Hi [[ session.user.profile.firstName ]]

IT Service Management

  • ExtraHop + ServiceNow = Seamless IT Service Management ExtraHop + ServiceNow = Seamless IT Service Management ExtraHop Networks Recorded: Mar 23 2017 3 mins
    See how ExtraHop and ServiceNow combine for deeper insight, greater security, and automated remediation!
  • Looking Before You Leap Into ITSM SaaS Looking Before You Leap Into ITSM SaaS Amy DeMartine, Principal Analyst, Forrester Research Recorded: Mar 22 2017 41 mins
    •SaaS is becoming the dominate platform of choice for customers in many areas – including IT Service Management (ITSM).  If your service management team is evaluating ITSM solutions in the cloud then you must know what are some the important criteria and topics to evaluate before signing that contract for ITSM SaaS. Senior Forrester Analyst, Amy DeMartine, will share with you what you and your team need to consider and answer questions to help you avoid the pitfalls of moving your ITSM implementation to the cloud.
  • Detect and Block Apache Struts Bug Across Your Enterprise Detect and Block Apache Struts Bug Across Your Enterprise Vikas Phonsa Director Product Management Web App Firewall and Frank Catucci Director Product Management Web App Scanning Recorded: Mar 22 2017 62 mins
    A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.

    Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.

    During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.

    With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.

    This webcast will include a live demo and Q&A session.
  • 3 Proven Workflows for A Successful Windows 10 Migration 3 Proven Workflows for A Successful Windows 10 Migration Aimee Simpson, Product Marketing Manager, Code42 Recorded: Mar 22 2017 28 mins
    Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:

    *The facts on enterprise adoption of Windows 10
    *Planning considerations for your Windows 10 migration project
    *Three distinct approaches to performing device replacements—and the pros and cons associated with each

    About the speaker:

    Aimee Simpson, Product Marketing Manager – Code42
    Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
  • itSMF-CursoTools: 04. Gestión de Proyectos con enfoque Agile y DevOps itSMF-CursoTools: 04. Gestión de Proyectos con enfoque Agile y DevOps Michel Tramoni - Serem Recorded: Mar 22 2017 51 mins
    La gestión nativa de proyectos Agile, de Pruebas, integrada con herramientas de integración continua como Jenkins o Puppet, y repositorios Git, permite gestionar de forma completa todo el ciclo de vida DevOps, desde un marco único e integrado.

    De esta forma la implantación de practicas DevOps se hace de forma natural e intuitiva, guiando a todo el personal en cada uno de los pasos de la metodología.

    Serem presenta un caso practico sobre la plataforma ServiceNow para ilustrar paso a paso cada uno de estos conceptos: Gestión de la demanda Agile, Cascada, no regresión, integración continua,...

    Contenidos:
    - Conceptos y demostración:
    +gestión de la demanda,
    +gestión de proyecto y programas,
    +recursos y finanzas,
    +Proyectos Agile, pruebas.
    - práctica: Ciclo de vida completo de un proyecto DevOps
  • Evolving Customer Support in a Shift-Left World Evolving Customer Support in a Shift-Left World Roy Atkinson and Peter Zeinoun Recorded: Mar 21 2017 61 mins
    More and more organizations are using the shift-left approach to support, bringing more complex work down to Level 1 and moving more repetitive work out into self-service. Likewise, more customers are seeking to solve their own problems before contacting support. With Level 1 work becoming more complex and more urgent for customers, remote support teams must optimize their processes and rethink their customer support strategies.

    In this webinar, HDI’s senior analyst, Roy Atkinson, will tell you why organizations are shifting left. You’ll discover how robust remote tools are enabling support teams in high-performing organizations to provide quick resolution to half or more of their issues.

    What you’ll learn:
    * Industry expert tips on how to run a more efficient, more cost-effective support center
    * Best practices for identifying when, where, and how to shift left
    * Actionable advice on leveraging remote support to improve the delivery of support across the support center and desktop support
    * Effective use cases for deploying technology to enhance the support teams value and optimize their role in a shift-left world

    Who should attend:
    * Support center managers seeking to improve the performance of their support centers
    * Desktop support managers seeking to familiarize themselves with the latest practices and tools
    * Anyone in technical service and support seeking a better understanding of remote support capabilities
  • The Biggest Mistakes Companies Make With a Software Vendor Audit The Biggest Mistakes Companies Make With a Software Vendor Audit Patricia Adam Recorded: Mar 21 2017 59 mins
    Patricia Adams will talk you through the biggest mistakes companies make with a software audit and how to avoid them
  • Digital Transformation & Data Integration in 2017: A Best Practices Case Study Digital Transformation & Data Integration in 2017: A Best Practices Case Study Jason Goodwill, Solutions Architect, Saint-Gobain; Andrew Davey, Solutions Consultant, MuleSoft Recorded: Mar 21 2017 55 mins
    How can you take minutes, not weeks, to develop projects and detect and fix issues? For Saint-Gobain, one of the world’s top 100 companies and a leader in Building Distribution and Construction Products, they achieved success rapidly and effectively by following some key tips.

