76 mins
    As a retailer SPAR has solved their issues with web store rollout. Vodafone reduced events by over 80%. Boeing evolved most of the users from OM to Operations Bridge in less than 3 months. They have all gained visibility, focus on the right IT issues impacting business, and moreover autonomous operations. They profit from the high degree of automation that the Operations Bridge brings as well as the significant way it helps integrate their tools and data into a single service driven prioritized view.

    To launch this SIG, we’ll show you some of their work and the benefits gained. We’ll introduce you to the latest version of Operations Bridge, speak about the containerized version and its roadmap within the new Micro Focus branded software company. All this should inspire many questions for a lively SIG session, one of many more to come.

    Agenda:

    •Operations Bridge Action – success stories
    •What’s new in today’s version 2017.08
    •The roadmap
    •What’s coming up events, sessions, activities and where to get more information
    •Q&A
  • APT33: Panoramica FireEye sulle attività cyber iraniane
    APT33: Panoramica FireEye sulle attività cyber iraniane Gabriele Zanoni, Systems Engineer, FireEye Recorded: Oct 11 2017 49 mins
    Le recenti investigazioni condotte da Mandiant, la divisione di Incident Response di FireEye, combinate con le analisi del nostro servizio di Threat Intelligence iSIGHT, hanno fornito una panoramica completa sulle attività di un gruppo di Cyber attaccanti iraniani operante dal 2013.
    Durante il webinar, spiegheremo come questo gruppo di attaccanti sia stato coinvolto in attività di cyber spionaggio al fine di raccogliere informazioni strategiche di intelligence da aziende nel settore dell’aviazione e dell’energia, con il fine ultimo di mettere le informazioni trafugate a disposizione di uno sponsor statale o militare.
    Registrati al webinar per saperne di più!
  • How to Shift Left with IT Service Management
    How to Shift Left with IT Service Management Jarod Greene, Vice President of Product Marketing - Cherwell Software Recorded: Oct 10 2017 43 mins
    What if a single shift to your ITSM approach could reduce costs, increase user satisfaction, and improve service delivery?

    “Shift left” is that strategy. Join us to hear how this powerful technique for resolving issues as close to the end user as possible enables you to:
    •Start with self-service – then add automation, knowledge mgmt., and even AI
    •Increase productivity by using resources in the best possible way
    •Boost operational efficiency for time and cost savings
    •Measure and analyze your shift-left initiative
    •Improve ROI for both people and technology

    Accelerate ITSM transformation with a new approach.
  • Agiloft ITIL Service Desk Suite - Short Demo
    Agiloft ITIL Service Desk Suite - Short Demo Agiloft Recorded: Oct 10 2017 3 mins
    Awarded "Best Overall Value" from Info-Tech Research Group for the 3rd year in a row, Agiloft provides the fastest time to value because it slashes the time to configure the solution to your requirements. We can customize it for you live during the demo -so you get a trial system that you can actually use and a fast, affordable deployment. Agiloft addresses even the most sophisticated requirements in record time. Start today with a free custom demo.
  • Benchmarking Roundup: Summary of 2017 Service and Support Benchmarks
    Benchmarking Roundup: Summary of 2017 Service and Support Benchmarks Jeff Rumburg, Managing Partner at MetricNet Recorded: Oct 10 2017 64 mins
    Many Service and Support professionals are unfamiliar with the key performance indicators (KPIs) that are important to track and trend and even fewer are aware of what constitutes acceptable performance. In this session, Jeff Rumburg will share the results of MetricNet’s 2017 Global Benchmarking Initiative for Service and Support, discuss the methodology, define the KPIs used for benchmarking, and share performance data from more than 140 companies worldwide.
  • iSpeak Cloud:  Tips and Tricks on migrating to AWS
    iSpeak Cloud: Tips and Tricks on migrating to AWS Jeanne Morain, Roger Eisentrager, Paul Mangione Recorded: Oct 10 2017 29 mins
    Many fortune 200 CEOs are considering a bold move to all "public" cloud or virtual private cloud environment. How do you plan a successful migration to AWS? Join Jeanne Morain with special guest Roger Eisentrager as they way the pros and cons on their cloud migration journey.
  • Network ‘Quick Fix’ – 5 minute troubleshooting tricks with OptiView XG
    Network ‘Quick Fix’ – 5 minute troubleshooting tricks with OptiView XG Tony Fortunato, Senior Network Performance Specialist with The Technology Firm Recorded: Oct 10 2017 57 mins
    Join Tony Fortunato, Senior Network Performance Specialist with The Technology Firm for an hour of networking troubleshooting, tips and tricks.
    Troubleshooting performance problems in today’s networks is only getting more complex:

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Tony will be using the OptiView XG on a live network to show you how to do many baselines, tips and tricks that take 5 minutes or less of your time. We will covering topics such as; the value of SNMP, wireless, documentation, dependency analysis, packet capture and traffic generation. Tony will also take questions from the audience as well as review any emails or questions from the last session.

    This session is informative for either the Network novice or the seasoned veteran.
  • Retail Survival in the Age of Digital Disruption
    Retail Survival in the Age of Digital Disruption Sheryl Kingstone 451 Research, Sudesh Girdhari CenturyLink Recorded: Oct 10 2017 57 mins
    Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.

    The retail industry is bursting with digital innovation driving change. This session will review:
    •How differentiation demands digital maturity
    •Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
    •The role of cloud services and its impact on customer experience, agility, efficiency and risk
  • The Fixer Bites Back Against Hackers like The Wolf with HP Secure Print Services
    The Fixer Bites Back Against Hackers like The Wolf with HP Secure Print Services Jonathan Banks, Actor Recorded: Oct 9 2017 2 mins
    After The Wolf brings down a hospital, The Fixer (Jonathan Banks) shows them how to bite back with help from HP Managed Print Services.

    HP Secure Managed Print Services:

    - Works to identify your risks, then develop and implement a custom print security policy and plan
    - Manages your print security from device hardening to deploying advanced security solutions to address people, processes and compliance requirements
    - Helps secure your fleet with the industry’s strongest print security protections
  • The Fixer Stops Hackers like The Wolf in their Tracks with HP Print Security
    The Fixer Stops Hackers like The Wolf in their Tracks with HP Print Security Jonathan Banks, Actor Recorded: Oct 9 2017 2 mins
    The Fixer (Jonathan Banks) is here to put The Wolf on a leash with an HP Enterprise printer featuring Run-Time Intrusion Detection that is constantly protecting against malware attacks.

    HP Run-Time Intrusion Detection:

    - Monitors complex firmware and memory operations, automatically stops the intrusion and reboots in the event of an attack
    - Protects HP business printers from becoming an entry point for attacks on your network
    - Offers the only real-time detection, automated monitoring, and built-in software validation to stop threats the moment they start
  • The Fixer is Here to Tame Hackers like The Wolf with HP SureStart Print Security
    The Fixer is Here to Tame Hackers like The Wolf with HP SureStart Print Security Jonathan Banks, Actor Recorded: Oct 9 2017 2 mins
    Armed with an HP Enterprise printer featuring HP Sure Start self-healing BIOS protection, The Fixer (Jonathan Banks) is going to make sure The Wolf never leaves a scratch on this place again.

    HP Sure Start:

    - Protects against malware by detecting, stopping, and self-healing from BIOS attacks
    - Prevents the execution of malicious code during bootup by allowing only HP-signed, genuine code to be loaded
    - Restarts with a safe “golden copy” of its BIOS, if compromised
    - Is the industry’s only self-healing BIOS
  • Security, the importance of a human-centric approach. Brandon Swafford
    Security, the importance of a human-centric approach. Brandon Swafford IT Chronicles Media Recorded: Oct 6 2017 12 mins
    As traditional security perimeters dissolve, companies are becoming more reliant on human-centric cyber security systems that can protect their most valuable assets at the intersection of users, data & networks.
  • Managing iOS 11 and macOS High Sierra Upgrades
    Managing iOS 11 and macOS High Sierra Upgrades Nick Thompson, Product Manager, Jamf Recorded: Oct 5 2017 47 mins
    Are you ready for macOS High Sierra, iOS 11 and tvOS 11? These new operating systems are here and chocked full of exciting productivity features that your users can’t wait to get their hands on. To help you empower the masses and seamlessly upgrade all of your devices, Jamf Pro offers same-day support for each new Apple OS and ensures management continuity throughout the process.

