Hi [[ session.user.profile.firstName ]]

IT Service Management

  • Veritas and AWS: 350 Data Management in a Multicloud World
    Veritas and AWS: 350 Data Management in a Multicloud World
    Rick Wissenz, Matt Sirbu, Jeremy Snow Recorded: Jun 17 2019 44 mins
    Storage cost, the risk of data corruption, and increased strain on IT's time and resources is why many orgniazations look at backup and disaster recovery as their first meaningful move to the public cloud.

    Our webinar: 360 Data Mangement in a Multicloud World with Veritas, AWS, and Softchoice will discuss the effective ways to move and protect your data in AWS.

    In this webinar you’ll learn:

    - Data management and protection across multiple use cases:
    -Backup and Restore
    -Large Data Archive and Recovery
    -Onsite Virtualization Replication, Backup and Failover
    -Multi-site Replication Failover
    -How optimizing your data prior to migration helps you in:
    -Compliance risk
    -Cost overruns
  • Miten tunnistaa strateginen kyvykkyys?
    Miten tunnistaa strateginen kyvykkyys?
    Timo Valli (FM, eMBA), Kirsi Elina Kallio (FL) Recorded: Jun 14 2019 29 mins
    Miten tunnistaa strateginen kyvykkyys?

    Strategisilla kyvykkyyksillä tarkoitetaan organisaation kykyä hallita toimintansa kannalta merkittäviä järjestelmiä, rakenteita ja prosesseja. Digitaalisessa transformaatiossa on usein kyse juuri uudenlaisen strategisen kyvykkyyden rakentamisesta.

    Miten sitten tunnistaa strategian kannalta kriittiset kyvykkyydet, joita kannattaa kehittää? Toisaalta, miten tunnistaa vanhentuneet kyvykkyydet, jotka eivät enää tuota arvoa liiketoimintaan? Miten kyvykkyys eroaa taidon ja osaamisen käsitteistä? Voiko liiketoimintaa kehittää ilman strategisesti kriittisten kyvykkyyksien tunnistamista?

    Webinaarissa saat konkreettisten esimerkkien kautta vinkkejä strategisten kyvykkyyksien tunnistamiseen omassa organisaatiossasi. Aiheeseen johdattelijoina toimivat Smart Capability Management -konseptin kehittäneet Vallum Oy:n asiantuntijat. Smart Capability Management on toimintamalli, joka auttaa yrityksiä tunnistamaan, hallitsemaan ja uudistamaan strategiansa kannalta merkittäviä kyvykkyyksiään.



    Puhujat:

    Timo Valli (FM, eMBA) on johtaja, joka on tehnyt pitkän työuran vakuutus- ja terveyspalvelualoilla sekä julkisen hallinnon suurissa organisaatioissa. Timo muistetaan mm. Valtiovarainministeriön ict-johtajana ja Valtion tieto- ja viestintätekniikkakeskus Valtorin hallituksen puheenjohtajana. Tällä hetkellä hän toimii digi- ja alusta-ajan uutta työtä (New Work) jäsentävän Vallum Oy:n toimitusjohtajana ja strategiakonsulttina.

    Kirsi Elina Kallio (FL) on kokenut työtoiminnan kehittäjä ja tutkija. Hän on opettanut, valmentanut ja tutkinut työelämän oppimiseen ja muutokseen liittyviä teemoja yrityksissä ja yliopistoissa yli kahdenkymmenen vuoden ajan. Yrittäjänä Kirsin erityisalaa on kasvattaa asiakasyritystensä kilpailukykyä tarjoamalla tieteellisesti testattuja välineitä strategisten kyvykkyyksien rakentamiseen.
  • Doing AI with AI: How Open-Source AI Platforms Help Data Scientists
    Doing AI with AI: How Open-Source AI Platforms Help Data Scientists
    Sinisa Nikolic AP DirecDirector IBM Systems for Cloud and Cognitive Platforms Recorded: Jun 14 2019 26 mins
    H2O.ai, a leading open source machine learning and artificial intelligence platform, is here to help data scientists do 'AI with AI!.' H2O.ai is a Leader in the 2018 Gartner Data Science and Machine Learning Platforms and is already driving value in 50% of the Fortune 500 companies and 14,000 enterprises globally.



    Listen to this webinar to find out how you can benefit from this industry leading ML & AI platform.



    - How H2O Driverless AI works
    - How H2O Driverless AI complements IBM’s own PowerAI platform
    - Why IBM Power Systems enables H2O’s platform to get maximum performance gains
  • Move From One Bot to Many
    Move From One Bot to Many
    Steve Walker, Roger Arias Recorded: Jun 13 2019 28 mins
    Robotic process automation, or RPA, can speed up and improve many rote business processes. Learn how to scale up or expand into other areas of your business with tips to accelerate your success, from technologies to processes, in a center of excellence framework.
  • Live Demo of OptiView XG
    Live Demo of OptiView XG
    Mike Pennacchi, Network Protocol Specialists Recorded: Jun 13 2019 64 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • Peripherals on the periphery: Security in the Internet of Things
    Peripherals on the periphery: Security in the Internet of Things
    Michael Howard, Head of Security, HP Inc. Recorded: Jun 13 2019 7 mins
    Michael Howard, Head of Security at HP, gives an overview on IoT with regards to Print Security. He will also share about the challenges and disparity in devices.
  • DevOps ja SAFe: tehokkuutta arvontuottoon
    DevOps ja SAFe: tehokkuutta arvontuottoon
    Vesa Purho, Tuuli Pesonen Recorded: Jun 13 2019 55 mins
    Mietitkö mistä lähteä liikkeelle DevOps muutoksessa?