    Join Jason Goodwill, Solutions Architect at Saint-Gobain Building Distribution Sector, UK, with Andrew Davey, Solutions Consultant, MuleSoft as they share how they began optimizing their data integration strategy and accelerated the abstraction of data from key systems in a matter of minutes, instead of weeks.

    Attendees will learn:

    - How Saint-Gobain quickly transformed its IT operations to relieve operations and drive greater agility by modernizing core processes
    - How Saint-Gobain is spearheading digital transformation by building autonomous skills in-house to enable the wider DevOps integration strategy
    - Top tips and pitfalls to look out for when approaching your integration strategy
  • Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Tim Konopelky, Systems Analyst & Patrick Mauro,Senior Product Manager Recorded: Mar 16 2017 29 mins
    Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.

    Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.

    Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.

    Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
    Q&A will follow at the end of the session.
  • The Difference Between Scrum & Kanban The Difference Between Scrum & Kanban Christen McLemore, Principal Transformation Consultant at CA Technologies Recorded: Mar 16 2017 61 mins
    Have you been wondering: What’s the difference between Scrum and Kanban? Or do you think they are the same thing? In reality, these two ideas are quite different and understanding these differences is key to choosing the path that will work best for your organization.

    Join us on Thursday, March 16, 10am PT / 1pm ET, for our webinar, where Christen McLemore will dig into this topic. During this webinar, we’ll:

    • Explore the key dimensions of Scrum and Kanban through Principles, Artifacts, Ceremonies, Roles and Metrics
    • Understand the key differentiators between the two development styles
    • Gain knowledge to better advise others on when each model is more suited
  • Why Hackers Keep Winning Why Hackers Keep Winning Jon Hendren, Senior Security Researcher, UpGuard Recorded: Mar 15 2017 31 mins
    IDC predicts that one of every four people on Earth will be affected by a data breach by 2020. Yet a recent Nasdaq report found that “91% of Board Members at the most vulnerable companies can't interpret a cybersecurity report.” Given that breaches doubled in 2016, the knowledge gap between executives and IT must be bridged.

    Companies have responded to these attacks with various tools, such as anti-virus, malware and other endpoint protection, intrusion detection and prevention systems, and others. But despite these additions, data breaches have been increasing steadily over the past five years. This means that either the attackers are improving faster than multibillion dollar security vendors, or that traditional security mechanisms aren’t enough to protect enterprise data. Without direct visibility into the IT environment, non-technical executives can only trust in their technical leadership, who in turn must trust their technicians, who in turn must trust the technology itself, a trust that without hard data is at best an educated guess.

    About the presenter:

    Jon is an IT security and cyber risk evangelist at UpGuard. He doesn't *like* like risk, he just likes talking about it. More importantly, he likes talking about how it intersects with business risk, and how an accurate picture of cyber risk is one of the most important steps organizations can take toward proper cyber resilience.
  • How Next-Gen Mobile Platforms are Conquering Mobile App Challenges How Next-Gen Mobile Platforms are Conquering Mobile App Challenges Chris Marsh, 451 Research; Avinash Harsh, Sonata Software; Michael Ong, Halosys; & Ravi Naik, Former SanDisk CIO Recorded: Mar 15 2017 56 mins
    Enterprises are facing an ever growing demand for mobile applications. To create and manage meaningful and sustainable mobility programs, while keeping up with the pace of this demand, enterprises should seek solutions that help them conquer the top challenges in large scale mobility programs by providing:

    •Security across apps, data, users & devices
    •Reducing cost & increasing the speed of development
    •Seamless connectivity to multiple systems including legacy and home grown environments
    •Holistic & consistent experience across mobile & web channels
    •Deployment of applications to customers, partners, employees and vendors
    •Streamlined post launch operations by providing real time monitoring abilities

