Hi [[ session.user.profile.firstName ]]

IT Service Management

  • How to Avoid Internal Friction When Expanding Service Management
    How to Avoid Internal Friction When Expanding Service Management
    Sean Sebring and Jason Yeary Recorded: Dec 11 2018 54 mins
    Sean Sebring is an IT Process Improvement Manager who used his service management platform as a vehicle to improve business processes throughout the organization. In fact, over 50% of licensed agents in his organization are outside of IT. In this webinar, he'll cover:

    - How to create buy-in from stakeholders
    - How to work "on the schedule of the business"
    - How to drive process improvement in IT and beyond
  • 5 Steps to Defeat Most Cyber Attacks
    5 Steps to Defeat Most Cyber Attacks
    Chris Goettl, Director of Product Management for Security at Ivanti Recorded: Dec 11 2018 41 mins
    Since WannaCry changed the game in June 2017, cyber threats have continued evolve in intent and consequences. How can you protect your organization from today’s sophisticated attacks designed to have such a critical impact? You must prioritize risk.

    Join Chris Goettl, Director of Product Management for Security at Ivanti, as he looks at how attacks today are getting into networks, the damage they’ve done, and how focusing on the right threat vectors can go a long way toward protecting your organization from a similar fate.
  • Threat Detection in TLS: The Good, the Bad, and the Ugly
    Threat Detection in TLS: The Good, the Bad, and the Ugly
    Ian Farquhar, Distinguished Sales Engineer, Gigamon Recorded: Dec 11 2018 59 mins
    While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to encrypted attacks, hidden command and control threats and data exfiltration exploits that go undetected.

    To make this situation even more complex, the TLS 1.3 draft 28 proposal, ratified at the IETF 101 conference in London and now moving toward official RFC status, has actually removed the visibility which was widely deployed for threat identification in TLS 1.2.

    Once again, InfoSec teams find themselves at the fulcrum of a delicate balancing act. On one hand, encryption is moving toward ubiquity but on the other, we need to detect when threat actors use it too. And in detecting that misuse, we need to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns. For example, we can’t decrypt just at the edge of our networks if we believe “perimeter security is dead.” Proxies on the network edge are a step backwards.

    What can you do? “Threat Detection in TLS: The Good, the Bad and the Ugly” will discuss the necessity of deploying TLS decryption in the core of networks and will explore innovative architectures that deliver that capability while maintaining availability and reliability.

    Learn how organizations can manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.
  • How smart companies use voice and bots to get and keep more customers
    How smart companies use voice and bots to get and keep more customers
    Bharath Kadaba, Chief Innovation Officer, Intuit Recorded: Dec 11 2018 60 mins
    The landscape of voice and chatbot-to-customer interactions is blowing up. Whether it’s a trusted AI assistant like Alexa or Google Home, or an integrated voice or chatbot tool within a brand interface like Kayak’s customer service experience, customers are increasingly willing to engage with brands via voice chat.

    AI assistants are getting smarter, and becoming capable of helping consumers sort through the avalanche of choices available in every decision, from buying phone plans to toothbrushes. And your marketing efforts will have to shift priorities in a major way to capture the attention of these newly connected customers as assistants get smarter and customers learn they can rely on their results.

    To hear about actual voice chat use cases, the differences between integrated bots and AI assistants, and how to leverage voice and bots for amaze-and-delight experiences right now, don’t miss this VB Live event!

    Register here for free.

    Attend this webinar and learn:
    * How bots and voice are uniquely positioned to help customers make purchasing decisions
    * How brands can address the advantages of integrated bots and an AI trusted assistant like Alexa
    * The best ways to leverage voice and bots to optimize the customer experience
    * What's next for voice and bots

    Speakers:

    * Bharath Kadaba, Chief Innovation Officer, Intuit
    * Ryan Lester, Director, Customer Engagement Technologies, LogMein
    * Matthias Keller, Chief Scientist & SVP Technology, Kayak
    * Russ Tar, VP EMEA, Artificial Solutions
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Bold360 by LogMeIn
  • How Assisted Self-Service Will Power Up Support
    How Assisted Self-Service Will Power Up Support
    Chris Savio (Prompt.ai by LogMeIn); Roy Atkinson (HDI Moderator) Recorded: Dec 11 2018 61 mins
    IT and technical support would love for end users and customers to take advantage of self-service resources. End users and customers would love for self-service to be easier. Finding articles, videos, documents and other resources intended to make life easier for users—and for the analysts and technicians who support them—can be difficult and confusing.

    Next-generation tools are here, set to enable users and customers to get accurate answers quickly and easily and solve many common issues for themselves, allowing analysts to concentrate on more complex problem-solving and other tasks. Analysts can benefit as well, having powerful assistance at their command to find knowledge and implement solutions without making users and customer wait.

    What You Will Learn:
    - What “assisted self-service” means
    - Why self-service adoption can be a struggle
    - How next-generation tools can help both end users and support analysts

    Who Should Attend:
    - Knowledge Management professionals seeking ways to improve
    - ITSM professionals tasked with building self-service portals
    - Support organization leaders who wish free analysts up from repetitive tasks
  • What’s New in Network Operations Management
    What’s New in Network Operations Management
    Jon Kies, Product Marketing Manager and Nisarg Shah, Product Management Director, Micro Focus Recorded: Dec 11 2018 62 mins
    Join us for an exciting and informative look at the latest release of Micro Focus Network Operations Management.

    Network Operations Management (NOM)—the leading management tool for enterprise networks—is built on the core capabilities of Network Node Manager I and Network Automation. It integrates fault, performance, configuration, and compliance of physical, virtual, wireless, and software-defined network infrastructures.

    Learn about NOM’s latest enhancements for diagnostic analytics, the scheduled out-of-service feature, integration with Micro Focus Operations Bridge, and more.