    In our webinar, Managing iOS 11 and macOS High Sierra Upgrades, we’ll walk you through the upgrade process, explain best practices to follow and point out “gotchas” you’ll want to avoid.

    You’ll learn:
    •What’s new for IT management in iOS 11 and macOS High Sierra
    •How to leverage inventory data to prepare for upgrades
    •Strategies for best rolling out your OS deployments

    Presenter Info:
    Nick Thompson, Product Manager, Jamf

    Nick Thompson is on the product team at Jamf, an Apple device management solution for IT professionals. Nick is passionate about technology in the enterprise and closely follows the enterprise mobility management industry. He previously worked at Apple helping companies implement Mac and iOS deployments.
  • Security compromise is inevitable, but breaches can be stopped. Ashwini Almad
    Security compromise is inevitable, but breaches can be stopped. Ashwini Almad IT Chronicles Media Recorded: Oct 5 2017 15 mins
    Attacks are getting more sophisticated and more targeted. Endgame takes a different approach to security and extends traditional anti virus protection from malware, to exploits, malwareless attacks, and ransomware. Ashwini speaks to the 10 in tech team about the changing nature of security threats.
  • Seus clientes confiam na segurança da sua empresa, produtos e serviços?
    Seus clientes confiam na segurança da sua empresa, produtos e serviços? Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys Recorded: Oct 5 2017 61 mins
    Saiba mais sobre as preocupações dos seus consumidores!

    O Unisys Security Index mede as preocupações dos consumidores em questões relacionadas à segurança nacional, pessoal, financeira e da Internet. O Unisys Security Index mostrou um aumento de 20% na preocupação de segurança geral em 2017. Saiba mais neste webinar onde iremos apresentar os detalhes do estudo e falar sobre como lidar com ameaças cibernéticas, o que os consumidores pensam sobre Internet das Coisas, e como aumentar a confiança de seus consumidores enquanto sua empresa avança na Transformação Digital.

    Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys. Possui mais de 20 anos de experiência no setor de segurança. Na Unisys, ajuda a construir um mundo mais seguro, ao mesmo tempo em que transforma o setor de segurança com uma inovadora abordagem de microssegmentação, bem como a arquitetura de segurança adaptativa e a inteligência de ameaças cibernéticas.
  • Kick-Start your Software Asset Management Practice
    Kick-Start your Software Asset Management Practice Michael Krutikov, Global Product Marketing, Snow Software and Martin Thompson, Founder of The ITAM Review Oct 18 2017 2:00 pm UTC 60 mins
    What is Software Asset Management (SAM) and how can you develop a SAM practice to reduce risk, save money and empower business agility?

    This educational and interactive webinar provides an introduction to SAM for those new to the field. Martin Thompson, founder of ITAM Review, and Michael Krutikov, Global Product Marketing with Snow Software will share how organizations like yours have driven quantifiable efficiencies and delivered ROI by managing their cloud and on-premise software more efficiently.

    Learn the key steps to implementing a best-in-class SAM practice and how to avoid the most common pitfalls when starting a SAM practice.

    During this webinar you will learn:

    •What SAM is and how it differs from basic asset management
    •The ROI you can deliver with a SAM practice
    •Top 3 common hurdles to avoid when starting your implementation
    •Tips to getting your SAM solution started successfully
    •Best practices from other successful organizations such as Carnival and Sky.

    Register today and all attendees will enter a prize draw to win one of 20 free copies of Practical ITAM – The Essential Guide for IT Asset Managers: Getting started and making a difference in the field of IT Asset Management, by Martin Thompson from ITAM Review. Please click here for full terms and conditions http://ow.ly/7sSW30f6b3W
  • Overcoming BizDevOps Challenges to Scale Cloud Strategy
    Overcoming BizDevOps Challenges to Scale Cloud Strategy Jeanne Morain, Rahul Ravulur, Chris Orlando Oct 18 2017 3:00 pm UTC 60 mins
    According to Pulse, over 84% of Digital Transformation efforts are failing. Companies are worried about how they balance legacy systems while keeping pace with new nimble players in the Cloud Era.

