Are you an IT service management professional interested in developing your knowledge and improving your job performance? Join the IT service management community to access the latest updates from industry experts. Learn and share insights related to IT service management (ITSM) including topics such as the service desk, service catalog, problem and incident management, ITIL v4 and more. Engage with industry experts on current best practices and participate in active discussions that address the needs and challenges of the ITSM community.
Do you want the unlimited elastic scale, smart security and intelligence of the cloud but don’t know where to start? Does the cloud feel out of reach because of your legacy infrastructure, servers and storage devices? You could lift and shift everything but that means you don’t get the full benefits of the cloud.
Or you could build from scratch in the cloud but that takes time and costs a lot of money. Another option is re-platforming. It combines the ease of lift-and-shift with the benefits of building directly in the cloud.
Replace all your old hardware built to peak demand and get all the scalable, smart and secure benefits of the cloud. Re-platforming lifts-and-shifts just the app code and user data, leaving behind your outdated OS and physical disk volumes. This allows you to turn up and down your services based on real-time customer demand.
Hallituksen Digitalisoidaan julkiset palvelut -kärkihankkeen päätoimenpiteisiin kuuluu uuden tiedonhallintalain valmistelu. Tiedonhallinnan uudistamisen tavoitteena on varmistaa tietojen monipuolinen, sujuva ja turvallinen hyödyntäminen julkisissa palveluissa. Tulossa on siis uusi tiedonhallintaa koskeva yleislaki, julkisen hallinnon tiedonhallintalaki Laki tulisi voimaan vuoden 2019 aikana. Tule webinaariin kuuntelemaan ajatuksia, mihin pitää varautua.
Julkisen hallinnon tiedonhallintaon muutosten edessä.
- Tiedonhallinta ja tietoturvallisuus
- Tekniset rajapinnat
- VAHTI suositusvaatimukset
- Asianhallinta ja tietoaineistojen muodostaminen
- Metatietoa ja rekistereitä
- Tiedonhallinnan elinkaarikysymykset ja arkistointi
- JHS-179 ja kokonaisarkkitehtuuri
- Suomen Ammattipuhujat on yksi Oppia.fi kouluttajakumppaneista.
Maailman suosituin palvelunhallinan viitekehys ITIL® saa uuden version. Julkaisuaikataulu on marraskuun 2018 mukaan vuoden 2019 ensimmäisellä neljänneksellä. Axelos julkaisee asiasta koko ajan uutta tietoa. Tässä webinaarissa kerrotaan mitä ITIL 4:stä on jo julkaistu.
Lari Peltoniemi on työskennellyt prosessien ja toiminnan kehittämisen ja arvioinnin alueella yli 10 vuotta. Päätoimisesti IT-palveluiden prosessien määrittelyn, kehittämisen ja johtamisen alueella hän on toiminut vuodesta 2005. Hän on konsultoinut ja valmentanut useita suomalaisia ja kansainvälisiä yrityksiä ja organisaatioita ITIL/ITSM prosessien määrittelyihin, käyttöönottoon ja kehittämiseen liittyen. Lari on sertifioitu ITIL Foundation, ITIL Intermediate, VeriSM, SIAM Foundation, CAPO, CASM ja CMDB Foundation valmentaja.
Quentin McPhee, Implementation Manager, VivantioRecorded: Feb 14 201953 mins
IT monitoring and metrics play a key role in measuring IT service management success. By properly analyzing, understanding and measuring where the true value lies in your organization, you can effectively analyze risk, add value, reduce the cost of service delivery and boost the overall performance of your service teams.
But without knowing what to measure, how to interpret the results and how to leverage your organization’s tools and data to make this possible, you’re setting yourself up for frustration and a lack of clarity in your reporting output.
On Thursday, May 17th, join BrightTALK and Vivantio’s Senior Implementation Manager Quentin McPhee to learn what you and your senior management need to inform IT decision-making and drive sustainable service improvement, in practical terms.
Quentin McPhee has more than 20 years’ experience in service management delivery and brings significant knowledge in implementing solutions for all types of organizations.