    We will discuss these challenges and look at how one of the next generation mobile platforms is simplifying enterprise mobility and addressing these key challenges.
  • Live Demo of OptiView XG Live Demo of OptiView XG Tony Fortunato, Senior Network Performance Specialist with The Technology Firm Recorded: Mar 15 2017 59 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Tony Fortunato will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • SAP Indirect Usage risk is real: Five-step plan to minimize exposure SAP Indirect Usage risk is real: Five-step plan to minimize exposure Joachim Paulini, Brian Skiba, Florian Timm Ascherl Recorded: Mar 15 2017 41 mins
    SAP Indirect Usage costs are no longer just theory. A milestone judgement in the UK courts has confirmed SAP’s right to charge customers for Indirect Usage. But what is Indirect Usage? How big is the risk of unbudgeted costs? And what can you do about it? SAP licensing experts from Snow Software will explore the recent legal ruling and what it means for SAP customers around the world, providing insight and a simple five-step plan on how to optimize SAP access and licensing before it’s too late.
  • itSMF CursoTools: 03. Gestión de la Configuración: ¿ 57 pisos en 19 días ? itSMF CursoTools: 03. Gestión de la Configuración: ¿ 57 pisos en 19 días ? Alberto Lombardía - PROACTIVANET Recorded: Mar 15 2017 48 mins
    A partir de una caso real, en este webinar descubriréis como hacer un inventario automático de activos, y como éste, a su vez, alimentará sin esfuerzo la CMDB con el fin de obtener diversos beneficios:
    - Reducir costes eliminando duplicidades innecesarias.
    - Tener un mayor nivel de seguridad al detectar vulnerabilidades en la infraestructura.
    - Y además tener mayor rapidez en caso de que fuera necesaria la restauración del servicio.

    Contenido:
    - Cómo realizar un inventario automático de activos
    - Dashboards Gestión de Activos de Software
    - Cómo alimentar automáticamente los CIs tecnológicos de la CMDB
    - La CMDB como imagen completa de la infraestructura TI de su organización
  • ITIL & SIAM: An Introduction to Service Integration & Management ITIL & SIAM: An Introduction to Service Integration & Management Peter Hubbard Recorded: Mar 15 2017 45 mins
    Service Integration And Management (SIAM) is a way of ensuring seamless delivery of service to your end users by utilising multiple IT service providers, working to a common framework.
    But what is it? Where did it come from? Does it work? What, when you get right down to it, is it?

    Join Peter Hubbard from Pink Elephant as he provides an overview of SIAM, how it works, how it integrates with other bodies of ITSM knowledge such as ITIL, and tips and tricks for successfully implementing it.
  • Are You Missing the Asset Management Revolution? Are You Missing the Asset Management Revolution? Carleen Carter Recorded: Mar 14 2017 33 mins
    Today’s competitive business and regulatory climate requires an intelligent, integrated platform to dramatically reduce costs and eliminate regulatory risk. A new single system of record offers real-time visibility into your company’s physical assets, contractual obligations and software licensing agreements.

    Asset management is about cost savings, risk, and audit than ever before. Learn how thousands of companies saved millions last year by:
    Dramatically reduce software licensing and hardware costs
    - Avoid regulatory headaches
    - Get real visibility into your entire asset lifecycle – and identify the assets your firm actually owns and uses
  • How to Build Your Threat Response Architecture How to Build Your Threat Response Architecture Jon Oltsik, Senior Principal Analyst, Enterprise Strategic Group & Piero DePaoli, Senior Director of Product Marketing Recorded: Mar 14 2017 60 mins
    With AI powering the latest trends in cyber attacks, organizations are looking to automate their security incident response. Join this session to learn about the essential capabilities for an effective enterprise threat response architecture.

    Viewers will learn about:
    • Why incident response automation projects are finally making CISOs’ short lists
    • Why Incident response is “growing up”, leaving behind manual processes and home-grown software
    • The essential functionality for an effective enterprise security response platform
    • The future: Moving from reactive to proactive incident response

     


     
  • iSpeak™ DevOps: Containerizing your Apps for Cloud Deployments iSpeak™ DevOps: Containerizing your Apps for Cloud Deployments Jeanne Morain, Earl Greer, and Rahul Tripathi Recorded: Mar 14 2017 33 mins
    Containers are being used to revolutionize how software is developed, tested, and delivered from inception to launch. Join Jeanne Morain and special guest Earl Greer from Connection and Rahul Tripathi from HPE. Earl Greer will provide an overview on how containers are transforming DevOps journey. Rahul will discuss the journey that HPE Software is taking to modernize the IT Operations Management portfolio, moving beyond traditional monolithic software delivery to a more agile approach, incorporating microservices and containers. Find out how HPE is progressing on this journey to accelerate IT to run at the speed of DevOps.
  • Resolviendo problemas en WiFi 802.11ac: Hazlo rápido y simple Resolviendo problemas en WiFi 802.11ac: Hazlo rápido y simple Pepe Bonilla Cepeda Recorded: Mar 14 2017 89 mins
    Con el avance de la tecnología, y el incremento en las tasas de transferencia el mantenimiento de redes WiFi puede ser complicado. Cuando comenzamos con afirmaciones vagas de los usuarios como “el WiFi está lento”, o “no me puedo conectar” identificar la causa raíz que provoca su malestar puede ser costoso y consumir mucho tiempo. Examinaremos métodos básicos de atención de problemas usando lo último en equipos de prueba para reducir tiempo y costo de corrección de fallas. Estoy incluye nuevas mejoras en el flujo de trabajo para equipos de trabajo distribuidos entre diferentes locaciones.