    How do you overcome the traditional silos between IT and the business to achieve success in Digital Transformation? What are the challenges politically, technically, and operationally that need to be overcome to turn your cloud vision into transformation reality?

    Join our host Jeanne Morain, Author & Cloud/Digital Strategist and her special guests Rahul Ravulur, Founder & CEO, appOrbit and Chris Orlando, Co-Founder & Chief Sales & Marketing Officer, ScaleMatrix, as they explore the top 5 challenges and solutions both they and/or their customers have faced to achieve success in Digital Transformation, both from an IT and a business management perspective.
  • Cloud Native Enterprise ITOM
    Cloud Native Enterprise ITOM Greenlight Group Oct 18 2017 5:00 pm UTC 60 mins
    Join us for the first in a series of monthly webinars, presented by Greenlight Group, where Micro Focus and Greenlight Group will provide an introductory session of Micro Focus's container orchestrated IT Operations Management platform. In this webinar, Torrey Jones, Greenlight Group Principal Consultant, will talk through the basics of Micro Focus’s cloud native Container Deployment Foundation – a Docker and Kubernetes centric game changing platform for IT Operations Management in the Enterprise. Prior to diving into the topic of the hour, special guest Roy Ritthaler , VP, Marketing, IT Operations Management, will provide a short update of the New, Combined Micro Focus – post merger with HPE Software.
  • Avoid Sticker Shock!  Gain Control of Your Multi-Cloud Costs
    Avoid Sticker Shock! Gain Control of Your Multi-Cloud Costs Shyamal Patel, Product Manager, BMC Oct 18 2017 5:00 pm UTC 60 mins
    With the promise of agility and reduced costs, organizations are counting on cloud computing to help with their digital transformation. Yet organizations continue to get sticker shock when they move applications and workloads from on-premises to public cloud.

    TrueSight Cloud Cost Control provides visibility into current and future costs, simulated migrations and the insight needed for optimization resources. Keep your digital transformation on track by eliminating surprises and wasted operating spend with TrueSight Cloud Cost Control.

    Join this webcast with BMC Software Product Manager, Shyamal Patel, as we discuss how to accelerate your digital transformation and cloud migration strategies without the high price tag.
  • How to Design SQL Server Infrastructures for Optimal Performance
    How to Design SQL Server Infrastructures for Optimal Performance Matt Henderson, Director of Microsoft Technology Oct 19 2017 5:00 pm UTC 45 mins
    Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.

    From this webinar you will learn:

    • How to design SQL server infrastructures for optimal performance
    • How the software and hardware infrastructure affect database performance
    • Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
    • Tools and metrics to find current bottlenecks, inside and outside of the database server
    • Tools and best practices for monitoring all layers

    Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
  • Remote Endpoint Management and PCoIP Management Console
    Remote Endpoint Management and PCoIP Management Console Paul Barrett, Systems Specialist, Teradici Oct 19 2017 5:00 pm UTC 30 mins
    Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.

    During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be.

    The demonstration will cover how to:
    •Configure PCoIP Zero Clients for off-site employees or contractors
    •Determine the best WAN settings to recognize out-of-office devices
  • Ransomware Spotlight
    Ransomware Spotlight Tyler Moffitt | Senior Threat Reasearch Analyst Oct 19 2017 5:00 pm UTC 45 mins
    Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal "business model" in full deployment, with new abilities to move laterally through networks and infect machines previously thought not possible to infect. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.

    At Webroot, we believe it's possible to effectively protect businesses and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into emerging encrypting ransomware variants--and how you can stay ahead.
  • DevOps at Scale: Using AWS & PagerDuty to Improve Growth & Incident Resolution
    DevOps at Scale: Using AWS & PagerDuty to Improve Growth & Incident Resolution Thomas Robinson, Solutions Architect, AWS & Eric Sigler, Head of DevOps, PagerDuty; Christopher Hoey, SRE, Datadog Oct 19 2017 7:00 pm UTC 60 mins
    Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution.

    PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
  • What AI and the Cloud Revolution Mean for Business Communications
    What AI and the Cloud Revolution Mean for Business Communications Curtis Peterson, SVP of Operations at RingCentral Oct 19 2017 7:00 pm UTC 60 mins
    Are you concerned about the advancement of AI and cloud technology and how they will impact your business communications? Or perhaps you’re looking for ways to get your business communications AI ready? If you answered yes to either of these, then save your spot at this webinar now.
     
    The hype surrounding AI and its imminent take-over of the business world is creating a sense of panic. But whereas AI, just like cloud technology, is sure to become a driving force as we look to the future of business communications, there is no need to jump in at the deep end and throw all your resources at it just yet.
     
    Join us for this webinar in which we’ll explain the current state of play for AI (spoiler alert: humans are not going anywhere for a while) and cloud technology and impart some useful ways you can prepare your business communications.

    Chris Peterson, SVP of Operations at RingCentral, will talk you through:
     
    - Key trends in cloud communications
    - The importance of cloud communications
    - Team collaboration
    - Open platforms
    - AI hype vs. reality
    - How your business can create value with AI
  • The Cost of Building a Threat Hunting Team in Your SOC
    The Cost of Building a Threat Hunting Team in Your SOC Stuart Davis, Director, Mandiant Oct 24 2017 9:00 am UTC 45 mins
    At this point your SOC is effectively covering SIEM, IDP, Vulnerability Management and a number of other areas.
    However, the next phase of maturity is to build the APT Threat Hunting capability.

    Join us for a short webinar to discuss the costs of building a hunting team versus buying it.
  • Best Practices for Enterprise Cyber Intelligence Operations
    Best Practices for Enterprise Cyber Intelligence Operations Igors Konovalovs, Strategic Account Manager, GSI Sales Oct 24 2017 11:00 am UTC 45 mins
    Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.

    This webinar explains:

    · Why do organisations require Cyber threat intelligence?
    o To aid technical and business decision making
    o To identify and manage risks
    o To efficiently deploy capital against the threats that matter to enterprise

    · The key requirements for establishing a cyber threat intelligence function
    · Basic cyber threat intelligence workflows
    · Resource and training requirements to support a Cyber Threat intelligence function
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud"
    The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" David Grout, Director, Southern Europe Systems Engineering, FireEye Oct 24 2017 2:00 pm UTC 45 mins
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • Making technology projects succeed
    Making technology projects succeed Micah Garside-White & Ken Laufmann Oct 24 2017 4:00 pm UTC 30 mins
    25% of technology projects fail outright, 20-25% don’t show any ROI, and as much as 50% need massive reworking by the time they are finished.
    Join our open forum, and ask questions as we walk you through what it takes to have a successful a Ticketing Solution. Hear tips, tricks and horror stories from the best.
  • First Impressions are Everything with the Employee Experience
    First Impressions are Everything with the Employee Experience Adam Mason, Tom Sweeney, Meghan Lockwood Oct 24 2017 5:00 pm UTC 60 mins
    Dealing with Employee Onboarding, Tracking, and Provisioning in the Digital Revolution - or Something Better...

    What if you could consumerize the Employee Service experience?

    Making onbaording a breeze for new employees, perhaps even increasing your employee satisfaction score? It's a no brainer right?

    There are a lot of platforms who promise they have the "right recipe" when it comes to HR delivery. Finding out the truth behind a platform can be just as scary as implementing one!

    That's why on Tuesday, October 24th, you should join Adam Mason, VP of Solutions and Innovation, and Tom Sweeney, Bussiness Process Consultant, of Acorio for our October webinar. They'll cover ServiceNow's new product, HR Service Delivery, and help you understand the platform's onboarding experience and what success it can bring to your company's future (and current) employees.

    Find out if your onboarding experience is working.
  • Replace Email, Advance Your Organization
    Replace Email, Advance Your Organization Kyle Shepard Oct 24 2017 6:00 pm UTC 45 mins
    Using email and spreadsheets to manage your help desk is a recipe for mistakes and inefficiency. Can you prioritize CEO requests? Do you know how many password reset requests you receive per month? What is the average time each ticket it open?