    You will also get a sneak preview of the new NOMX User Interface—our next-generation customizable and persona-based experience that unifies network data from monitoring, automation, compliance, and orchestration into actionable insights.
  • Key Considerations for Stretching Your Storage Budget
    Key Considerations for Stretching Your Storage Budget
    Donna Pizarro, Product Manager, Storage; Bill Coker, VP, Hardware Business Unit; Bill Raftery, SVP Global Storage Solutions Recorded: Dec 11 2018 41 mins
    Storage Admins are continually challenged by the revolution in today's storage technology; the expansive growth of storage needs and the balance of getting the best performance and extended life of the storage product to stretch an existing budget.

    Want to learn more? Join us for an informative discussion where we’ll discuss:
    •Available N-1 options for hybrid systems
    •Options you should consider when purchasing a pre-owned N-1 hybrid
    system
    •The pros and cons of purchasing a N-1 storage solution
    •How to save by extending the life of the asset
    •Why performance assessments and health checks are necessary, what is
    involved and what objectives should be expected
  • Cloud Vision 2020: The Future of the Cloud
    Cloud Vision 2020: The Future of the Cloud
    Jeff Behl, Chief Product Officer at LogicMonitor and William Fellows, Research Vice President and Founder of 451 Research Recorded: Dec 11 2018 59 mins
    Your cloud journey is underway. That’s a fact. So what’s next and how can you best prepare your organization for long term success? Cloud Vision 2020: The Future of the Cloud from LogicMonitor provides answers. Compiled from the predictions of more than 300 industry influencers, this report outlines the future of the cloud computing industry and contains valuable insights and tips for IT leaders preparing for and continuing their cloud transition.

    Join Jeff Behl, LogicMonitor Chief Product Officer and William Fellows, VP of Research for 451 Research’s Cloud Transformation Channel as they reveal the survey results and discuss ramifications for the market.

    Cloud Vision 2020: Future of the Cloud Webinar will cover:
    -Will Enterprises ever be 100% in the cloud?
    -What trends are actually driving cloud engagement today?
    -What will the drivers to the cloud be in 2020?
    -Which cloud vendors will gain/lose market share?
    -How can these findings be applied to your cloud strategy?

    Learn why Forbes, USA Today, and TechRepublic are talking about LogicMonitor’s Cloud Vision 2020 study. Follow the conversation on Twitter, using the hashtag #CloudVision2020
  • 2 New Ways to Learn and Apply KT Problem Solving
    2 New Ways to Learn and Apply KT Problem Solving
    Join Jason O’Neill, Head of Global Training services, and Wayne Stottler, Manager of Product Development with Kepner-Tregoe Recorded: Dec 11 2018 61 mins
    Because it is important that our clients have access to the finest problem-solving tools on the market, we’ve developed 2 NEW digital solutions that make KT problem-solving more accessible and easy to use.

    Please join us to learn about these new KT applications.

    • KT Solve is a browser-based tool that allows users to leverage KT process, store records in the cloud then, access them from any device anywhere in the world. A free version is included for KT workshop participants with premium versions available offering advanced features.
    • KT eLearning is a self-paced modern learning platform accessible from any device that offers learners access to fresh KT tutorials to deepen and refresh their knowledge of KT’s processes.

    What you will learn:

    • How KT Solve accelerates an individual’s learning experience and reinforces the use of KT process back on the job.
    • Through examples of KT’s new eLearning content, learn how this platform can be utilized to deepen the skills of new KT workshop participants past as well as to refresh problem-solving skills of past KT grads.
    • We’ll show a sneak peek of new KT products to be released in 2019.
  • How can static analysis help DevOps teams maintain velocity securely?
    How can static analysis help DevOps teams maintain velocity securely?
    Meera Rao, senior principal consultant and director of the secure development practice - Synopsys Software Recorded: Dec 11 2018 46 mins
    Static application security testing (SAST) is the process of examining source code for security defects. SAST is one of many checks in an application security assurance program designed to identify and mitigate security vulnerabilities early in the DevOps process. Integrating SAST tools into DevOps processes is critical to building a sustainable program. And automating these tools is also an important part of adoption, as it drives efficiency, consistency, and early detection.

    If you have questions like these, and you’re concerned about integrating SAST tooling into your DevOps process, this session will offer actionable advice to automate security testing that supports DevOps velocity.

    But DevOps practitioners looking to integrate SAST tools into the DevOps pipeline often have questions:

    How do I manage false positives?
    How do I triage the results?
    What happens to new issues identified?
    How can I use a tool in my DevOps pipeline?
  • IT Service Transformation: How to Make Work Flow Across the Enterprise
    IT Service Transformation: How to Make Work Flow Across the Enterprise
    Mike Johnson, Ryan Mulvaney, Mike Bollman, Pulin Bhatt Recorded: Dec 10 2018 59 mins
    We want you to be a part of the 2018 IT service transformation virtual event!

    Join us for the live event to learn how IT teams are modernizing IT service management, automating key processes across their organizations, and breaking down silos that stand in the way of progress.

    Can’t make the webcast? Register anyway and we will send you the on-demand recording.
  • See how to scale agile across the enterprise
    See how to scale agile across the enterprise
    Troy DuMoulin, Thom Gray Recorded: Dec 6 2018 58 mins
    Join Troy DuMoulin, VP of R&D at Pink Elephant, and Thom Gray, Senior Staff Product Manager at ServiceNow, as they discuss how to close the gap between enterprise strategy and team-based backlogs using integrated planning processes, key stakeholder roles, and visual management tools.