This session is not just a ‘back to basics’, but rather will set out what every ITSM organization should be measuring and how to interpret the results, plus how to sustain the measuring process to become a self-aware powerhouse. We’ll also discuss:
•What value reporting on your ITSM processes can realise
•Different types of reports and who needs them
•Tips, tricks and best practices to build out, maintain and sustain your organisation’s reporting structure
We’ll also cover real-life examples of organizations who have improved efficiency through effective data analysis.
Vivantio is a leader in help desk, IT service management and customer service software, empowering service teams to embrace automation and improve service levels at hundreds of organisations around the world.
David M. Zendzian, CTO, at Pivotal and Jeff Williams, Co-founder and CTO at Contrast SecurityRecorded: Feb 14 201963 mins
The latest Verizon Data Breach Investigations Report continues to confirm that top sources of data breaches continue to be at the application layer. DevOps and security teams are adopting modern, fully automated software delivery platforms to release apps to production environments multiple times a week or even daily. This has forced security teams to rethink the traditional processes and practices to make security a key component of their cloud-native transformation.
Join Jeff and David to learn how enterprises are addressing cloud native application security at speed and scale. This session will cover:
- Common security anti-patterns
- What is Cloud-Native Security?
- People: How to align Dev, Security and Ops teams to achieve Cloud Native Security
- Process: How does Cloud Native change security processes to support the modern agile business?
- Technology: Introducing Cloud Native Security tools to achieve continuous application security
This is the first webinar in a series presented by Pivotal and Contrast Security on Cloud-native Security best practices
Ahyoung An, Sr. Product Marketing Manager at MuleSoft and Sundip Patel, Product Manager at MuleSoftRecorded: Feb 14 201945 mins
This session covers how Anypoint Runtime Fabric provides greater flexibility and simplifies operations––enabling enterprises to transform their businesses faster using public, private, or hybrid clouds.
Watch this webinar to learn how to:
- Manage deployments in multiple clouds––all from Anypoint Platform’s cloud-based control plane, hosted by MuleSoft
- Isolate applications, deploy multiple runtime versions in the same Anypoint Runtime Fabric, scale horizontally, and re-deploy with zero downtime
- Eliminate manual tasks and optimize processes with an easy-to-use container service that offers built-in support for Docker and Kubernetes
This Webinar session will consist of a brief walk through of Software Asset Management’s foundation. Diving deeper into answering the age-old IT question “What do we own and how do we own it?” Specifically, we will highlight various types of legal documentation, noting key verbiage and contractual elements Software Asset Managers encounter in their day to day responsibilities. The briefing will cover various aspects of reviewing, drafting and negotiating agreements to ensure adequate protection and overall license term understanding. Attendees will gain insight into defining drafting and assigning SAM policies, procedures and responsibilities.
Edna Menon – Sr Product Mgr. & Paul Barrett – Systems Specialist - TeradiciRecorded: Feb 13 201935 mins
PCoIP Management Console Release 3.2.1 delivers powerful endpoint management capabilities with support for Active Directory and User Roles.
Learn more about these much requested capabilities, and participate in our live Q&A with Teradici experts Paul Barrett, Systems Specialist, Global Support Services and Edna Menon, Senior Product Manager. This brief webinar will cover everything you need to learn about this important release through a live demonstration, including:
•Support for Active Directory, including support for sub-domains
•User Roles: System Administrator and Administrator roles
•Web Interface performance improvements
Mark Kerrison and Mark KedgleyRecorded: Feb 13 201946 mins
Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed, fast and accurate Enterprise-Class vulnerability scanning.
NNT Vulnerability Tracker is based on the commercial-grade version of OpenVAS, the world’s most widely adopted vulnerability assessment tool. This forms a significant progression of NNT’s SecureOps Enterprise Security Strategy and complements NNT’s award-winning Change Tracker Gen7R2 to further efforts in solving IT Security through the definition and delivery of Integrity.
NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack. Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against more than 66k Network Vulnerability Tests (NVTs) with new vulnerabilities are added daily.
Join Mark Kerrison, Chief Executive Officer of New Net Technologies and Mark Kedgley, Chief Technology Officer of New Net Technologies, in an interactive webinar as they showcase the all-new Vulnerability Tracker. Key topics and highlights will include:
• Understanding how vulnerability management aligns with the basic underlying principles required for every security strategy
• Where and how vulnerability management corresponds with the CIS Top 20 Controls
• Architectural, features, functionality and competitive differentiators
• Familiarity with our hyper-fast scanning technology allowing you can assess over 50,000 endpoints per 24 hours
With Vulnerability Tracker, you will be able to identify and reduce the attack surface giving you better control and assurance that your infrastructure is operating with the least amount of risk.
Register now to learn more about Vulnerability Tracker’s unique ability to deliver a comprehensive security solution that aligns with your security strategy to mitigate your overall security risk.
Chris Goettl, Todd Schell, Brian SecristRecorded: Feb 13 201964 mins
The average spent on Valentine’s Day is a topic that’s been making the rounds on social media. It’s generated shock and awe—but it’s nothing compared to the damage one exploited vulnerability can unleash on your organization. So, let’s keep the money in February flowing into flower stores and candlelit dinners, rather than into the pockets of those we’d never choose to date. For February the men (and women) of Patch Tuesday recommend you lavish attention upon Microsoft. Patch the exploited zero day, public disclosures, and privilege escalation vulnerability. Also, make time for the ever-popular target, Adobe. Because nothing leaves a worse taste in your mouth than a breach you could have prevented—unless, perhaps, it’s those chalky conversation hearts.
Digitalisaatio, ketteryys ja dynaamisuus ovat nykyaikaiselle johtamisjärjestelmälle asetettuja perusvaatimuksia. Toiminnan kehittämisessä vahvoja nykyteemoja ovat analytiikka, robotisointi ja automatisointi.
Webinaariin ovat tervetulleita kaikki johtamisjärjestelmistä kiinnostuneet. Webinaarin kohderyhmää ovat erityisesti yrityksen johto sekä laadusta, toiminnan kehityksestä ja operatiivisesta toiminnasta vastaavat henkilöt. Osallistujat oppivat johtamisjärjestelmistä sekä teorian että käytännön esimerkkien kautta.
Live-lähetyksessä pääset esittämään puhujalle kysymyksiä chatin kautta. Tarjolle tulee myös jälkitallenne.
Webinaari toimii hyvänä pohjustuksena Oppian kouluttajakumppani QPR SOFTWAREN LUOKKAKOULUTUKSILLE.
Asiantuntija Mika Haikonen toimii lead konsulttina QPR Software Oy:ssä. Hän on muutos-, prosessi- ja projektijohtamisen ammattilainen, jolla on yli 20 vuoden kokemus kansainvälisestä ICT-, prosessi- ja myyntiprojektitoiminnasta sekä yksityisellä että julkisella sektorilla. Mika on kokenut asiakas- ja sidosryhmäviestijä, ja intohimoinen ratkaisija niin työelämässä kuin vapaa-ajallakin.
Christian Toon, Ilijana Vavan, Thom Langford, Tilly TraversRecorded: Feb 13 201949 mins
Replay: Kaspersky Lab is hosting a digital panel, bringing together cybersecurity executives and experts, to discuss the challenges that Chief Information Security Officers are facing after 86% revealed they believe cyber breaches are inevitable in a global survey.
More than a third of CISOs say they struggle to secure required budgets when they cannot guarantee security, but how can they persuade the board to offer them more resources? This summit will cover how CISOs can manage limited resources – such as internal talent and budgets – to effectively protect increasingly digital businesses, as well as the importance of collaborating with other departments and company boards to keep up with the ever-evolving cyberthreat landscape.
The panelists include Christian Toon, Chief Information Security Officer, Pinsent Masons LLP, Ilijana Vavan, Managing Director, Kaspersky Lab Europe, Thom Langford, Chief Information Security Officer, Publicis Groupe.