    Acompáñenos en esta sesión para conocer sobre las mejores prácticas para mantenimiento de redes inalámbricas.
  • To the Cloud and Beyond: Modernizing, Securing & Integrating Healthcare in 2017 To the Cloud and Beyond: Modernizing, Securing & Integrating Healthcare in 2017 Matt Serna, Healthcare Marketing Manager, MuleSoft; Mohammad Fasihi, Healthcare Strategy Tech Advisory, PwC Recorded: Mar 14 2017 40 mins
    The promise of the cloud computing in healthcare is clear; delivering on that promise, less so. Security and HIPAA compliance challenges, combined with the technical difficulty of configuring on-premise EHR systems to co-exist with modern cloud integration platforms, have delayed cloud adoption in the industry.

    This webinar will share how Anypoint Platform’s unique combination of data integration and API lifecycle management can help power the rapid, secure adoption of Salesforce and other modern healthcare cloud applications. It will also showcase how PwC has leveraged the MuleSoft platform to develop innovative solutions for its healthcare clients, and feature a demo of PwC's Smart Agent.

    Attendees will learn:

    - Common pitfalls healthcare organizations face in migrating to the cloud, and how they can be addressed with a hybrid integration model
    - How APIs can be used to increase the security and governance of health data
    - How PwC leverages MuleSoft’s platform to drive business outcomes in healthcare
  • The Top 5 Configuration Management Database Challenges for 2017 The Top 5 Configuration Management Database Challenges for 2017 Dan Ortega - VP of Marketing at Blazent Recorded: Mar 11 2017 4 mins
    While not particularly high-visibility, a well-managed Configuration Management Database (CMDB) provides organizations with tremendous value. Along with this value, a CMDB requires an organization to take responsibility for keeping it fit-for-purpose. Hewlett Packard Enterprise (HPE) sponsored a leading analyst firm to poll 100 IT executives on CMDB and discovery tools. This video reviews the most interesting findings on CMDB challenges.
  • Banking Best Practices: How Financial Institutions Can Ensure Cybersecurity Banking Best Practices: How Financial Institutions Can Ensure Cybersecurity Elias Okwara Recorded: Mar 9 2017 33 mins
    The Conference of Bank Supervisors (CSBS), a national consortium of state banking regulators, has released its recommendations on how banks can best institute practices which meet or exceed the legal standard for cybersecurity. With bank executives accountable for ensuring these standards are met, CISOs working in the financial sector must have a clear understanding of how they can fulfill these regulatory requirements.
  • A View of the World's Largest & Fastest Growing Data Center Spot A View of the World's Largest & Fastest Growing Data Center Spot Kelly Morgan 451 Research and Mark Kidd Iron Mountain Recorded: Mar 9 2017 33 mins
    A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • itSMF-CursoTools. 02. Aplicando tecnologías emergentes a Incidencias, Cambios itSMF-CursoTools. 02. Aplicando tecnologías emergentes a Incidencias, Cambios Luis Camiro - EasyVista Recorded: Mar 9 2017 64 mins
    En la actualidad, diversas compañías están elaborando estrategias para adaptarse a la transformación digital, la cual no solo afecta a la TI, sino también a otras área del Negocio.

    En este Webinar se hará énfasis en las nuevas tendencias relacionadas con la Gestión de Incidencias, de Problemas y de Cambios. Experimentándolas sobre una herramienta real (EasyVista), a modo de ejemplo.

    Contenido:
    1.- Introducción a la Plataforma EasyVista
    2.- EasyVista Service Apps - Capa de Presentación al consumidor
    3.- EasyVista Service Manager - Plataforma completa de Gestión de Servicios
    4.- Preguntas
  • itSMF CursoTools: 05. Indicadores, automatización en cálculo niveles de servicio itSMF CursoTools: 05. Indicadores, automatización en cálculo niveles de servicio Raquel Fernández - OBSIDIAN Mar 23 2017 3:00 pm UTC 60 mins
    Las organizaciones definen SLAs para especificar los niveles de servicio que prestan a sus clientes externos/internos. También para evaluar a los proveedores que les prestan servicio.

    Sin embargo, muchas veces este cálculo es manual, subjetivo y centrado en el análisis histórico.

    En este webinar se presentan las principales técnicas para definir y cuantificar automáticamente los niveles de servicio, tanto en tiempo real como históricos. A modo de ejemplo, se utiliza la plataforma OBSIDIANsoft como agregador de indicadores provenientes de herramientas de monitorización, service desk, ERPs, etc.