    In this webinar, you’ll learn:

    How to connect the strategic planning process with team backlogs
    How to create visibility for both planned and unplanned work
    The role of product owner in bridging strategy with team work
    Learning visual management tools such as Kanban boards, Shared Backlog, and Big Room Planning for easier collaboration.
  • The Digital Workplace Requires AI-Driven IT
    The Digital Workplace Requires AI-Driven IT
    Jeff Aaron, VP of Marketing, Mist Systems; Kevin Fenn, Global Head of Networks, ThoughtWorks Recorded: Dec 6 2018 57 mins
    Join this webinar where Kevin Fenn, Global Head of Networks at ThoughtWorks, and Jeff Aaron, Vice President of Marketing at Mist, will discuss the emerging role of Artificial Intelligence (AI) in IT and how you can benefit from this trend. AI is critical to the emerging digital workplace, reshaping the way IT organizations deploy and manage infrastructure and how users consume those services.

    The IT department at ThoughtWorks is on the leading edge of the “AI for IT” movement, bringing unprecedented automation and insight into daily operations with a state of the art AI-driven Wireless LAN from Mist. Their new digital workplace, which enables new initiatives such as open seating and video collaboration, is boosting employee efficiency and experience.

    We will explore:

    · AI technology and the impact it has on wireless networking

    · Best practices for deploying an AI-driven WLAN

    · How to support wireless video conferencing, open seating, and other strategic initiatives

    · Quantifying the benefits of a new AI-driven network infrastructure
  • Master the Art of Zero-Touch Deployments
    Master the Art of Zero-Touch Deployments
    Jim Grandbois, Solutions Architect, Jamf Recorded: Dec 6 2018 24 mins
    With imaging taking a back seat to the new era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable zero-touch deployment by automating enrollment and configuration from a central location — eliminating the need to ever physically touch the device.

    In our webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organization.

    We’ll cover:
    •An overview of Apple’s deployment programs
    •The benefits of zero-touch deployment
    •How to accomplish zero-touch deployment for macOS and iOS
  • An Event-Driven Approach to Systems Management at Scale
    An Event-Driven Approach to Systems Management at Scale
    Mike Place, SaltStack director of engineering / Kendall Lovett, SaltStack head of product marketing Recorded: Dec 6 2018 31 mins
    Real-world systems are inherently complex. This is continually more apparent in the digital ecosystems that run modern business. The challenge to control, optimize, and secure these digital systems is becoming more and more daunting for IT operations teams. We must recognize and embrace emerging patterns to help efficiently manage infrastructure at scale.

    On this 30-minute webinar, Mike Place, SaltStack director of engineering and maintainer of the Salt open source project, will provide an introduction to an event-driven approach for systems management, blending traditional monitoring and configuration management techniques to build resilient and autonomous systems. The goal -- to learn how to abstract infrastructure command and control through event-driven IT automation workflows sophisticated enough to wrangle the complexity of the modern data center.
  • SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    Dr. Jim Metzler and Joel Christner Recorded: Dec 6 2018 43 mins
    The WAN has been fundamentally upended by SD-WAN and IT decision makers now have to reconsider what the branch of today and tomorrow looks like. Do you choose a best-of-breed solution or do you settle on a solution that includes SD-WAN and other capabilities?

    Join our webinar to learn the pros and cons of each and which dimensions should power your decision.

    In this webinar, you will learn:

    * The similarities and differences between best-of-breed SD-WAN and all-in-one systems
    * Which challenges and complexities are either presented or remedied by each model
    * How best-of-breed SD-WAN and all-in-one systems affect long-term remote office architecture
    * And most importantly, which provides the most value in different circumstances

    SPEAKERS
    Dr. Jim Metzler is the Founder and Vice President at Ashton, Metzler & Associates. Dr. Metzler has worked in many positions in the networking industry. His current interests include Application Delivery, Software Defined Networking and Network Functions Virtualization.

    Joel Christner is the VP of Marketing at CloudGenix and has two decades of experience in building distributed systems, infrastructure, and application delivery.
  • How Garanti Bank Delivers an Excellent End User Experience
    How Garanti Bank Delivers an Excellent End User Experience
    Çağdaş Başaran, Service Performance Management & Reporting, Garanti Bank & Ian Bromehead, Dir Product Marketing, Micro Focus Recorded: Dec 6 2018 61 mins
    With the rise of hybrid IT, it’s harder than ever to ensure that your business services are performing optimally and keeping users satisfied.

    How do you isolate issues across multi-cloud boundaries? How can you manage the volume of data coming at you from logs, metrics, and events? How can you prioritize issues to match business priorities, and become more proactive?

    Join us on this webcast to learn how Garanti Bank improved operational efficiency to support key business targets. We’ll also discuss the new features of Operations Bridge including automated AIOps and APM.
  • Best Practices to Increase Self-Service Success on Your Support Portal
    Best Practices to Increase Self-Service Success on Your Support Portal
    David James, Director, Product Marketing, Coveo Recorded: Dec 6 2018 37 mins
    It’s no surprise when it comes to resolving issues and finding information, customers prefer self-service. And organizations prefer it because it dramatically reduces support costs. But if you want to make great self-service a reality on your support portal, you need to give customers an intelligent and intuitive search experience and proactively recommend content that can help.

    Join us for this live webinar to learn the 6 best practices to increase self-service success & boost case deflection.

    In this webinar, we will:

    -Dive into what great self-service looks like and show you the formula for creating relevant support experiences
    -Share case study examples of successful support portals and communities using Coveo
    -Answer questions about AI-powered search capabilities

    If you’re a Customer Service Innovator, a Community Manager, or interested in the latest self-service trends, you won’t want to miss this info-packed session on the the power of AI-powered search to boost customer self-service.
  • DigiDevTransOps - Clearing the Confusion in Digital Transformation & DevOps
    DigiDevTransOps - Clearing the Confusion in Digital Transformation & DevOps
    Mark Smalley, the IT Paradigmologist and DASA Global Ambassador Recorded: Dec 6 2018 48 mins
    The title is a cynical reference to the hype around Digital Transformation and DevOps. There’s a lot of confusion and you may be wondering what the terms actually mean and what the relationship is between the two. If we look closer, we’ll see that DevOps has much to support Digital Transformation, but that it’s only one of the pieces in the Digital Transformation jigsaw puzzle.