The event is moderated by Tilly Travers, Senior Corporate Communications Manager, Kaspersky Lab.
Rob Pakai and J.R. MillerRecorded: Feb 12 201931 mins
Using two-factor authentication (2FA) alone is not enough to protect against determined attackers. If security is important, you need to look beyond just 2FA. The next generation of identity security uses risk checks to supplement 2FA, improving security and significantly reducing authentication disruptions for users.
Andy Brown, James Romer & David ThomasRecorded: Feb 12 201931 mins
Cyber-attacks happen every day and law firms are a prime target because their intellectual property & client data can be easily monetized. Passwords, and even 2FA, alone are not enough. Ensure your data access is secured with multi-factor and adaptive authentication from the market leader, SecureAuth IdP.
Damon Tepe & Jeff HickmanRecorded: Feb 12 20196 mins
An age-old dilemma: security versus user experience. Traditionally, hardening security adds to the user burden. But with 81% of reported breaches involving stolen or weak credentials, can you continue to sacrifice security for user convenience? Good news, you don’t have to. Raise security without raising disruptions, SecureAuth IdP.
Gerald Beaulieu, Joe CorpionRecorded: Feb 12 201957 mins
IT is the engine that delivers service reliability and agility for your business. Watch this webinar to see how ServiceNow practices what we preach. By bringing together the power of IT Operations Management (ITOM) with IT Service Management (ITSM), ServiceNow proactively identifies issues, eliminates service outages and accelerates time-to-resolution.
By automating IT operations, we transformed our Network Operations Center (NOC) into a service reliability team that can quickly and accurately respond to the needs of the business.
Hear best practices from Joe Corpion, Director of IT Operations, and Michael Prouty, Senior Manager of IT Operations on how to combine the power of ITOM + ITSM.
Learn how ServiceNow:
Decreased P1 and P2 incidents by a whopping 67%
Eliminated 9,600 hours of work in the NOC annually
Achieved a 50% reduction in MTTR
We know your customers expect more from you than ever. And when they have got a problem or a question, there are many ways they want to get in touch with you. To stay ahead, you need to meet their expectations and deliver effortless service across every channel. But without the right technology, that can be tricky. And a poor customer experience can have a big impact on your reputation. So what if we could make it easier for your people and for your customers?
No matter how you define it, the Site Reliability Engineer (SRE) role is clearly expanding into more and more companies. To be effective in this new role, SREs must possess a depth of understanding of how different systems work together, how they fail, how they can be improved, and how they can best be designed and monitored.
Kaspersky Lab and guestsFeb 17 201912:00 pmUTC56 mins
The connected world needs a strong, resilient cyberspace, but the landscape is increasingly fragile and fragmented. At this summit, hosted by Kaspersky Lab, leaders from across the cybersecurity industry will debate the growing need for transparency, collaboration and trust in addressing these challenges and more.
Everybody talks about Operations “Shifting Left” but Developers also need to “Shift Right” and start thinking about how applications are orchestrated in production. Taking a Jobs-as-Code approach means putting all the workflows and operational instrumentation in the CI/CD pipeline to ensure you get the acceleration and increased quality that comes from automated testing and deployment.
Join this session and hear how you can orchestrate your workflows with a DevOps enabled approach.
Stephen Mann, ITSM Analyst and Matt Klassen, VP Product Marketing, CherwellFeb 19 20195:00 pmUTC60 mins
Industry best practices provide IT service desks a wealth of metrics to adopt, and benchmarking data offers guidance on the KPIs to employ. These have both remained virtually static for the last decade or longer. However, a growing reliance on IT services, a rapidly changing technology landscape, and demands that the service desk shift from a cost center to a value center, is forcing IT leaders to re-think and re-define traditional KPIs and metrics. Those who remain complacent in this respect will almost certainly fail to deliver the outcomes the business demands.