    If you’re using email, or even have an outdated on-prem solution, we doubt you can answer yes to all of those questions.

    Join Kyle Shepard, Manager of Customer Success at Samanage, on Wednesday, October 11, at 2p.m. EST, as he discusses:

    • The downfalls of using email
    • How to quickly create workflows to manage requests
    • Reporting available with a modern solution
    • How centralized ticketing moves the organization forward
  • Endpoint Security: No longer taking a back seat!
    Endpoint Security: No longer taking a back seat! Remon Verkerk, Systems Engineer, FireEye Oct 25 2017 10:00 am UTC 45 mins
    Endpoint security has long been an obvious necessity, but mostly proved a resource heavy burden with limited value. The threat landscape has changed and so have the attack vectors. Endpoints are a popular and often easy in to customer networks. This ideal stepping stone needs proper protection and NGAV is no longer sufficient. Privacy laws and regulations demand answers quickly when things go south and data breaches occur. The endpoint is usually a good starting point to provider answers to questions like:

    - Is there command and control activity?
    - Did lateral movement occur?
    - What other systems were accessed?
    - Et cetera…

    This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.

    After this webinar, you will have good understanding of the capabilities on countering attacks on your endpoints, and how Fireeye’s Endpoint Security can be of added value to your organisation.



    -----------------------------------------------------------------------------------------------------------
    Keywords/tags: protection, prevention, detection, hunting, exploit prevention, AV
  • Simplify Threat Response Through Integration & Automation
    Simplify Threat Response Through Integration & Automation Anthony Leigh, Systems Engineer, FireEye Oct 25 2017 1:00 pm UTC 45 mins
    FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.

    In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
  • Digital business in 2018: a year of change ahead
    Digital business in 2018: a year of change ahead Ettienne Reinecke, Chief Technology Officer, & Scott Gibson, Group Executive, Digital Practice, Dimension Data Oct 25 2017 2:00 pm UTC 45 mins
    Digital technologies like AI, automation and blockchain have gone from concept to mainstream over the past 12 months, and in 2018 businesses will start looking at how they can use these to innovate and differentiate themselves.

    In this webinar, our experts will outline the forces that will re-shape digital business in 2018. They’ll also reflect on major trends and milestones from the past 12 months that have set the stage for a year of change ahead.
  • What is Packet Broker 2.0?
    What is Packet Broker 2.0? Stephen Collins, Analyst, ACG and Ann Sun, Director of Marketing, NETSCOUT Oct 25 2017 3:00 pm UTC 60 mins
    Software revolutionized the data center and it’s changing what’s possible when it comes to your packet visibility architecture.

    Tapping into the cost-effective nature of Open Compute platforms, this new generation of software-driven packet brokers promises effortless scalability and pervasive visibility. This is packet broker 2.0.

    Join ACG analyst Stephen Collins and NETSCOUT Director of Marketing Ann Sun, as they delve into this major breakthrough in packet broker technology and explain how you can benefit from it.
    Register now for an insightful hour of discussion that will cover:

    • An analyst overview of the network monitoring landscape
    • What a packet broker 2.0 architecture looks like
    • Deployment scenarios
    • Expert answers to all of your questions
    • And much more…