    Haluatko holistisen näkökulman DevOpsiin?

    Tule kuuntelemaan Talent Basen ketterien valmentajien käytännön kokemuksia ja oppeja DevOpsista SAFe-mallin kannalta katsottuna. Webinaarissa käydään läpi eri näkökulmia DevOpsiin ja tekemisen optimointiin. Lähtökohtana on kehityksen kokonaisprosessin ymmärtäminen ja arvontuoton lisääminen tunnistamalla ja avaamalla hidasteita prosessin sisältä.
  • SD-WAN Security 101: Defining and Ensuring Security through the Cloud
    SD-WAN Security 101: Defining and Ensuring Security through the Cloud
    David Van-Schravendijk, Product Marketing Cisco Meraki Recorded: Jun 13 2019 55 mins
    IT admins are tasked with maintaining network security and uptime, whilst juggling increasing demand for bandwidth and keeping WAN costs down. Discover in this webinar how Meraki SD-WAN can dramatically reduce the deployment and operational complexity associated with traditional solutions, without sacrificing security!
  • Driving Digital Transformation with Application Intelligence
    Driving Digital Transformation with Application Intelligence
    John LeHane, Product Marketing Gigamon Recorded: Jun 13 2019 19 mins
    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    Join us for our 20 minute interactive webcast to see how application-aware network visibility can accelerate your organization’s digital transformation.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and its tools.
  • Dropbox + Forrester Webinar: Building Your Digital Transformation Strategy
    Dropbox + Forrester Webinar: Building Your Digital Transformation Strategy
    Rob Koplowitz, VP & Principal Analyst with Forrester Recorded: Jun 12 2019 28 mins
    Digital transformation requires radically different thinking about the role of technology in driving business outcomes. While it’s easy to focus exclusively on customer facing technologies, without an end-to-end technology strategy, these initiatives are doomed to fall on the scrap heap of failed “digital illusions”.

    To drive true change, you must consider the role of your end-to-end technology strategy with an eye toward a foundation that supports new and very different business journeys and outcomes.

    Join Rob Koplowitz, VP & Principal Analyst with Forrester, to learn about the role of a solid technology foundation in supporting your digital transformation strategy.
  • Windows 10 & Office 365 Migration and Optimization Strategies
    Windows 10 & Office 365 Migration and Optimization Strategies
    Matt Crawford, Citrix Dir. Solutions Marketing and Matt Brooks, Citrix Sr. Technical Product Marketing Mgr. Recorded: Jun 12 2019 51 mins
    Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.

    With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.

    For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:

    •Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
    •Windows 10 application incompatibilities
    •Mobile security risks with running Exchange on-prem
    •Network latency from running O365 in the cloud
    •Managing multiple file hosting services including OneDrive
  • How to Create a Self-Service Portal that Revolutionizes the Employee Experience
    How to Create a Self-Service Portal that Revolutionizes the Employee Experience
    Matt Klassen, VP of Product Marketing, Cherwell Software Recorded: Jun 12 2019 46 mins
    IT teams are under increasing pressure to deliver a service experience that meet both the needs and the expectations its users. As today’s workforce comes to expect greater self-sufficiency, along with personalized and instantaneous service, IT organizations must establish a self-service strategy that elevates—if not revolutionizes—the employee experience.

    In this webinar, Matt Klassen, VP of Product Marketing for Cherwell, will discuss how (and why) the employee experience has become central to mission of IT, and why the IT self-service portal must become the new “face of IT.” He will offer practical guidance on how to create an IT self-service portal that:

    • Maximizes portal utilization and engagement
    • Automates and streamlines the request and fulfillment process
    • Provides the visibility needed to spot trends and identify areas for improvement
    • Improves productivity for both IT staff and employees
  • June Patch Tuesday 2019
    June Patch Tuesday 2019
    Chris Goettl, Brian Secrist Recorded: Jun 12 2019 63 mins
    Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
  • How to Make Open Source Experimental AI Deployments in the Enterprise
    How to Make Open Source Experimental AI Deployments in the Enterprise
    Scott Campbell, Senior Offering Manager IBM Watson . Kelvin Lui, Technical Product Manager Recorded: Jun 12 2019 51 mins
    Artificial Intelligence (AI) and Machine Learning (ML) became buzzwords in 2018. But only two-fifths (39%) of senior executives believe their organizations are getting the most value out of AI and machine learning according to a RELX Emerging Tech Executive Report, which polled 1,000 US senior executives.