In this webinar, hosted by ITSM analyst, Stephen Mann, and Cherwell’s Matt Klassen, you’ll learn:
• How the evolving workplace and employee expectations are driving the need for new KPIs
• Why the adoption of self-service, automation, and AI require further changes to your measurement philosophy
• Metrics you are using today that will no longer be relevant in three to five years
• Tips for developing a new portfolio of metrics that will position you for future success
Cyber threats continually evolve, growing more sophisticated and aggressive, regularly overwhelming and bypassing traditional security solutions. With AI-powered software trained on large datasets of cybersecurity, network, and even physical information, cybersecurity solutions are increasingly able to detect and block abnormal behavior, even without a known signature or pattern.
Adding AI into the mix is a major turning point for cybersecurity. It’s growing clear that artificial intelligence and machine learning is the safest, and perhaps the only, path for cybersecurity professionals to really lock down their data and protect the enterprise. These systems offer the fastest, smartest ways to identify and analyze threats in real time -- and find the quickest way to taking them down.
To learn more about how to improve privacy and security, and how new AI-powered security can protect companies and their customers better, don’t miss this VB Live event!
Registration is free.
Attend this webinar and learn:
* How AI is defeating and preventing cyberattacks
* When AI analytics need to be deployed and for what reason
* How to build AI-powered tools that can assure consumers their data is secure
* Real-world AI applications and what they mean for cybersecurity
* Fernando Maymi, Cybersecurity Researcher & Consultant, Moderator
* Jim Ducharme, VP, Identity Products, RSA.
* Eduardo Delgado, AVP of Enterprise Tech & Cybersecurity, TD
Wayne Speechly: Principal Director, Dimension Data and Richard Sutherland: Global Technical Account Manager, IntelFeb 20 20192:00 pmUTC60 mins
Mainstream Artificial Intelligence (AI) may still be in its infancy, but it offers real business benefits today. Join Wayne Speechly and Richard Sutherland as they discuss how AI is penetrating the workplace and how it is causing business leaders to rethink how they run their organisations.
Tom Cooper, Principal Geek, Bright Hill GroupFeb 20 20194:00 pmUTC60 mins
As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
What no one tells you is that you're only looking at one of the three factors that lead to career success.
In this session, you will:
- Learn the other two factors (and what you should do about them)
- Learn the four levels of thinking needed to be an expert who leads
- Assess where you are in each of the areas
- Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.
Tom Bienkowski – NETSCOUT Arbor, Director, Product MarketingFeb 20 20197:00 pmUTC60 mins
As the scale of all types of attacks continues to increase, traditional stateful perimeter security devices like firewalls often strain to keep up. Adding stateless technology between the firewall and the Internet router, armed with advanced reputation and threat intelligence data, can decrease the heavy load on your existing perimeter defenses, protect them from state exhaustion attacks, and even provide blocking of outbound threats (like bots communicating with C&C). This webinar will explore the realm of stateless technology and the Internet edge, with best practices, lessons learned, and key deployment strategies that will prepare attendees for a future of increasing and diverse attacks.
During this webinar we will talk more about:
- Understand the limitations of existing perimeter security solutions because of their stateful nature
- See how stateless technology can protect you from inbound attacks (like DDOS), more efficiently block inbound IoCs and outbound threats (communications with suspicious destinations based on reputation)
- Learn how stateful and stateless technologies can work together the make a more secure Internet edge
- Arm yourself with protection against Internet-scale attacks
- Answers to audience questions during live Q&A
Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing
Tom has been in the network and security field for over 20 yrs. During this time, he has worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at NETSCOUT he’s a Director of Product Marketing focusing on their industry leading Edge Defense and Threat Intelligence solutions. Tom routinely speaks at IT security events around the world providing insights into cyber threats and best practices in defense.
Rob Allman - SVP Customer Experience, Dimension Data; Dr Harsh Vinayak - SVP of BPO and R&D, NTT DataFeb 21 20192:00 pmUTC60 mins
Robotic process automation is quickly becoming an integral part of the new CX delivery model. Technologies like predictive analytics, machine learning, and cognitive computing are becoming more powerful. But what does this mean for your customer and for your business?