    ¿Cuenta su organización con una herramienta de service desk? ¿Y con herramientas de monitorización? Por supuesto, tendrán también un ERP y otras aplicaciones de negocio.

    Con los datos proporcionados por este tipo de herramientas es posible modelar los servicios de TI de una organización siguiendo las buenas prácticas de ITIL y los requisitos de la ISO 20000, definir las dependencias entre servicios y automatizar la generación de dashboards e informes de cumplimiento de nivel de servicio.
  • Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors Stefan Goeritz, Applink and Ian Bromehead, HPE Mar 23 2017 4:15 pm UTC 60 mins
    In this session we will demonstrate AppLink’s CLIP solution to implement a combined workflow of HPE OMi’s event management capabilities integrated into the incident management process of ServiceNow and BMC Remedy. In addition to CLIP’s out-of-the-box workflow, this session shows real life non-intrusive customer customizations of CLIP to address auto-assignment of incidents, context sensitive auto-resolution of incidents based on CLIP variables and direct vs. indirect integration options.
  • Applying Lean Practices to Healthcare IT Processes Applying Lean Practices to Healthcare IT Processes Troy DuMoulin, VP of Research & Development, Pink Elephant Mar 23 2017 5:00 pm UTC 60 mins
    Join us for a live webcast, “Applying Lean Practices to Healthcare IT Processes" on March 23rd. Seasoned ITSM experts from Pink Elephant and Cherwell will demonstrate how Lean principles are critical in healthcare organizations for better process flow, improved patient care, and lower costs. Additionally, they will map out the connection between Lean, Agile Software Development, and DevOps, how they relate to principles of IT Service Management, and the methods to accelerate business value generation.
  • Top Reasons Why Your Antivirus Isn’t Working Anymore Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Mar 23 2017 5:00 pm UTC 75 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • 4 things every IT Administrator needs to know about PCoIP Security 4 things every IT Administrator needs to know about PCoIP Security Jack Cha, Product Security Engr. & Dustin Krysak, Security Analyst, Teradici Mar 23 2017 5:00 pm UTC 60 mins
    Learn best practices for maximizing the security of your PCoIP Zero Client and PCoIP Management
    Join this informative session where our security experts will cover:
    •Security in a PCoIP deployment
    •Securing your PCoIP and management connections
    •Setting up profile settings for hardening PCoIP Zero Clients
    •Hardening PCoIP Management Console
    oPerforming OS security updates in CentOS
    Other best security maintenance practices
    Q&A will follow at the end of the session.
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience How Tableau pairs Jamf with Code42 to provide a better device choice experience Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf Mar 23 2017 6:00 pm UTC 45 mins
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Speakers:

    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • Stelligent Acquisition Briefing Stelligent Acquisition Briefing Joel Daly, CEO of HOSTING Mar 24 2017 7:00 pm UTC 45 mins
    Join Joel Daly, CEO of HOSTING, as he goes live to discuss HOSTING's acquisition of Stelligent, a technology services company that provides DevOps Automation in the Amazon Web Services (AWS) cloud.

    Bring your questions as there will be a live Q&A during the webinar!
  • CSM South East Lunch & Learn | Acorio CSM South East Lunch & Learn | Acorio Adam Mason, Brian Uhelski, Meghan Lockwood Mar 28 2017 5:00 pm UTC 60 mins
    Adam Mason, one of Acorio's Vice Presidents, will walk you through Customer Service Management business challenges - All you need to do is enjoy your pizza!

    Additionally, within this webinar, we will showcase a demo of ServiceNow’s unique power to address these challenges.

    Webinar Outline:

    - The Problem: Getting Customer Service Wrong is Expensive
    - Here's What you can Achieve Doing it Right
    - Deadly Sins of Customer Servie Management
    - Not Contextual
    - Major Benefits
    - What do we mean by Light Speed?
    - The Next Level: Mining Customer Support to Drive Revenue (Account Insight, Upsell Cross Sell, New Products and Upgrades)
  • itSMF-CursoTools. 06. Debate sobre Tendencias en Herramientas Gestión TI itSMF-CursoTools. 06. Debate sobre Tendencias en Herramientas Gestión TI Luis Moran - itSMF Mar 29 2017 2:00 pm UTC 60 mins
    Debate con los ponentes del curso de tools, para tratar los temas de más actualidad sobre la automatización de procesos y herramientas ITSM.