    The question then before enterprises is how they go from proof of concepts to production by transitioning their ML/DL sandboxes into mission-critical AI deployments. In this webinar, you will learn how to capitalize on an open-source based Enterprise AI platform. It enables:



    • Elastic distributed Training: Scale GPUs as Required

    • Drastic reduction of ML/DL Training times: days to hours, hour to minutes

    • Secured and multi-tenant environment

    • Larger, more complex model support

    • Automatic Quality of Service (QoS)
  • Top 5 Best Practices to Reduce Incident Volume
    Top 5 Best Practices to Reduce Incident Volume
    Joe Foley, Director of IT Business Analytics Recorded: Jun 12 2019 52 mins
    Every IT organization would like to reduce the number of incidents they experience. The rewards for achieving this are substantial: fewer business disruptions, lower IT costs, and the ability to concentrate talent on growth and innovation.

    However, with your organization experiencing ever-increasing complexity, where do you start? In this on-demand webinar, Joe Foley, Director of IT Business Analytics Services, and Jim Henaghan, Solutions Consultant, speak about the experiences of companies like yours. Topics that will be covered include:

    - Proactive analytics-driven incident reduction strategies that target the highest impact problem hot spots
    - How Machine Learning models can help predict incidents and reduce incident volume
    - Using analytics to bring together siloed teams and standardize on best practice processes
    - How text analytics techniques can help extract insights trapped in unstructured data
  • The Future of Service and Support: A Brave New World!
    The Future of Service and Support: A Brave New World!
    Jeff Rumburg, Managing Partner at MetricNet Recorded: Jun 11 2019 64 mins
    IT Service and Support organizations worldwide are moving aggressively towards new business models. ITIL 4, AI, and hiring practices that place a premium on business skills are radically altering the landscape of the industry. A bright future awaits those who are prescient enough to embrace these industry megatrends, while those who are slow to adapt will operate at a significant disadvantage for many years to come.

    In this webcast, Jeff Rumburg, Managing Partner at MetricNet, will use industry benchmarking data to connect the dots and present a vision of the service organization of the future. Attendees will learn how people, process and technology are converging upon a tipping point that will radically reshape the support industry of the future.
  • AWS Best Practices - Amazon GameLift
    AWS Best Practices - Amazon GameLift
    Lance Allen Recorded: Jun 11 2019 40 mins
    Thousands of hours go into making video games. They are large, complex software entities that require maintaining. In addition to writing the game code, game developers can become distracted with writing the infrastructure code responsible for building the infrastructure for hosting, maintaining and operating all the compute, storage, and network.

    Enter...Amazon GameLift, a managed game server hosting service that allows developers to integrate an autoscaling game backend by adding the GameLift SDK into their application. It is a simple toolkit for bypassing the overhead of managing all that infrastructure alone. In this webinar, we'll discuss how AWS GameLift can be used to run multi-player games in the cloud. We will cover:

    - AWS GameLift service overview
    - Deploying game code as Builds
    - Setting up Matchmaking and Queues
    - Launching Fleets and Aliases
    - Optimizing cost using FleetIQ and spot instance fleets
    - Monitoring using Cloudwatch and the GameLift console
  • Application Monitoring in the Enterprise: Frustration, Pain, and Hope
    Application Monitoring in the Enterprise: Frustration, Pain, and Hope
    Mike Julian, CEO, Duckbill Group Recorded: Jun 11 2019 48 mins
    Improving application monitoring platform in a large enterprise is no easy feat: it's ripe with pitfalls, gotchas, and comes with plenty of frustrating aspects that smaller companies don't often experience. Seemingly simple questions around "Who gets paged for this?" can turn into a week's worth of meetings, and never mind coming to consensus around what tools you should be using.

    Join Mike Julian, author of O'Reilly's Practical Monitoring and Editor/Analyst at Monitoring Weekly, on June 11th at 9am Pacific as he shares advice from people who have led an overhaul of monitoring systems in large companies, as well as his own experiences. When you attend, you will hear about:

    - Why monitoring in an enterprise is so difficult
    -Understanding the *real* pains your internal customers are experiencing
    - How to get buy-in (and budget!) for your major changes
    - Designing a platform architecture that won't lead to frustration six months in

    ...

    Mike Julian is the CEO of The Duckbill Group, a consultancy helping companies lower their AWS bills. When he's not wondering what he's gotten himself into, Mike is the host of the Real World DevOps Podcast and editor/analyst at Monitoring Weekly. He wrote Practical Monitoring (O'Reilly), a book about actionable ways to improve your monitoring. He was previously an SRE/DevOps Engineer/system administrator for companies such as Taos Consulting, Peak Hosting, Oak Ridge National Laboratory, and many more. Mike is originally from Knoxville, TN (Go Vols!) and currently resides in Portland, OR.
  • How to Build a World Class Monitoring Strategy
    How to Build a World Class Monitoring Strategy
    Sarah Terry, Product Manager, LogicMonitor & Sam Khidhir, Solutions Architect, AWS Recorded: Jun 11 2019 43 mins
    IT leaders agree that performance monitoring is absolutely critical to their success, yet the design and execution of a monitoring strategy can often be an afterthought. During this webinar, LogicMonitor and AWS will present the key components of a world-class performance monitoring strategy, along with a framework to improve monitoring effectiveness.