    Mark Smalley, Global Ambassador DASA
  • How to Get Your Business Digital Ready
    How to Get Your Business Digital Ready
    Ghassan Abdo, Research VP, IDC and Danny Johnson, Director of Product Marketing, Verizon Recorded: Dec 6 2018 61 mins
    Join Verizon and Ghassan Abdo, Research VP, Worldwide Telecom Cloud, & Virtualization Services, IDC for an engaging discussion about digital transformation and what organizations should consider as they take the next step in their digital journey. Get more insight into the key findings from the recent IDC MarketScape: Worldwide Communication SP SD-WAN
    Managed Services 2018 Vendor Assessment as well as the IDC study, Digital Transformation: Discover the Right Path to Avoid Hype and Disappointment. Plus, find out what your organization needs to do to become a digital leader and improve business outcomes. Participants will be able to download a complimentary copy of the IDC study, Digital Transformation: Discover the Right Path to Avoid Hype and Disappointment, and a Verizon authored decision-maker’s guide.

    About the speakers:
    Ghassan Abdo, Research VP, WW Telecom Cloud, & Virtualization Services, IDC
    Mr. Abdo, Research Vice President in the Telecommunications group, covers the evolution of the Telco Cloud Ecosystem as well as the emerging Virtualized Enterprise Networking services. His primary focus areas include Service Provider SD WAN and Managed Services, and emerging NFV-based Virtual Networking Services as well as other Managed WAN Services. In the Hosting & Cloud segment, Ghassan covers Service Provider Managed Hosting services, including Hybrid Managed Private/Public Cloud Services, Colocation Services, Secure Cloud Connect and CDN services.

    The session will be moderated by Danny Johnson, 20+ year veteran in the technology industry. He is a seasoned executive possessing experience in software development, engineering, sales, consulting, product development, and marketing. Danny has started and launched innovative products and solutions within multi-billion dollar markets and is currently the head of product marketing for Verizon where he shares responsibility for the profitable growth of Verizon’s Strategic Network Portfolio.
  • Master the Art of Zero-Touch Deployments
    Master the Art of Zero-Touch Deployments
    Jim Grandbois, Solutions Architect, Jamf Recorded: Dec 6 2018 24 mins
    With imaging taking a back seat to the new era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable zero-touch deployment by automating enrollment and configuration from a central location — eliminating the need to ever physically touch the device.

    n our webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organization.
    We’ll cover:

    •An overview of Apple’s deployment programs
    •The benefits of zero-touch deployment
    •How to accomplish zero-touch deployment for macOS and iOS
  • Tech Trends 2019: 4 ways the digital workplace will change next year
    Tech Trends 2019: 4 ways the digital workplace will change next year
    Alex Bennett, Group SVP Go-to-Market, CX and Digital Workplace at Dimension Data Recorded: Dec 6 2018 32 mins
    2019 is going to be the year when companies make wholesale changes to how they engage and empower their employees, with behavioural analytics – powered by AI and machine learning – playing a significant role in making the digital workplace smarter than ever before.
    Join Alex Bennett, Group SVP Go-to-Market, CX and Digital Workplace at Dimension Data, as he chats about the four major digital workplace trends in 2019 that will help improve the user experience and streamline business processes. He will discuss:
    •How enterprises can use behavioural analytics – fuelled by AI and machine learning – to engage and empower their people.
    •Why applications are getting more intelligent and how to capitalise on their potential.
    •How a holistic approach to the digital workplace enriches culture, drives inclusion and reduces cost.
    •Why data authenticity is finally climbing up the corporate agenda.
  • Enterprise Service Management: A Look at the Forrester Wave with Charles Betz
    Enterprise Service Management: A Look at the Forrester Wave with Charles Betz
    Charles Betz, Principal Analyst, Forrester Recorded: Dec 6 2018 56 mins
    Enterprise service management solutions have expanded service thinking beyond IT. Vendor solutions enable organizations to broadly apply service management practices to the rest of the business, uncovering new value and improving service experiences across IT and non-IT business units. Forrester Research recently completed the first comprehensive survey covering 13 major ESM vendors.

    In this webinar we will discuss:

    - The relationship between enterprise service management and business process management.
    - The link between employee happiness, customer experience, and financial performance
    - The conceptual architecture of enterprise service management
    - What we at Forrester learnt from the ESM Wave research.
    - The relationship between DevOps and ESM.

    Join Charles Betz, Principal Analyst with Forrester, for an inside look at the latest Forrester Wave: Enterprise Service Management.
  • Dartmouth College's Network of the Future is Powered by AI
    Dartmouth College's Network of the Future is Powered by AI
    Mitch Davis, Dartmouth; Rahul Vir, Juniper Networks; Felix Windt, Dartmouth; Jeff Aaron, Mist Systems Recorded: Dec 5 2018 61 mins
    When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.

    In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.

    Watch now, and learn how to:

    - Gain visibility into the Wi-Fi user experience
    - Quickly troubleshoot network problems with an AI-driven virtual assistant
    - Predict network problems before they arise
    - Implement personalized location services, such as wayfinding and proximity notifications

    Panelists:
    Mitch Davis, CIO, Dartmouth College
    Rahul Vir, Sr. Director, Product Management, Juniper Networks
    Felix Windt, Network Engineer, Dartmouth College
    Jeff Aaron, VP Marketing, Mist Systems
  • 2019 and Beyond: Incident Detection and Response at Wire Speed
    2019 and Beyond: Incident Detection and Response at Wire Speed
    Chris Kissel, IDC, and Barbara Kay, ExtraHop Recorded: Dec 5 2018 54 mins
    While some innovations deliver material benefit, many aren’t worth your POC time. In this webinar, featured speaker Chris Kissel, Research Director, Security Products and head of the IDC security analytics and orchestration practice, will present new research on what will disrupt, what will innovate, and what will merely evolve in the security analytics market over the next several years. Futurescape trends provide insights on the best ideas enhancing incident detection and response and provide a look at the ideal use cases for the most beneficial new technologies.
  • Kaspersky Technical Talks Series - KATA / EDR Part 3
    Kaspersky Technical Talks Series - KATA / EDR Part 3
    Jibril Hassan, Executive Pre-Sales Manager | Kaspersky Lab Dec 12 2018 11:00 am UTC 42 mins
    A unified security solution for a new era of digital transformation.