    Temática como:
    Uso de Cloud y SaaS
    Interfaces Móviles y Sociales
    Integración de Servicios multi-proveedor y SIAM
    Integración de herramientas etc

    Y cualquier pregunta de la audiencia

    Modera:
    Luis Morán – itSMF

    Participan:
    Eduardo Ballesteros – itSMF
    Luis Camiro – EasyVista
    Alberto Lombardía – ProactivaNet
    Raquel Fernández – Obsidian Soft
    Eric Hamon - Serem
  • Stroke of genius; The only known way to fully protect against keystroke loggers Stroke of genius; The only known way to fully protect against keystroke loggers Peter Ridgley, President, Verterim inc. CJ Brunet, President, Advanced Cyber Security Mar 30 2017 3:00 pm UTC 60 mins
    Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other sensitive data right at their fingertips.  Join Peter Ridgley President of Verterim and CJ Brunet, President of Advanced Cyber Security on March 30th at 11 a.m. est. for an overview on overcoming the business challenges and preventions for advanced cyberattacks. Learn how encryption at the keystroke level can help prevent these attacks and address PCI, Healthcare, Financial Services and other regulatory requirements at the same time.
  • The Blueprint for Managing Small Business Cybersecurity Risk The Blueprint for Managing Small Business Cybersecurity Risk Emory Simmons, President of CMIT Solutions of South Charlotte Mar 30 2017 3:00 pm UTC 60 mins
    Over the last few months, cyberattacks have dominated the news, creating uncertainty about how best to protect the value small business owners have worked to create. In this webinar, Emory Simmons, President of CMIT Solutions of South Charlotte, outlines today’s online threats and lays out a plan small businesses can use to manage risk.

    Invest an hour to attend, The Blueprint for Managing Small Business Cybersecurity Risk, on March 30th at 11:00 am EDT as we cover the following topics:

    - Current cyberthreats facing small businesses
    - Case study of a recent attack that took a business down for 1 week
    - The blueprint your business can follow to manage cybersecurity risk
    - Actionable steps you can start taking immediately
    - Resources to help you perform a risk assessment
  • Security via Automation - Where Do You Draw the Line? Security via Automation - Where Do You Draw the Line? Harold Byun, Sr Director of Product Management, ServiceNow & Piero DePaoli, Sr Director of Product Marketing, ServiceNow Mar 30 2017 5:00 pm UTC 60 mins
    Automation in Security. Is your organization doing it? And if so, how much is really being automated? Where does good automation end – giving way to unsafe choices that can spiral out of control? Where should enterprises draw the line?

    Tools designed to enable automatic blocking or isolate a compromised system have been known to inadvertently take down critical business applications, leaving security operations teams wary of "automation." However, there are security tasks that can be safely automated without putting systems or jobs at risk. With more precious time back, security analysts can spend more time hunting and responding to threats.

    Join Harold Byun and Piero DePaoli, security operations product leaders at ServiceNow, as they discuss and demonstrate approaches to no‑risk automation that can help you dramatically improve the effectiveness of your security response program.

    Viewers will learn:

    - Why automation is critical for efficient enterprise security response
    - A short‑list of repetitive, but necessary tasks that are prime candidates for automation
    - Steps to getting started
  • The Pursuit of Award-Winning Service Improvement: A Case Study from CGI Federal The Pursuit of Award-Winning Service Improvement: A Case Study from CGI Federal Shane Knipschild, Tom Wible, and Leslie Cook (moderator) Mar 30 2017 5:00 pm UTC 75 mins
    The HDI Service Improvement Award recognizes an organization that has successfully implemented or improved one or more service offerings. Attend this webinar to learn how the 2016 award winner, CGI Federal, implemented world-class service improvements. Shane Knipschild and Tom Wible will share:

    * The state of the organization before CGI Federal launched its service improvement initiative
    * The strategy for CGI Federal's service improvement initiative
    * The outcome, including lessons learned and the impact on CGI Federal
  • DevOps and the API Lifecycle: How to Enable Speed, Quality & Agility DevOps and the API Lifecycle: How to Enable Speed, Quality & Agility Andrew Davey, Solutions Consultant, MuleSoft; Aaron Landgraf, Sr. Product Marketing Manager, MuleSoft Apr 4 2017 3:00 pm UTC 45 mins
    The mandate for applications to change is nothing new. Pushing those changes from design to production in hours, however, is something traditional software delivery models can't handle. DevOps practices have emerged as a viable approach to enabling this speed with quality for increased application performance and better architectures.

    In this webinar, we will highlight how DevOps practices and tooling can be applied with Anypoint Platform when implementing and managing an API.

    Attendees will learn:

    - How (and why) to create a DevOps pipeline with Anypoint Platform
    - Setting up a Maven project in Anypoint Studio
    - Connecting Mule projects with a Git repository
    - Creating automated tests with MUnit and JUnit
    - Deploying Mule applications automatically with Jenkins
  • Security Visbility at Scale for Dummies Security Visbility at Scale for Dummies Chad Russel, Cyber Security Expert Apr 4 2017 3:00 pm UTC 45 mins
    Explore how architecting a modern security visibility network infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security system investments, and enhance uptime and availability to drive business assurance.