    We'll cover best practices for:

    Achieving visibility into the performance, availability, and cost of your cloud environment, and visualizing this alongside the rest of your hybrid IT infrastructure
    Alerting on monitored data, and routing alerts to ensure that the right people are notified of issues
    Leveraging dashboards and performance insights in order to reduce time spent troubleshooting
  • The role of threat intelligence in an effective security operation
    The role of threat intelligence in an effective security operation
    Oleg Glebov, Threat Management and Defense Solution Leader, Alexander Liskin, Heuristic Detection Group Manager Kaspersky Recorded: Jun 11 2019 59 mins
    Experts predict a busy year for cybersecurity threats… a rise in general and accidental malware infections, an increased risk of targeted ransomware attacks and new types of malware and malicious tools all lie ahead.

    Threat intelligence is a key component of any effective security operation. Without exceptional, coordinated threat intelligence, cyber threats simply can’t be reliably identified or stopped.

    Kaspersky is hosting a webinar on the key role of threat intelligence in an effective security operation. The webinar will be presented by Oleg Glebov, solution leader for our Threat Management and Defense portfolio and Alexander Liskin, Kaspersky anti-malware research expert.

    The webinar is aimed at anyone with a professional interest in cybersecurity and threat intelligence, in particular IT security officers, incident response specialists and SOC analysts.

    The webinar will cover the following topics:
    • the current threat landscape – and the methods cybercriminals use to evade detection;
    • the critical role threat data feeds play in protecting you from attack;
    • the increasing importance of proven, established sandboxing – and the capabilities of Kaspersky’s Cloud Sandbox;
    • APT and Financial Threat Intelligence Reporting;
    • how our experts use Threat Lookup for incident investigation;
    • Kaspersky’s Threat Intelligence Services – and how we can help build a comprehensive Incident Response (IR) framework with our Threat Intelligence Portal and Cloud Sandbox.
  • Live Tutorial: Stay Secure and Compliant in the Cloud with CloudCheckr
    Live Tutorial: Stay Secure and Compliant in the Cloud with CloudCheckr
    Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Jun 6 2019 33 mins
    Unlike in the Data Center, where an enterprise had complete responsibility for security, the Cloud is different. There is a Shared Responsibility Model. Cloud providers like Amazon Web Services, Microsoft Azure and Google Cloud take responsibility for items under their control, but customers must secure their data and applications. Fortunately, there are hundreds of Best Practice Checks provided by CloudCheckr, that can help automate this. Additionally, those checks are mapped to compliance standards and CloudCheckr's Total Compliance scores an organization according to 35 distinct regulations including CIS, HIPAA, PCI DSS, NIST and more.

    Just because an enterprise achieves a level of compliance, that doesn't guarantee it will stay there. CloucCheckr's Change Monitoring, combined with Custom Alerts, can help keep a cloud secure. Attendees will learn how CloudCheckr's 550+ Best Practice Checks can help, including automation via Fix Now, Always Fix and Request Fix.

    CloudCheckr is a robust Cloud Management Platform that, in addition to Security & Compliance, delivers Cost Optimization, Automation, and Invoicing capabilities. Look for our other tutorials on those topics.
  • Moogsoft Partner Program & Product Roadmap Webinar
    Moogsoft Partner Program & Product Roadmap Webinar
    Steve Kazan, VP of Alliances & Gabriel Coelho-Kostolny, Sr. Product Director Recorded: Jun 6 2019 58 mins
    Hello,
    Please join Moogsoft for a webinar on June 6th at 9AM Pacific time. Presenting will be Gabriel Coelho-Kostolny, Senior Director of Product Management and Steve Kazan, VP of Channels & Alliances.

    The presentation will be about our new product release, version 7.2 and product roadmap and AIOPs vision, with time for questions.

    Who should attend:
    - Pre and post sales technical teams interested in AIOPs and the ways Moogsoft can provide tremendous value to large enterprise accounts
    - Managed Services product managers interested in either creating new sources of top-line revenue or operational cost savings
    - Professional services staffs interested in creating new revenue streams from your client base.

    Or anyone interested in capturing a share of the $11.1 billion dollar AIOps market!

    Please register for this session by completing the form and clicking below.

    We look forward to having you at this lively and stimulating event.
  • How to Enforce Threat Intelligence at Your Perimeter
    How to Enforce Threat Intelligence at Your Perimeter
    Tom Bienkowski, Director, Product Marketing, NETSCOUT Recorded: Jun 6 2019 34 mins
    Be it public, commercial, or private, cyber threat intelligence comes from many different sources and plays a vital role in an organization's cybersecurity strategy. But threat intelligence by itself is useless unless it can be made actionable.

    So, once you have that intelligence in hand, how do you enforce it at the perimeter of your network?

    Register for this live webinar and learn about:
    •Utilizing threat intelligence from a variety of sources;
    •How stateless technology at the network perimeter can take the load off stateful devices such as NextGen Firewalls;
    •The latest threat trends identified in NETSCOUT's Threat Intelligence Report and 14th Annual Worldwide Infrastructure Security Report.

    Register today, space is limited.
  • 5 Critical Contact Center Technology Trends to Explore Right Now
    5 Critical Contact Center Technology Trends to Explore Right Now
    Paul Berardis, Contact Center Director; Jason Viera, Chief Technology Officer Recorded: Jun 6 2019 37 mins
    Discover and Learn More About All Things Cloud, including CRM Center Workflow, Chatbots, AI, and Robotic Process Automation

    Join us as Carousel Contact Center Director Paul Berardis discusses some of the most critical technology trends you should be exploring—like, yesterday!