    Learn how you can take advantage of this evolution in packet broker technology with the latest research from ACG. Register now.
  • Gaining Control of Mainframe Software Monthly Licensing Charges with Dynamic Cap
    Gaining Control of Mainframe Software Monthly Licensing Charges with Dynamic Cap Johannes Peeters, Stefan Kochishan CA Technologies Oct 25 2017 3:00 pm UTC 60 mins
    The promise of achieving Service Level Agreements (SLAs) while also lowering Monthly License Charges (MLC) has quickly captured the attention of global business and IT leaders across multiple industries.
    The dilemma: IT must provide the best possible service to the business, while the business must prioritize cost containment strategies. It's a paradoxical situation.
    Now is the time to move from hype to reality.
    This webcast features a panel of CA and user subject experts that will examine real use-cases. The payoff? How automated, dynamic capacity intelligence helps remove the guesswork from MLC pricing – helping to better predict capacity spikes across the IT landscape - leading to significant savings.
  • Customer Insight: Future-Proof your Colocation Data Center
    Customer Insight: Future-Proof your Colocation Data Center Rhonda Ascierto, Research Director at 451 Research; Greg Jones, VP Strategy - Cloud & SP segment, Schneider Electric Oct 25 2017 3:00 pm UTC 60 mins
    Against the ever-changing and complex hybrid IT landscape, 451 Research surveyed more than 450 colocation customers globally – to understand the changing facets driving colocation demand and how colocation providers can be positioned for success today, and in the future. This research shows that the role of the colocation provider has never been more important – but the threats and challenges will intensify, and the opportunities will be uneven. Led by 451 Research’s Rhonda Ascierto, Research Director – Data Centers, and hosted by Greg Jones, VP Strategy – Cloud & Service Provider segment, Schneider Electric, this webinar will reveal the findings of this research along with actionable guidance colocation providers can use to plan for the future.
  • Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance
    Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance Rodrigo Fontecilla,Vice President and Global Lead for Analytics, Unisys & Maria Allen, Senior Director & Global Head, Unisys Oct 25 2017 4:00 pm UTC 75 mins
    Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.

    About the Speakers:
    Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.

    Maria L. Allen is Senior Director and Global Head of Unisys' Financial Services Portfolio Solutions. In this role, Maria is responsible for building new products and services across all regions, platforms and channels ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives.

    For more information on our Advanced Analytics offerings contact us at advancedanalytics@unisys.com and visit http://www.unisys.com/analytics
  • Building Scalable Data Lakes Powered by Automation
    Building Scalable Data Lakes Powered by Automation Basil Faruqui, Lead Solutions Manager, BMC Oct 25 2017 4:00 pm UTC 60 mins
    One of the first challenges in a big data project is how to ingest data into a data lake from disparate systems across the organizations. Add to this streaming data from devices, sensors and social media and just step one of the journey in big data becomes overwhelming. The key to delivering scalable big data pipelines is automation. Join this session how to learn how to build scalable data lakes by using an automation strategy that will also extend beyond the data lake stage to processing and analytics of this data.


    Bio:

    Basil Faruqui is lead solutions manager at BMC, where he leads the development and execution of big data and multicloud strategy for BMC’s Digital Business Automation line of business (Control-M). Basil’s key areas of focus include evangelizing the role automation plays in delivering successful big data projects and advising companies on how to build scalable automation strategies for cloud and big data initiatives. Basil has over 15 years of industry experience in various areas of software research and development, customer support, and knowledge management.
  • How to Scale Enterprise DevOps in the Era of Docker & Application Containers
    How to Scale Enterprise DevOps in the Era of Docker & Application Containers Jay Lyman, 451 Research, & Scott Coulton, Puppet Oct 25 2017 6:00 pm UTC 45 mins
    Application container software such as Docker and Kubernetes are among today's most disruptive trends in enterprise IT. While many are contemplating how containers may disrupt or even overtake DevOps in terms of hype or adoption, it's important to remember the reality that both containers and DevOps are part of the larger trend toward digital transformation.

    Containers are definitely having an impact on DevOps tenets of faster application releases and more efficient infrastructure management, but are just as likely to be a catalyst to scaling DevOps rather than competition.

    This webinar presented by 451 Research and Puppet will offer some perspective on what container software really means for the modern DevOps movement in the enterprise based on industry analysis and experience, survey data and customer case studies.
  • Making the Leap from TEM to IT Management
    Making the Leap from TEM to IT Management Hyoun Park Oct 26 2017 5:00 pm UTC 45 mins
    Recommended Audience: CIO, CFO, Procurement officers, IT Finance, IT Sourcing.

    Telecom Expense has traditionally been the most challenging of IT costs to manage. With the emergence of Software-as-a-Service, Cloud Computing, the Internet of Things, and software defined networks, the rest of the IT world is quickly catching up.

    This webinar will provide best practices for expanding your existing telecom expense management program into a bigger IT management program to take advantage of the robust capabilities and vendor management experience already in TEM. This presentation will include anonymized end user examples and a list of vendors with experience in managing non-telecom expense categories.