    As security threats grow in scope and volume, you increasingly need to ensure complete and timely security visibility down to the packet level. Join Chad Russell, a leading cyber security expert and author of the 2017 “Security Visibility at Scale for Dummies,” as we review the critical highlights from this popular guide.

    Attend the webinar to:

    * Understand security visibility basics
    * Learn the difference between supporting inline and out-of-band systems
    * Find out what’s involved in optimizing packet flows
    * Review security visibility use cases

    The webinar is designed for network & security architects, network operations, and network security specialists.

    Speaker bio:

    Chad Russell has been in the cyber security business for over 15 years. He leads and conducts security risk assessments for customers throughout North America. Chad has held numerous certifications including CISSP, CCNP, MCSE, and MCDBA. Connect with him on LinkedIn.
  • The Future of Security Incident Response The Future of Security Incident Response Joseph Blankenship, Forrester Senior Analyst and Piero DePaoli, Senior Director, ServiceNow Apr 6 2017 5:00 pm UTC 60 mins
    The era of the megabreach is upon us. And it's had a seismic effect on global businesses. Many name‑brand organizations are spending millions dealing with the aftermath of losing customer data or intellectual property, and others are working as hard as they can to avoid the type of media attention that no one wants.

    The core issue is that security teams are overwhelmed and lack the speed and agility to effectively stop a breach. The only way to make security teams more effective at stopping breaches is to automate security incident response processes.

    Join guest speaker Joseph Blankenship, Forrester Senior Analyst, and Piero DePaoli, Senior Director from ServiceNow's Security Operations team, in this on‑demand webinar as they discuss and demonstrate the following.

    •The need for rules of engagement to defend against breaches
    •Defining policies and workflows to automate much of incident response
    •Best practices for creating a response index
    •Six game‑changers for efficient security incident response ‑ in action
  • The InfoGov Playbook: How a Modern Workforce Needs to Handle Data The InfoGov Playbook: How a Modern Workforce Needs to Handle Data Sean Doherty Apr 6 2017 5:00 pm UTC 60 mins
    Information governance (IG) is a hard nut to crack in organizations, where it often lacks proper definition and eludes common user interfaces. As organizations pursue digital transformation and create, collect and use data to determine strategy and command performances, IG makes playbooks for how a modern workforce should appropriately use and consume data assets. This webinar discusses IG as a discipline, framework and collection of technologies to identify, assess and protect information assets and respond to regulatory and litigation risks and global privacy concerns.
  • Using Microservices & APIs to Revolutionize Digital Healthcare: A Case Study Using Microservices & APIs to Revolutionize Digital Healthcare: A Case Study Matt Serna; Nial Darbey; Joydip Homchowdhury; Jon Duke; Steve Rushing Apr 11 2017 3:00 pm UTC 60 mins
    In the United States, the Department of Veterans Affairs is responsible for providing healthcare and other services for over 21 million veterans. Currently, veteran data and health records are housed in a variety of distinct, complex systems, each holding discrete records of veteran interactions with military, community, and VA health teams.

    The Digital Health Platform (DHP) strategy, developed in partnership with the Veterans Health Administration (VHA), calls for a cloud-based technology platform integrating Veteran data from VA, military and commercial electronic health records (EHRs), applications, devices and wearables to a Veteran’s healthcare team in real-time.

    Delivering on their vision required the adoption of a composable architecture, using APIs to abstract away complexity from EHRs into discrete units of business capabilities, represented via microservices. In this webinar, the DHP team will present methodology and technology insights drawn from the public-private collaboration that built the proof-of-concept, and share the role MuleSoft’s Anypoint Platform helping enable this vision.

    Attendees will learn:

    - Why EHRs on their own are insufficient to meet modern interoperability requirements
    - How APIs can be used to unlock and orchestrate healthcare data for cloud application consumption
    - Why microservices can increase IT agility for both government agencies and private sector companies
    - How the Digital Health Platform leverages MuleSoft’s Anypoint Platform to improve care delivery for veterans
    - What organizations outside healthcare or government can learn from this digital transformation approach
  • iSpeak Cloud: Incorporating Mobile First into YOUR Cloud Strategy iSpeak Cloud: Incorporating Mobile First into YOUR Cloud Strategy Jeanne Morain, Jamie MacQuarrie (Founder Appivo), Harish Sathisan(Director Mobility Avnet) Apr 11 2017 4:00 pm UTC 30 mins
    Mobility connects your most critical assets - your people to your cloud resources. Often times Mobility is an after thought of the bigger Cloud or Transformation strategy versus an integral part. As companies focus on a user in versus a technology approach to transformation - they need to put their mobility cloud strategy at the front and center. Join Jeanne Morain and special guests Jamie MacQuarrie (founder of Appivo) and Harish Sathisan (Director Mobility Avnet) for a lively discussion and insight on what a mobile first strategy means. The trio will provide best practices and prescriptive guidance on how mobility will/should affect your transformation efforts. They will give the top challenges and solutions to overcome them in the enterprise.
  • ServiceNow Innovation in 2017: The Hype vs. Reality | ITSM Midwest Lunch & Learn ServiceNow Innovation in 2017: The Hype vs. Reality | ITSM Midwest Lunch & Learn Ross Rexer, Dave Kruchten, Meghan Lockwood Apr 11 2017 5:30 pm UTC 60 mins
    Join Acorio's Vice President, Ross Rexer, and Midwest Sales Manager, Dave Kruchten to learn how organizations are modernizing their IT Services with ServiceNow's best-in-class cloud-based ITSM.