We will be discussing the application of these technologies in a real world CX automation context.
Jeff Laskowski, Security Consulting Director, FireEye MandiantFeb 21 20194:00 pmUTC60 mins
Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.
In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:
• Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
• Assess your organization’s crisis management capabilities through the lens of an executive team
• Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations
Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
Troy DuMoulin, Bruce RandallFeb 21 20195:00 pmUTC59 mins
Organizations are recognizing that adopting a service-oriented operating model, underpinned by system-based automation, can address many of the core challenges of competing in a digital economy. At the same time, defining value-based outcomes in the form of products and services, and optimizing shared processes with automation, have been proven to increase productivity, foster collaboration, lower costs and improve speed, no matter the business department or function. The sum of these capabilities and outcomes are often referred to as Enterprise Service Management.
Join Troy DuMoulin from Pink Elephant and Bruce Randall from ServiceNow as they provide an overview of the many dimensions of Enterprise Service Management.
In this webinar you’ll learn:
How to increase employee productivity and creativity with ESM
How to focus on service management capabilities like service definition, publishing, and knowledge management
How to transform workflow automation related to incident and request fulfillment
Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoftFeb 21 20195:00 pmUTC50 mins
On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.
- Measure application performance across APIs and integrations in production
- How to query and retrieve log data across your network
- End-to-end walkthrough of priority issue identification and resolution
- Exciting new capabilities of Anypoint Monitoring
Komal Bhardwaj & Ritesh PatelFeb 21 20196:00 pmUTC60 mins
When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.
In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.
Ritesh Patel - VP Products at Nirmata
Komal Bhardwaj - Principal Product Manager at Citrix
Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM CloudFeb 21 20196:00 pmUTC45 mins
If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
Damon Tepe & Jeff HickmanFeb 21 20196:00 pmUTC60 mins
Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.
Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.
Better breach protection starts with better identity trust!
During this session you’ll learn how:
• Attackers are getting around two-factor authentication
• Risk and context checks can raise trust in identities and identify attackers
• Adaptive authentication delivers better access security without slowing down your business
Damon Tepe - Director, Product Marketing, SecureAuth
Jeff Hickman - Director of Sales Engineering, SecureAuth
Maxim Frolov, Vice President of Global Sales, Kaspersky Lab and Jim Reavis, Co-founder and CEO, Cloud Security AllianceFeb 25 201910:00 amUTC46 mins
Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018.
Second only to targeted attacks, breaches affecting IaaS are among the most costly faced by businesses today. But what can be done about this? Apparently, investing more in protection is only part of the solution, as businesses are already allocating a greater share of their IT budgets to security…
During the webinar, Maxim Frolov, VP Global Sales, Kaspersky Lab, presents key findings from the company’s latest report On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Maxim, along with special guest Jim Reavis, Co-founder and CEO, Cloud Security Alliance, will discuss the potential damage and the main risks associated with cloud breaches, as well as what businesses can do to protect themselves.
Webinar attendees gets the latest insights on the dynamics of corporate security incidents and IT security budgets. They will learn what financial, organizational and technological decisions should be made to protect businesses from the threat of cloud infrastructure breaches.
Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?
Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.
You’ll learn how to:
• Simplify your systems and ongoing management with a cloud-based approach
• Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
• Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
Jonathan Culver, Solutions Architect & Andrew Waite Brown, Regional Director - EMEA- TeradiciFeb 26 20192:15 pmUTC30 mins
Join our monthly webinar for a quick review on Cloud Access Software followed by a Question and Answer session with our Cloud Access Software expert and Solutions Architect Jonathan Culver.
1.What graphics adapters does Cloud Access Software support?
2.What Windows versions does Cloud Access Software support?
3.Can USB devices be used with Cloud Access Software?
4.What are the supported hypervisors and cloud platforms for Cloud Access Software?
5.Can I connect to my Cloud Access Software workstation on a tablet device?
Submit a question when registering or during the webinar. Our goal is to ensure your deployment is a success!