    In this web series, Paul will review why cloud services are dominating the marketplace, discuss single vs. multi-vendor CCaaS approaches, and examine pure cloud versus hybrid cloud configurations. He will also talk about using cloud technology to rapidly meet business objectives, attain predicative IT cost models, and keep up with the pace of change. Finally, he will outline considerations to retain control of your data, ensure security and compliance, and continue to be open to future change.

    Joins us and learn more about:
    •Contact Center as a Service (CCaaS) and hybrid approaches
    •CRM centered workflow and data directed routing
    •Cloud speech services, Chatbots, and AI—moving beyond structured data
    •Personalizing customer experiences and agent interactions
    •Robotic Process Automation (RPA)—contact center and beyond

    Audience:
    Customer Experience Officer, VP/Director of Contact Center Operations or Technology, etc.
  • Building in the Cloud with AWS: Make the Move, Not the Mistakes
    Building in the Cloud with AWS: Make the Move, Not the Mistakes
    Scott Weber, EagleDream AWS APN Ambassador and Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Jun 6 2019 60 mins
    Strategic use of the cloud is a must for today's modern businesses. But building a scalable, cost-effective, and profitable infrastructure with today’s leading cloud provider, Amazon Web Services (AWS), requires expertise.

    Join CloudCheckr, the #1 independent cloud management platform (CMP), and EagleDream, an APN Advanced Consulting Partner, for a free webinar. Expert and AWS APN Ambassador Scott Weber discuss how EagleDream builds secure, agile, and efficient AWS environments for enterprises. And CloudCheckr Product Marketing Manager, Todd Bernhard, covers cloud optimization strategies and the future of enterprise cloud.
  • Threat Intelligence on the Frontlines
    Threat Intelligence on the Frontlines
    Tavis Newsome, Senior Intelligence Optimisation Analyst, FireEye Jun 18 2019 2:00 am UTC 60 mins
    Today, defeating cyber attackers and the techniques they employ requires real-time insight and intelligence. Staying ahead of attacks, instead of merely reacting, is the heart of cyber threat intelligence. To illustrate the importance of these capabilities to both public and private sector organizations, Tavis will draw from recent real-world intelligence findings, such as FireEye’s collaboration with Facebook and Google to identify Iranian government influence campaigns, as well as our identification of North Korean state-sponsored groups targeting the energy sector.
  • Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Anand Subramaniam, Principal Architect AI & ML Practice, Aspire Systems & Anusha Natrajan, Research Analyst, Aspire Systems Jun 18 2019 3:00 am UTC 29 mins
    Aspire Systems Original Series - Banking in the Age of Siri

    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI

    Let’s just call it as it is! Netflix has a high-powered, customer centric AI model. The way Netflix uses Artificial Intelligence to give their customers accurate recommendations is nothing short of mind-blowing.

    Now, what if we told you that banks can be the Netflix of the Finance Industry by just adopting an advanced AI system? It’s true; banks can do so much more for their customers, with such little effort as long as Artificial Intelligence has your back!

    Join us to discover the endless possibilities AI has to offer, and why it is important to take action now. In this webinar learn how to:

    1.Identify and predict current and future customer segments
    2.Construct collaborative models for insightful AI processes
    3.Identify different customer touchpoints and pain points across various platforms for effective customer segmentation

    Tune in on June 18th, 2019 at 01:00 pm ACT to uncover all the tricks of the trade! Register Now!
  • A Red Team Case Study
    A Red Team Case Study
    Steve Ledzian, Vice President & Chief Technology Officer, APAC, FireEye Jun 18 2019 6:00 am UTC 60 mins
    Red Team assessments help organizations identify weaknesses in their current detection and response procedures so they can update their existing security programs to better deal with modern threats. We'll look at a red team case study detailed in FireEye's MTrends 2019 report where consultants performed an objective-based assessment that emulated a real cyber attack of an advanced, nation state attacker across the entire attack lifecycle
  • What’s New in Service Management Automation X 2019.05
    What’s New in Service Management Automation X 2019.05
    Vesna Soraic, Senior Product Marketing Manager and Dean Clayton, SMA Product Manager, Micro Focus Jun 18 2019 9:00 am UTC 60 mins
    The confluence of machine learning and analytics with automation capabilities has made certain types of services possible in new ways and at new levels.

    Join us on this webcast and see how this latest release of Service Management Automation X (SMAX) turns the virtual agent into a smart virtual agent and expands its Enterprise Service Management (ESM) usage.

    Learn how the smart virtual agent can help you:

    • Save your service desk time
    • Resolve user’s issues faster
    • Empower your ESM journey
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Jun 18 2019 1:00 pm UTC 60 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.