    Join our technical team as they provide a deeper dive into the Kaspersky Anti-Targeted Attack (KATA) and Kaspersky Endpoint Detection and Response (EDR) platforms.

    Learn how:
    - it delivers complete visibility across the distributed enterprise environment, together with global threat statistics and reputations, providing contextualised, actionable Intelligence.
    - multi-dimensional advanced detection combines machine learning with advanced detection capabilities using static, behavioural, cloud reputation, sandboxing and pattern based detection engines, together with a Targeted Attack Analyser.
    - automated prevention of and response to advanced threats
    Verdicts are automatically shared via the platform with a whole spectrum of products, including email, web, endpoint and storage protection. As a result, instant action can be taken when an incident emerges.

    This session is highly recommended for technical roles and continues our series of technical talks. If you missed a previous one please check it out on our On-Demand Service.
  • The alchemy of data
    The alchemy of data
    Chris Wigget, Director Insights and Analytics, Britehouse a division of Dimension Data Dec 12 2018 3:00 pm UTC 60 mins
    Information is the heart of the modern organisation. For many years now business intelligence has been at the forefront of taking data and attempting to turn it into actionable insights.

    The truth is that traditional business intelligence approaches are not able to provide the digital organisation with the level of insight that the modern business environment demands.

    In this talk we’ll examine how traditional business intelligence is failing the modern, agile organisation, how simply embracing ‘the next big thing’ can backfire, and why organisations find themselves in this situation.

    We’ll also show how advanced analytics can help companies escape the information swamp and start turning the data they have into the information they need.
  • Enforcement & Containment with Segmentation
    Enforcement & Containment with Segmentation
    Josh King, Director of Security Solutions; Mark Moretti Vice President of Infrastructure and Security Dec 12 2018 6:00 pm UTC 60 mins
    You don't have to look far to find a current news story about ransomware taking down networks in record time, or a data breach involving millions of customer records by a malicious actor who has hid in an environment for months.

    In an "Assumption of Breach" world, we accept that it's statistically impossible to keep all the bad guys out. That inevitably at some point, we will receive that phone call or email that says it's happened to our organization. But that doesn’t mean we are powerless against it either. We have the tools and practices to help limit the impact that such an incident can have on our business, we just have to exercise them.

    Segmentation is one of those practices that has the ability to significantly impact your overall security posture, but it's impact depends on how well it's implemented. The industry has been using VLANs for segmentation for decades, but they are combat ineffective when it comes to stopping the spread of ransomware and other malicious threats.

    We need to look at more advanced capabilities like Data Center Next Generation Firewalls, Micro-Segmentation practices, Behavior Analytics, and even Network Access Control (NAC) among others to help us contain, mitigate, and eventually remediate the threats that face us.

    Join Josh King, Carousel's Director of Security Solutions to discuss what an assembly of the right mix of people, process, and technologies might look like to combat this evolving threat landscape.
  • Brinqa Enterprise Vulnerability Management Webinar - Part 3 of 4
    Brinqa Enterprise Vulnerability Management Webinar - Part 3 of 4
    Syed Abdur from Brinqa and Pezhman Nikpour from Slalom Consulting Dec 12 2018 7:00 pm UTC 32 mins
    Part 3: A real-world vulnerability management scenario

    In this part, we present a case study detailing vulnerability management at a Fortune 100 Utility company. The case study describes the challenges faced by this large organization and how they were able to systematically address them to achieve vulnerability management success. We will discuss process improvements, key risk and performance metrics, and the risk prioritization model implemented to ensure that critical assets and business functions were protected.

    If you have questions you'd like to submit before or after the webinars, we're here for you! Email me at troy.vera@brinqa.com or Tweet to @Brinqa using the hashtag #BrinqaWebinars
  • Kubernetes & Conda: The Machine Learning Killer Combo
    Kubernetes & Conda: The Machine Learning Killer Combo
    Elizabeth Winkler, Director of Product Management @ Anaconda Dec 12 2018 7:00 pm UTC 30 mins
    The rush to adopt machine learning practices has become ubiquitous in every industry. Enterprise data scientists want their AI models to be deployed into production to propel their organizations forward. Meanwhile, IT is looking for ways to enable their data scientists to build, train, and deploy their models in a way that does not compromise the security of their organizations, while making efficient use of resources like costly GPU clusters.

    Anaconda, the creator of Conda, has adopted Kubernetes as the standard for building and deploying ML models at speed and scale in Anaconda Enterprise. Learn why in this presentation from Anaconda Director of Product Management Elizabeth Winkler.

    Elizabeth Winkler has devoted her career to building SaaS products that leverage natural language processing and machine learning to extract meaning out of massive amounts of data. She is currently the Director of Product Management at Anaconda, the most popular Python data science platform. Previously, she built products at Atlassian, Salesforce, Spredfast, and a medley of startups.

    Elizabeth was born and raised in Mexico City and has lived in Paris, Milan, and San Francisco before calling Austin home. She is an avid world traveler and a polyglot fluent in English, French, and Spanish and quasi-fluent in Italian.
  • Containers: accelerating your move to a next-gen, on-demand digital data centre
    Containers: accelerating your move to a next-gen, on-demand digital data centre
    Nathan Vandenberg, General Manager – Data Centre, Dimension Data & Sean Bedford, Cloud Engineer, Google Dec 12 2018 11:00 pm UTC 60 mins
    Your enterprise is on a journey to become an on-demand digital business. Your data centre must be able to adapt and scale to achieve your desired digital outcomes. Emerging technology such as containers can unlock a myriad of operational and cost benefits to accelerate your move to a next-generation data centre.