    What You'll Learn:

    - ServiceNow's power to transform businesses
    - How to go beyond low-hanging fruit and pick REAL opportunities
    - Real-world examples of companies revolutionizing IT Service Management
  • The Role of IT Leadership in Service and Support The Role of IT Leadership in Service and Support Jeff Rumburg, Managing Partner at MetricNet Apr 11 2017 6:00 pm UTC 60 mins
    As the gateway to IT for most end users, service and support is the biggest driver of customer satisfaction and can generate a tremendous return on investment. IT leaders and managers who ignore these facts do so at their own peril, for the simple truth is this: the success and longevity of an IT management team are directly tied to the success of service and support. In this session, Jeff Rumburg will use benchmarking data and case studies to demonstrate the untapped value of all service and support organizations.
  • ITSM: A valuable digital transformation component ITSM: A valuable digital transformation component Adam Holtby, Ovum Apr 12 2017 12:00 pm UTC 50 mins
    Digital transformation is, undoubtedly, a hot topic and an area of significant interest to organizations across the globe. It's important to remember that digital transformation means different things to different organizations and encompasses many different themes and considerations. There are, however, common areas that are imperative to any digital transformation effort. This webinar will draw upon Ovum data and analyst insights and discuss the digital transformation elements deemed important by businesses and how ITSM capabilities can help support them.
    In this webcast you will learn about:

    •What does it mean to digitally transform and why is it such a hot-topic at present?
    •What are organizations prioritizing when it comes to digital transformation?
    •How ITSM can support organizations in executing against digital transformation objectives.
    •Why ITSM capabilities and practices are becoming more widely embraced in other business areas.
  • ITSM Advice: Getting Self-Service Right and Increasing Adoption ITSM Advice: Getting Self-Service Right and Increasing Adoption Stephen Mann, Principal and Content Director, ITSM.tools Apr 12 2017 1:00 pm UTC 50 mins
    Many IT organizations are still struggling to achieve self-service success. Well, to be more precise, they are still struggling with end user adoption of their newly deployed self-service capability.

    Why? Some causes relate to not truly understanding end user wants and needs, and issues with organizational change management (or the lack of it). But IT self-service, and every other offered service, is not provided in a vacuum - with end users’ expectations increasingly influenced by their often-superior consumer-world experiences. These consumer-world-driven expectations also apply to other organizational service providers, such as HR and facilities, making the approach to self-service capability delivery a company-wide issue whether part of an enterprise service management strategy or not.

    This webinar will talk to the state of self-service success, the common issues experienced with IT self-service initiatives and what can you do to avoid them, and other good practices to employ both pre- and post-self-service go-live.
  • The Importance of Roles & Organizational Structure in Digital Transformation The Importance of Roles & Organizational Structure in Digital Transformation Michael Azoff, Ovum Apr 12 2017 1:00 pm UTC 45 mins
    The convergence of tools and processes has been instrumental in making agile and DevOps successful. The roles and re-structuring of the organization that lead to changes in behavior are just as important, if not more so, than agile process and automated tools. Large enterprises will continue to be multi-speed/hybrid environments. In this session we examine how to make the agile and DevOps cultural change succeed in real companies.
  • Overcoming Mobility Paralysis Overcoming Mobility Paralysis Craig Reigelhaupt, Mobility Director Apr 12 2017 2:00 pm UTC 45 mins
    Blue Hill recently conducted a study on the true cost of not acting on a managed mobile policy for the Enterprise. The results of this study provide a wake-up call for large enterprises that continue to approach mobile through a status-quo policy without considering the full costs from a financial, technical, logistical and strategic perspective. In our webinar we will reflect on each of these points of view as they relate to mobile, and provide an actionable plan to help you overcome what we term "Mobile Paralysis" or the barriers to implementing a truly holistic mobile policy for your organization.