Terence Fogarty, Contact Center Consultant, Carousel Industries; Robin Gareiss, President and Founder, Nemertes ResearchFeb 26 20196:00 pmUTC60 mins
With the ability to increase sales, reduce costs, and improve customer satisfaction, it’s no surprise that more than 75% of companies have, or plan to have, a Digital Customer Experience (DCX) strategy. Leveraging collaboration technology can transform how you’re engaging customers and driving organizational innovation.
In this interactive webinar Carousel Industries and Nemertes Research explore the top five digital customer experience projects that drive business growth.
What you will learn:
• Which digital customer experience projects deliver measurable success
• How to realize the business value of upgrading or replacing existing communications platforms
• Why aligning your approach with your financial model can boost business impact
• How to identify the right approach for your business: on-premises, cloud, or hybrid
• Why you need to take a closer look at your internal unified communications and collaboration
• How to determine if now is the time to upgrade or replace existing communications platforms
Jim Haas, Vice President of Managed Services at NtiretyFeb 26 20196:00 pmUTC77 mins
On July 9th, 2019 Microsoft will end all support for SQL Server 2008. How can you prepare your organization? Start by understanding your options.
Why should you attend?
Doing nothing is not an option this time. Data security is a risk to your organization, as all critical patches and security updates for SQL Server 2008 will end. Your Lack of compliance with industry standards and applicable regulations may lead to security breaches, data loss, litigation, and reputational risk.
Join Jim Haas, Vice President of Managed Services at Ntirety (a Division of Hostway|HOSTING), as he discusses how you can go about making a compelling case:
• Upgrade Options: Migrate to Azure, Upgrade SQL Server, or Purchase Extended Security
• The many advances since SQL 2008.
• How to get started. What you can do yourself. Where you may need help and where to find
Ricardo Casanovas, CTO Linke / Guillermo Torres & Maurici Galofré, AWS Solution Architect and SAP experts at LinkeFeb 27 20193:00 pmUTC60 mins
Traditionally, setting up High Availability for SAP systems has been achieved through the implementation of third-party software tools, often expensive and complex to deploy. Today, customers can leverage AWS highly available cloud services to achieve High Availability for their SAP systems at a fraction of their cost.
Learn how you can configure High Availability for SAP systems on Amazon Web Services using their own AWS tools and services such as Amazon Cloudwatch, AWS Lambda, and AWS Systems Manager.
Join us to learn:
•How to plan and define your SAP landscape in High Availability
•Setup SAP in High Availability using AWS Services
•Operate with SAP in High Availability on AWS
Stephen Mann, ITSM.tools; Roy Atkinson, HDI; Dr. Akhil Sahai, Symphony SummitAIFeb 27 20196:00 pmUTC60 mins
Articles, headlines, blogs, and presentations about AI are everywhere, most being either apocalyptic (we’ll all lose our jobs) or utopian (we won’t have to work) about how AI will affect the near future. In this webinar, industry analysts Stephen Mann and Roy Atkinson and AI expert Dr. Akhil Sahai will speak directly to service and support managers about how AI is being integrated into service management software, and how that integration has a direct bearing on how service management and support can and will be done in the near future.
The webinar will feature a panel discussion followed by time for attendee Q&A.
What You Will Learn:
In this webinar, we will discuss:
- What AI is and is not
- How AI is being built into service management tools
- How next-generation tools will affect the day-to-day operations of service and support
Who Should Attend:
- Service desk/support center directors, managers, supervisors, and team leads
- ITSM professionals responsible for workflows and processes
- Support organization leaders
The primary goal of service management is deliver value to the customer, or internally, your employees. As advanced technology reshapes the service desk, there are more and more ways to enhance service delivery. In this webinar, ITIL-certified Samanage Solutions Consultant Liz Beckner will discuss:
- How she has helped organizations integrate technology within the service desk
- How automated workflows and self-service provide maximum value
- How to create a single platform for services in multiple departments
- New research on how the experience with the service desk impacts employee productivity
Join us to start transforming the service experience for your employees!