    A 451 Research report commissioned by Dimension Data* found that 52% of enterprises are using container technology to transform that way work is done in their data centre.

    Containers solve the problem of portability and getting software to operate reliably when moved from one computing environment to another. In a next-generation data centre, containers achieve benefits including automation of workload provisioning, ability to scale and orchestration across technology.

    Join Dimension Data and Google on this webinar to find out how your business can take advantage of the opportunities presented by containers. We’ll discuss how containers work, the difference between virtualisation and containers, existing barriers in this space, how you can extend containers to the cloud and the benefits for your business.
  • Optimizing Cost of Quality through incremental Test Automation
    Optimizing Cost of Quality through incremental Test Automation
    Tero Piirainen, Director,Software Quality Assurance- M-Files Corp, Deva Veluchamy,Test Automation Consultant-Aspire Systems Dec 13 2018 2:00 am UTC 60 mins
    Aspire is conducting this webinar on the topic ‘Optimizing Cost of Quality through Incremental Test Automation’. This webinar is aimed at helping organizations understand the importance of measuring cost of quality and reducing cost of poor quality using incremental test automation.

    Key Takeaways:
    •Importance of Cost of Quality in Testing
    •Where testing spends more cost and how to reduce it
    •Role of Incremental test automation in reducing appraisal cost
    •Recommended tools and methodologies
    •Sample Use Case showing the reduction in CoQ
  • Top 3 IT Automation Use Cases that Bridge People, Process, and Technology
    Top 3 IT Automation Use Cases that Bridge People, Process, and Technology
    Jeff Battaglino Dec 13 2018 4:00 pm UTC 60 mins
    Automation is changing the way we work and live. From self-driving cars to AI-powered virtual assistants, everyone is scrambling for the latest in automated technology.

    The immense pressure for digitized business operations leaves enterprise organizations searching for process automation that improves accuracy and speed, while transforming the customer experience.

    In this webinar you will experience three process automation use cases that will free-up staff to work on more productive projects, reduce human error, and provide faster, more efficient responses to incidents and requests.
  • A new approach to IT Service Management: Selfless Service
    A new approach to IT Service Management: Selfless Service
    Sanjeev NC, Solutions Architect, Freshworks Dec 13 2018 4:00 pm UTC 31 mins
    Service desks are closer to the customers than we can ever imagine. With self-service adoption on the rise and Service desks making it easy for their users to reach them, why do we still hear IT agents complaining users don’t raise tickets? Can we get the Service desk closer to the customers? What if the Service desk lives where the customers are already there?

    This talk explores the possibility of approaching Service management with a selfless mindset focusing primarily on self-service and customers logging tickets with the service desk. A selfless approach takes a lot of effort but not without its benefits.

    About Sanjeev NC;

    Sanjeev is a Solution Architect helping Enterprise customers with their ITSM tool implementation. He’s an ITSM enthusiast with consulting, blogging & speaking experience and enjoys delivering content creatively through memes, comics and puns. He is currently on a mission to ensure every customer support interaction yields the best possible experience.
  • Achieving Real-Time Operations: Latest Integrations for Process Automation
    Achieving Real-Time Operations: Latest Integrations for Process Automation
    Andrew Marshall, PagerDuty; Sean Higgins, PagerDuty; Monte Montoya, Cprime Dec 13 2018 5:00 pm UTC 25 mins
    Over 3,000 Atlassian users count on PagerDuty’s 300+ integrations to power their end-to-end real-time digital operations—and we’re excited to launch a comprehensive set of integrations for the Atlassian suite, which allows Atlassian users to add PagerDuty’s real-time digital operations capabilities to their everyday work.

    In this webinar, PagerDuty product manager Sean Higgins And CPrime’s Monte Montoya will show you how PagerDuty’s new Atlassian integrations help teams automate processes throughout the DevOps lifecycle, save time, and take full advantage of Jira Software, Jira Service Desk, Bitbucket, Statuspage, and other Atlassian tools.
  • The Future of Backup Isn't Backup
    The Future of Backup Isn't Backup
    Steve Blow Dec 13 2018 6:00 pm UTC 34 mins
    Old school backup is out! Today’s digital consumers demand an always-on level of service that backups simply cannot provide. Learn how continuous data protection is changing the way companies think about backup.

    Listen in as Steve Blow, Technology Evangelist, explains Zerto’s vision for the future of backup and learn how continuous journal-based protection is disrupting legacy backup. The recently announced Zerto IT Resilience Platform™ converges backup, disaster recovery, and cloud mobility solutions into a single, simple, scalable platform.
  • Reimagining the Contact Center with Bots & AI
    Reimagining the Contact Center with Bots & AI
    Abinash Tripathy, Co-founder, Helpshift Dec 13 2018 6:00 pm UTC 60 mins
    Bots, artificial intelligence, and messaging — cost-effective, easy-to-implement automation technology —- is gaining a major foothold in customer service organizations, and the impact is palpable. Contact centers are on track to shrink by 50 percent in the next three years as routine tasks are taken over by faster, efficiency-saving bots that can triage requests, boost customer satisfaction, and offer an 8.6 percent increase in profit margin per customer.

    These technologies are also making it easy to tap into the gig economy, which is producing a growing supply of tech-savvy labor for companies that also saves costs. For workers, it means flexible arrangements with low barriers to entry, plus more satisfying employment, now that the grunt work has been eliminated by automation.

    AI and automation is set to level up the workforce, the economy, and your bottom line. For a closer look at the long-term implications of automation, how to invest in the brave new world of work, and more, don’t miss this VB Live event!