    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • An Introduction to Linke Emory: Amazon S3 Backint agent for SAP HANA
    An Introduction to Linke Emory: Amazon S3 Backint agent for SAP HANA
    Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert. Jun 18 2019 2:00 pm UTC 75 mins
    SAP HANA database is becoming the new default database engine from SAP. Enterprises worldwide are shifting towards SAP HANA and are relying in hyperscale cloud providers, such as AWS, to run their SAP workloads. While AWS provides the infrastructure and services to run SAP HANA, managing database backups and ensuring its availability in a secure and cloud native way is still a challenge for customers.

    Emory Cloud Backup is Linke’s implementation of the SAP backint agent for SAP HANA to manage database backups on Amazon S3. Its SAP-Certified and supports both single node and multi node (scale-out) SAP HANA deployments on AWS. Emory Cloud Backup integrates seamlessly with Amazon S3 making it an extension of your SAP HANA database and leverages SAP administration tools to manage your database backup catalog stored on Amazon S3.

    Join us to learn how Linke’s Emory Cloud backup can help you manage your SAP HANA database backups on Amazon S3 storage service to:

    •Reduce costs associated to database backups
    •Increase backup performance by reducing recovery times
    •Implement a cloud native solution to manage your cloud based SAP
    HANA databases.
  • Cloud Security Best Practices for Defending Against Targeted Attacks
    Cloud Security Best Practices for Defending Against Targeted Attacks
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Jun 18 2019 3:00 pm UTC 60 mins
    Recent years has seen a move towards more targeted attacks, especially in the realm of ransomware. Attackers are no longer trying to infect the globe, choosing instead to carefully select targets to increase their chances of success and maximise payouts.

    SMBs find themselves in the crosshairs of these attacks. Their defense and contingency plans often leave them vulnerable to ransomware, information theft, and other attacks.

    Is your organisation a soft target? Automated processes can often determine this in a matter of minutes, and cybercriminals are aware.

    Learn how to lift your organisation from easy target to robustly defended with learnings from this webinar.
  • Using Risk Management to Optimize Cybersecurity Costs
    Using Risk Management to Optimize Cybersecurity Costs
    Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant Jun 18 2019 3:00 pm UTC 60 mins
    Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite

    Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.

    C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.

    Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:

    • Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
    • Ensure that the board’s security investment decisions support your organization’s appetite for risk
    • Establish a framework that ensures the alignment of strategic priorities with security spending
    • Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
    • Apply these lessons to a sample business scenario.

    Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
  • Best Practices for Healthcare Digital Transformation
    Best Practices for Healthcare Digital Transformation
    John Lehane, Product Marketing &Danny Akacki, Technical Account Manager, Gigamon; Lyle Kelly, Sr. Systems Engineer, Forescout Jun 18 2019 3:00 pm UTC 60 mins
    Are you ready for digital transformation? Transformation begins with visibility – looking inside the network “black box” and understanding exactly what’s running. But we know that can be easier said than done, especially in the healthcare industry where privacy, security and compliance are paramount.

    Join our webinar to hear experts from Gigamon and Forescout delve into the network and security challenges they’ve observed in healthcare. Participants will learn how to surmount the challenges in:

    •Achieving visibility of digital app usage across distributed, dynamic environments
    •Ensuring the most relevant application traffic is delivered to the right security tool
    •Pinpointing lateral movement of malware and shadow IT for faster time to detection and remediation
    •Monitoring, tracking and securing Internet of Medical Things (IoMT) devices
    •Integrating new sites and locations into your network
  • 6 Ways to Increase Self-Service Success on Your Support Portal
    6 Ways to Increase Self-Service Success on Your Support Portal
    David James, Director, Product Marketing, Coveo Jun 18 2019 4:00 pm UTC 36 mins
    It’s no surprise when it comes to resolving issues and finding information, customers prefer self-service. And organizations prefer it because it dramatically reduces support costs. But if you want to make great self-service a reality on your support portal, you need to give customers an intelligent and intuitive search experience and proactively recommend content that can help.

    Join us for this live webinar to learn the 6 best practices to increase self-service success & boost case deflection.

    In this webinar, we will:

    -Dive into what great self-service looks like and show you the formula for creating relevant support experiences
    -Share case study examples of successful support portals and communities using Coveo
    -Answer questions about AI-powered search capabilities

    If you’re a Customer Service Innovator, a Community Manager, or interested in the latest self-service trends, you won’t want to miss this info-packed session on the power of AI-powered search to boost customer self-service.
  • True or False? Print Security Myths Exposed
    True or False? Print Security Myths Exposed
    Michael Howard, Head of Security, HP Inc. Jun 18 2019 4:00 pm UTC 7 mins
    HP Head of Security discusses standards in printer security, the competition and why having 'good enough' security isn't 'good enough'.
  • The State of the Industry: A Mid-Year Research Roundup
    The State of the Industry: A Mid-Year Research Roundup
    Roy Atkinson, Sr. Writer/Analyst Jun 18 2019 5:00 pm UTC 60 mins
    HDI conducts extensive research throughout the year. In this webinar, we will review our 2019 research to date, examine what it means for the industry, and suggest areas that leaders should be paying attention to, including possible courses of action. We will review the latest findings on:

    •Knowledge management, including self-help/self-service
    •Staffing and compensation findings, including industry health indicators
    •Emerging technologies
    •Consequences for metrics

    Who Should Attend:

    •Service desk/support center directors, managers, supervisors, and team leads interested in understanding why knowledge management and emerging technologies are the key to the future
    •Support center/service desk leaders who need information about the current state of the industry
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Jun 18 2019 6:00 pm UTC 60 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.

    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • Green Demon Denied
    Green Demon Denied
    Shashwath Hegde, Solutions Architect, APAC Jun 19 2019 2:00 am UTC 25 mins
    Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
  • Der Schlüssel zu Produktivität im Digitalen Unternehmen
    Der Schlüssel zu Produktivität im Digitalen Unternehmen
    Pierre-Andre Aeschlimann Jun 19 2019 8:30 am UTC 45 mins
    Die Digitalisierung verursacht eine radikale Umgestaltung von Unternehmen und sogar ganzer Branchen. Es ist eine radikale Umformung der Interaktion zwischen Kunden und Unternehmen aber auch, immer wichtiger, zwischen Mitarbeiter und deren Unternehmen. Die Rolle der IT ist strategischer als je zuvor. Ein unternehmensweiter Service Management Ansatz hat sich als der beste Ausgangspunkt gezeigt.

    In diesem Kontext werden wir folgende Themen und deren Wichtigkeit erklären:
    •Wie verwalte ich Services effizient quer durch das ganze Unternehmen (IT, HR, Security, Facilities, Marketing, Customer Service,...) ?
    •Wie automatisiere ich die dazugehörenden Prozesse oder Arbeitsabläufe intelligent und einfach?
    •Wie ermögliche ich meinen Kunden und Mitarbeitern eine moderne, intuitive und immersive Erfahrung/Erlebniss/Experience, und warum ist ganz speziell die Employee Experience so wichtig?
    •Das Ganze illustriert durch Fallbeispiele von Kunden aus dem deutschsprachigen Raum (DACH)
  • Visibility in Public Cloud Umgebungen
    Visibility in Public Cloud Umgebungen
    Daniela Fusaro, Senior Solutions Architect Jun 19 2019 12:00 pm UTC 14 mins
    Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
    Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.


    Finden Sie heraus in unserem 15minutigen Webinar wie Sie:

    - Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
    - Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
    - Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
  • Digital? Transformation? Oh, you mean shiny new tech! ...Err, no, I don't!
    Digital? Transformation? Oh, you mean shiny new tech! ...Err, no, I don't!
    Daniel Breston, Technology Leadership Transformation Coach, Virtual Clarity Jun 19 2019 12:00 pm UTC 60 mins
    Sounds easy this Digital Transformation thing. Everyone apparently is doing it. Save a bunch of money. Makes customers happy. Our organisation looks good in the press or on the stock market. Hey – we don’t even have to do it as we can outsource everything to someone else! Nirvana!

    Really? I mean REALLY? What percentage of these initiatives do not meet their expectations? What percentage of these initiatives instead make customers unhappy, or cause staff to leave or cost you money because you did not consider what these 2 words REALLY mean?

    Let’s discuss what Digital Transformation can mean to you in what I hope is an interactive session on language, leadership expectations, metrics, basic tools you need, challenges, outcomes and the impact on your people. This is not a technical session. This is a discussion for leaders at any level on how to best engage the new industrial movement of our time best known as Digital Transformation.

    About the speaker:
    Daniel Breston was a technology leader at some level for over 3 decades for large financial services organisations in the USA and UK. Now at Virtual Clarity, Daniel coaches leaders that want to benefit from or lead technology teams to help organisations do better things faster and safer. You can also find Daniel speaking at ITSM, DevOps or local conferences or join him in discussion blogs.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Joshua Costa, Manager, PS Advisory Services Jun 19 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss threat hunting and incident detection leveraging EDR and the current cybersecurity threat landscape.

    We'll cover:
    •Incident investigation considerations - old versus new
    •Threat remediation and recovery
    •Third-party and threat intelligence integration

    Our Verizon Threat Research Advisory Center presenters will be:
    •Hayden Williams, Sr. Manager, PS Advisory Services
    •Joshua Costa, Manager, PS Advisory Services
    - David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com


    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Kevin Vachon, COO, MEF; Bob Mandeville, President, Iometrix; Greg Spear, Solution Manager, Accedian Jun 19 2019 2:00 pm UTC 60 mins
    MEF's Carrier Ethernet generated an 80+ Billion USD market. Growth continues with the latest MEF 3.0 Carrier Ethernet standards, secured with the integrity of MEF services & technology certification. The next frontier is frictionless inter-provider service automation focusing on business applications with the first phase. Imagine automating your serviceability queries, quoting, ordering and inventory for the latest Carrier Ethernet E-access services. Given service providers' top deployment challenge of multi-provider network orchestration, this business-to-business automation could not come at a better time. This is your opportunity to get the latest on MEF 3.0 Carrier Ethernet wholesale services, its automation capabilities, LSO Sonata & APIs, plus how to fast-track your API development while getting first-to-market with MEF's LSO Sonata certification.

    Whether a buyer or seller of Carrier Ethernet services, learn how to best guide your wholesale Carrier Ethernet business with LSO Sonata and MEF 3.0 certifications. Join MEF's COO, MEF's Certification Committee Co-Chair and President of Iometrix, MEF's certification partner, to explore MEF 3.0 Carrier Ethernet, amplified by LSO Sonata.

    What you will learn:

    • Highlights of MEF 3.0 Carrier Ethernet
    • MEF 3.0 Carrier Ethernet E-Access business value
    • New certification process and how to achieve MEF 3.0 Carrier Ethernet certification
    • Inter-provider automation enabled by LSO Sonata
    • LSO Sonata certification program
  • Critical Incident Response: Why Good Enough Is Just Not Good Enough
    Critical Incident Response: Why Good Enough Is Just Not Good Enough
    Valerie O'Connell, Research Director, EMA and Vincent Geffray, Senior Director, Product Marketing, Everbridge Jun 19 2019 3:00 pm UTC 58 mins
    Technology incidents happen every day to companies of all sizes, across every vertical, in all degrees of impact from inconvenient to potentially catastrophic. So, by definition, all organizations do IT incident response. The question is, how well do they do it? Research from leading IT analyst firm Enterprise Management Associates (EMA) shows that unless the response takes advantage of automation, the answer “not nearly well enough” is an understatement.

    With the average time to engage the right response team taking 1 to 2 hours, and the average time to resolve a major outage taking 5 to 6 hours, there is a definitive need for immediate and dramatic operational improvement.

    Leveraging EMA research and a case-based approach, this webinar will explain how to reduce mean time to repair (MTTR) through automated slashing of the time it takes to begin effective response. A simple method for determining the point at which it makes more business sense to invest in an improvement than it does to continue funding the status quo will also be discussed.

    Additionally, webinar attendees will learn more about:

    *Top automation drivers, indicators, obstacles, and benefits realized
    *The case for automating incident response – real numbers from real places
    *Quantifying the high cost of status quo – a conservative approach to demonstrating value
  • Simplifying Security Operations with ONE Platform
    Simplifying Security Operations with ONE Platform
    Ben Forster, Sr. Product Marketing Manager, FireEye Jun 19 2019 4:00 pm UTC 60 mins
    Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.

    In this webinar:
    - Understand the benefits of technology consolidation
    - Learn about what a single platform can do for your people and processes
    - Discover the untapped potential of your security investments
  • Enriching Production Readiness in DevOps with Jobs-as-Code
    Enriching Production Readiness in DevOps with Jobs-as-Code
    Basil Faruqui, Lead Solutions Manager, BMC Jun 19 2019 4:00 pm UTC 45 mins
    A key principle in DevOps is ensuring that code is production ready at any point so you can release on demand based on business justification. How the workflows of business applications are orchestrated in production is a key factor in ensuring production readiness. Join this session to learn how BMC's Control-M uses a Jobs-as-Code approach makes application workflows become part of the DevOps pipeline ensuring that applications are production any time.
  • How to Gain Control of Complex Apps Central to Your Digital Transformation
    How to Gain Control of Complex Apps Central to Your Digital Transformation
    John Gudmundson, Sr. Product Marketing Manager Gigamon Jun 19 2019 5:00 pm UTC 53 mins
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    •Identify and extract traffic from over 3,000 applications
    •Detect and manage shadow IT and rogue apps
    •Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • ITSM Trends You Can't Ignore, and How Your Tech Stack Must Support It
    ITSM Trends You Can't Ignore, and How Your Tech Stack Must Support It
    Josh Caid, Chief Evangelist, Cherwell Software Jun 19 2019 5:00 pm UTC 60 mins
    The pace of change within the modern enterprise is nothing short of dizzying. Evolving workforce demands, emerging technologies, and increasing expectations that IT deliver quantifiable business value means that pressure on the service desk has never been higher. Unfortunately, many IT organizations continue to rely on a combination of poorly integrated, legacy technologies that create friction for end users, consume precious IT resources, and prevent IT from taking a proactive and strategic role within the business.

    Join Cherwell’s Josh Caid, Chief Technology Evangelist, for a lively discussion on the top trends shaping IT service management, and how IT teams must evolve their ITSM tech stacks in order to keep pace with digital transformation initiatives and ever-changing business needs.
  • Why you need a MID server
    Why you need a MID server
    Chuck Tomasi, Senior Technical Product Marketing Manager; Kreg Steppe, Services Program Mgr; Stacey Bailey, Program Manager Jun 19 2019 6:00 pm UTC 47 mins
    Accessing resources from inside an organization's physical or cloud firewall can be challenging. A Management, Instrumentation, and Discovery (MID) server offers a direct, secure solution. It's a Java application that runs as a Windows service or UNIX daemon on a server in your local network. You can communicate and move data faster, easier, and more securely between a ServiceNow instance and external applications, data sources, and services.

    Join Chuck Tomasi, Kreg Steppe, and Stacey Bailey of ServiceNow for an introduction to this powerful, versatile tool.

    In the webinar, you'll learn:

    - How a MID server works and its benefits
    - Best practices for setting up a MID server
    - Using a MID server with ServiceNow applications, including Orchestration and IntegrationHub

    Speakers:
    - Chuck Tomasi, Senior Technical Product Marketing Manager, Platform, ServiceNow
    - Kreg Steppe, Services Program Mgr, ServiceNow
    - Stacey Bailey, Program Manager, App Development, Training and Certification, ServiceNow