    Attend this webinar and learn:

    * The workforce implications of customer service bots
    * How bots and employees can work side-by-side
    * What smart companies are doing to lay the groundwork
    * Future of work - what does it look like?

    Speakers:

    * Abinash Tripathy, Co-founder, Helpshift
    * Peter Ryan, Principal Analyst, Ryan Strategic Advisory
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Helpshift
  • Maximize IT Efficiency with SAM on a Single Platform
    Maximize IT Efficiency with SAM on a Single Platform
    Ryan Wood-Taylor, Martijn Braamskamp Dec 13 2018 9:00 pm UTC 63 mins
    Join this webinar to learn how you can enable end-to-end software life cycle management from a true single platform to optimize software spend and reduce license compliance risk. You will hear from Softline, a ServiceNow SAM partner, about the critical functions and processes that can make your SAM program successful. See a demo of how embedding SAM into everyday IT management such as IT infrastructure changes and Application Portfolio Management are industry game changers.

    Imagine what’s possible when you run SAM from the same place you manage IT.

    In this webinar, you’ll learn:

    How to reduce your software spend
    Where to mitigate license compliance risk
    To drive action natively on the Now platform with intelligent IT operations
  • Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Daniela Fusaro, Senior Solutions Architect Dec 14 2018 9:00 am UTC 30 mins
    Trotz der unstillbaren Nachfrage nach Bandbreite müssen Unternehmen die Sicherheitsrichtlinien des Netzwerks immer noch schnell überprüfen und durchsetzen. Das ist besonders schwierig, wenn Sie Netzwerke von 10 Gb auf 40 Gb oder von 40 Gb auf 100 Gb aufrüsten.

    Nehmen Sie teil am Webcast von Daniela Fusaro, Senior Solutions Architect bei Gigamon. Sie erläutert, wie Sie die mit diesen Netzwerkupgrades verbundenen Sicherheitsrisiken lösen, Ihre Sicherheit stärken, die IT vereinfachen und Kosten senken können.

    Sie erfahren folgendes:
    - Erhöhen Sie Ihren ROI für die Sicherheit: Filtern Sie die richtigen Daten aus dem Netzwerkverkehr der physikalischen, virtuellen und Cloud-Infrastruktur und leiten Sie diese an die relevanten Tools weiter
    - Reduzieren Sie Ihr Sicherheitsrisiko: Überdenken Sie Ihre Netzwerksicherheitsarchitektur neu, indem Sie verschlüsselten Datenverkehr nur einmal entschlüsseln und die Überprüfung dieser Daten durch mehrere Sicherheitstools ermöglichen
    - Verbessern Sie die Reaktion auf Bedrohungen: Erkennen Sie Muster und Bedrohungsvektoren in heterogenen Netzwerken schneller

    Finden Sie heraus, wie sowohl Netzwerk- als auch Security-Teams bei Netzwerk-Upgrades schneller und sicherer zusammenarbeiten können, um Sicherheitsbedenken zu lösen - registrieren Sie sich noch heute!
  • Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Aria Naderi; Zbigniew Skurczynski Dec 18 2018 9:00 am UTC 60 mins
    IT-Vorfälle treten ständig auf, von Ausfällen, Verlangsamungen von Anwendungen bis hin zu Cyberangriffen und einigen, die kritischer sind als andere. Bei IT-Vorfällen, die eine sofortige Aufmerksamkeit erfordern, müssen IT-Experten rechtzeitig einbezogen und verschiedene Gruppen informiert und/oder aktualisiert werden. Die Herausforderung, vor der die meisten Unternehmen stehen, besteht in der Koordination der Reaktion auf IT-Vorfälle, wenn Zeit im Vordergrund steht. Zum Beispiel, wie man:
    Sammeln und verwalten Sie alle relevanten Informationen zentral.
    Identifizieren Sie den geeigneten Informationsaustausch mit verschiedenen Rollen.
    Sicherstellung einer zeitnahen und effektiven Reaktion zwischen den Teams
    Ermöglicht eine effiziente Zusammenarbeit unabhängig vom Standort der Mitarbeiter.

    In diesem Webinar erläutern Aria Naderi von Cherwell und Zbigniew Skurczynski von Everbridge, wie die integrierte Cherwell-Everbridge-Lösung Unternehmen bei der Verwaltung, Kontrolle und Automatisierung ihrer Reaktion auf IT-Vorfälle unterstützt, um die Auswirkungen auf ihre IT-Experten und ihr Unternehmen zu minimieren.
  • Passwords: The Keys to your (Online) Kingdom
    Passwords: The Keys to your (Online) Kingdom
    David Emm, Principle Security Researcher and Prof. Steven Furnell, Professor of Information Security, University of Plymouth Dec 18 2018 11:00 am UTC 75 mins
    24/7 connectivity is fast becoming an integral part of everyday life. Most of us now routinely bank, shop and socialise online, and the Internet is the life-blood of business.

    Yet too many of us fail to secure our online identities adequately. This presentation will examine why this is important, what we should do to secure our online accounts and how criminals exploit our lack of security.

    **************************************************************************************************

    Steven Furnell is a the Associate Dean and IT Security Professor at the University of Plymouth. His research interests spans multiple areas including: Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security; Internet Technologies and Applications; Mobility.
    A published author, Steven will share his insights we can all individually make it harder for Cyber Criminals to access your passwords.

    David Emm is a Principle Research Analyst at Kaspersky Lab and regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable adviser on all aspects of online security.
  • [Panel] Women in ITSM: Opportunities, Lessons, Challenges and Advice
    [Panel] Women in ITSM: Opportunities, Lessons, Challenges and Advice
    Claire Agutter, Simone Jo Moore, Sally Bogg, Elisabeth Thomas, Andrea Kis Dec 18 2018 4:00 pm UTC 61 mins
    Join Claire Agutter, Simone Jo Moore, Sally Bogg, Elisabeth Thomas and Andrea Kisfor an open, honest discussion about the opportunities, lessons and challenges found in a career in ITSM. From entering the industry, to forging a career and making a difference, this one-off panel discussion will explore all facets of being a woman in ITSM in 2018.
  • How to Build a World Class Monitoring Strategy, Hosted by AWS & LogicMonitor
    How to Build a World Class Monitoring Strategy, Hosted by AWS & LogicMonitor
    Sam Khidhir, AWS Solutions Architect & Sarah Terry, LogicMonitor Sr. Product Manager Dec 18 2018 4:30 pm UTC 44 mins
    When it comes to IT infrastructure, hybrid is the new normal.

    Understanding true performance across cloud-based infrastructure and your on-prem systems can be complex. But with the right monitoring approach, you can expect the same comprehensive insight and quick resolution time from your hybrid environment as you've always enjoyed with your legacy systems.

    Learn from leading industry experts AWS and LogicMonitor as they present the key components of a world-class performance monitoring strategy, along with a framework to improve monitoring effectiveness.

    Join AWS Solutions Architect Sam Khidir and LogicMonitor Sr. Product Manager, as they discuss how to build the ideal framework for monitoring effectiveness in a hybrid IT environment.

    How to Build a World Class Monitoring Strategy will cover:

    • Best practices for viewing performance, availability, and cost across hybrid systems
    • How to ensure the right teams are getting notified of the right issues
    • Tips tips to reduce mean time to resolution in a hybrid environment
  • ServiceNow Predictions for 2019
    ServiceNow Predictions for 2019
    Ellen Daley, Meghan Lockwood, Adam Mason, Dan Lyons, Dale Meyer-Curley, James Hamilton Dec 18 2018 6:00 pm UTC 60 mins
    Our Experts Weigh In: ServiceNow trends should you look for in 2019

    On Tuesday, December 18th, 1:00 PM EST, 10:00 AM PST, join our panel of 6 ServiceNow enthusiasts as they share what they're looking forward to and what trends they see on the rise in 2019 and beyond for ServiceNow.

    - Artificial Intelligence/Virtual Agent Technology
    - Customer Experience
    - ESM Strategies
    - Big Data & Data Analytics
    - Global Business Services... and more!

    Register Today!
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Dec 19 2018 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:

    Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • ABCs of AI
    ABCs of AI
    Sudheer Matta, VP of Product, Mist Dec 19 2018 5:00 pm UTC 56 mins
    There's a lot of buzz around Artificial Intelligence and how it can help IT operations. There's also a lot of confusion.

    Watch this on-demand AI:rchitect series webinar where we'll cut through the AI noise. In this interactive session, we'll cover:

    - The need for AI-driven IT
    - The difference between AI, machine learning, deep learning, data science, and other common techniques
    - Ways to implement data science in your Wi-Fi network
    - How to prepare yourself (and your IT team) for the transition to AI-driven IT
  • Best Practices for Network Packet Aggregation and Visibility Webinar Series
    Best Practices for Network Packet Aggregation and Visibility Webinar Series
    Eric Gray, Chief Solutions Architect, NETSCOUT and Erik Hjelmstad Security Visibility Specialist, NETSCOUT Dec 19 2018 6:00 pm UTC 60 mins
    You need full traffic flow visibility for your service assurance and cyber security tools to perform effectively. This means that they should only process the traffic they are designed to see. Otherwise, they waste precious resources filtering or load balancing packets before the security logic can be applied.

    Please join NetScout for the first of our 4-part series on Best Practices for Packet Aggregation. In this first session you will learn:

    • Why organizations are turning to packet aggregators help control their costs of network security and monitoring tools.
    • What packet aggregators do and how they function.
    • What you should consider when selecting the right packet aggregator for your environment?

    Please join NETSCOUT Technology experts, Mark Doering and Eric Gray for this webinar focused on demystifying the market offerings around packet aggregation.
  • Break the chains of legacy virtualization
    Break the chains of legacy virtualization
    Bhavani Yellapragada, AVP of DevOps, Nasdaq Dec 19 2018 6:00 pm UTC 60 mins
    IT leaders look to technology as a business differentiator and rely on it to foster innovation. Enterprises have discovered that hyper-converged infrastructure (HCI) can be the foundation of a modern, cloud-like datacenter. But don’t stop there — going beyond HCI delivers more savings, increases IT agility, and supports multi-cloud goals when you add virtualization as an integral part of your stack.

    How do you harness the power of HCI and virtualization? Sure, there are a wide variety of tools on the market, but choosing the wrong HCI platform could limit your options in how you operate your datacenter or could impede cloud goals — including those associated with virtualization.

    To learn more about the power of HCI and virtualization, how virtualization can remove complexity and increase efficiency, and how to choose the right HCI tool, don’t miss this VB live event!

    Registration is free.

    Attend and learn:
    * How virtualization platform options on the market compare
    * Why to consider changing virtualization solutions
    * How to choose the right virtualization solution
    * How to save thousands in virtualization licensing costs

    Speakers:
    * Bhavani Yellapragada, AVP of DevOps, Nasdaq
    * Mike Wronski, Principal Marketing Manager, Nutanix
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Nutanix
  • Enterprise-Wide Kubernetes Episode 4: Secrets Management with Vault
    Enterprise-Wide Kubernetes Episode 4: Secrets Management with Vault
    Jim Bugwadia Dec 19 2018 7:00 pm UTC 60 mins
    In this episode of the Enterprise-Wide Kubernetes series, we will show
    how Nirmata makes it easy to integrate your Kubernetes clusters and
    workloads with Vault for enterprise grade secrets management.

    What to expect:
    1. Learn best practices for managing secrets in Kubernetes.
    2. Get an overview of HashiCorp Vault and learn how to use the tool for managing secrets i.e. sensitive data like passwords and access keys.
    3. Discover Nirmata integrations with Vault.
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Dec 20 2018 11:00 am UTC 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM