Mobile Computing

Community information
Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.

Webinars and videos

  • Join salesforce.com customer kCura as they describe the value of having a communities platform to create frictionless service experiences with law firms, government agencies, and litigation service providers. Learn how a self-service community experience enables customers to help each other and themselves, letting service teams focus on the big issues. All of these benefits ultimately translate into a frictionless and unified experience for all their customers!

    George Orr is the VP of Client Services for kCura. He leads strategic and implementation initiatives designed to enhance the online experience of customers.
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Join us to hear from product expert Rob Singh to learn more about Mocana Atlas Certificate Enrollment
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • How is PaaS transforming the way companies develop apps? Run the numbers with IDC and see how any size company can benefit from moving to a cloud platform.

    Join us on April 24th to hear how IDC interviewed Salesforce customers and measured the speed of app development on the Salesforce1 Platform. What they found is that by allowing IT staff to focus on app innovation—instead of infrastructure maintenance—the Salesforce1 Platform delivers:

    · 70% accelerated time to market
    · 80% more applications launched per year
    · 44% increase in app dev capacity while reducing IT costs
    · 75% reduction in infrastructure costs
  • As smartphones now play key roles in e-commerce and personal communications for hundreds of millions of mobile users, our advice is, “authenticate early and often.” As using the prevailing PIN and password-based systems is easier said than done, voiceprints provide the easy-to-implement and easy-to-use alternative that supports a “unified” approach to mobile authentication.
     
    Join Dan Miller, senior analyst and founder of Opus Research, and Nik Stanbridge, vice president of product marketing at VoiceVault, to engage in a lively discussion of:
     
    · How mobility is driving the need for stronger authentication to build trusted links between and among individuals and enterprises

    · What voice biometrics technologies are; and how they differ from other factors for promoting security and personalization

    · How a unified approach to design and deployment saves time, money and effort for application developers and solution providers

    · How to get started to gain experience with a unified voice biometric product
     
    Executives at firms with an interest in providing the best, most personalized mobile experience for customers and employees should take part in this webcast. So should mobile application developers who recognize that strong, simple authentication is key to supporting secure payments and highly personalized services. 
  • The EMV liability shift is fast approaching in the United States. Along with the emerging trend towards innovative mobile payment solutions, this means that core infrastructures need to be enhanced to support new payment methods and channels – often with additional security, risk and lifecycle requirements. Now is the time for financial issuers to develop a future payments strategy that will enable you to migrate efficiently and quickly to EMV chip based technology, and adapt to stay competitive in this period of high disruption.
    Attendees will learn:
    •Facts vs. myths about EMV and how it reduces fraud
    •How the top 5 short-term challenges of EMV migration can be solved
    •The versatility of EMV and real-world examples of how it facilitates so much more than fraud reduction
    •EMV uses beyond cards – mobile (NFC) payments & host card emulation (HCE)
    •Examples of Bell ID and Thales e-Security deployments for EMV card and mobile payments
  • Envisioning how mobility will transform your business in the near future and beyond can be difficult, however there are practical strategies you can adopt today that will help accelerate your mobility transformation.

    Join Arun Bhattacharya, Sr. Director, Product Marketing, Enterprise Mobility, CA Technologies as he discusses the core tenants of a successful enterprise mobility strategy and provides practical guidance for business and IT Leaders on how to manage their businesses’ mobile future.
  • Beacons are hot. Once dismissed by many, they are now being widely deployed in retail and grocery stores, stadiums and entertainment venues. Apple’s support for Bluetooth (iBeacon) has put the technology on the map and driven its growing adoption.

    While many people have read about iBeacon, they don’t clearly understand what beacons can and can’t do. Join Opus Research Senior Analyst Greg Sterling and Steve Hegenderfer, director of developer programs at Bluetooth SIG, for an informative and interactive discussion about all things beacon.

    Bluetooth SIG is the group that oversees the standards and licensing of Bluetooth. We assure you Hegenderfer will speak plain English during a presentation aimed at marketers, agencies and business decision-makers.

    In this accessible, non-technical session you’ll learn:

    • What iBeacon is and how it fits within the larger Bluetooth landscape
    • How many different types of beacons there are and who makes them
    • The cost, lifespan and transmission range of beacons
    • Optimal indoor beacon use cases (and things that beacons don’t do well)
    • How marketers/retailers can avoid spamming consumers with beacon triggered notifications
    • How indoor messaging and notifications can be personalized
    • Whether beacons can equally be used for indoor marketing and analytics
  • The topic of security has grabbed headlines over the last few years and indeed the last few weeks, but most of this attention has focused on a small percentage of large enterprises. However, security is not an issue for them alone, as mid-market companies increasingly deal with the same threats as their larger compatriots.
    Join Symantec Website Security Solutions to understand how you can take a proactive website security stance.

    During this webinar we will look at areas of compliance, the size of Ecommerce market opportunity in the Netherlands, and the threat landscape in general.

    We look forward to your participation.
  • Mobile payments is a wide term which can refer to a multitude of different activities based around a mobile phone (smart phone). These activities can include acquiring (MPOS, QRCodes, NFC and other contactless means of payment), mobile banking, peer-to-peer payment innovations, premium SMS and other pay by phone options and payment/loyalty apps.

    The regulation that covers the above is equally wide ranging from the regulation of payment services and electronic money to the use of personal data and telco regulation.

    The European Commission in its wisdom drafted a very good green paper back in January 2012 entitled "Toward an integrated European market for card, internet and mobile payments" which recognised that mobile was simply a device/medium and not a payment method in itself. The aim of the paper was to increase competition, provide more choice and transparency for consumers, grow innovation and promote payment security and consumer trust. As recently as November 2013, the European Central Bank published its "recommendations for the security of mobile payments" and these have been endorsed by the national banks of the European Union. In the draft Second Payment Services Directive we see a continued push into this space of creating a secure and regulated platform for mobile issuing and acquiring in payments.
  • From natural disasters to hacking attacks, your business needs a plan to respond to adverse events and keep on going. That’s the goal of Business Continuity and Stephen Cobb helps you lay the groundwork for a successful strategy for your organization.
  • In today's data centers, the need for flexibility and agility is undeniable. As businesses continue to grow and leverage technology to remain competitive, they require a new way of simplified IT. IT organizations can no longer deal with complex, cumbersome legacy infrastructure that can't keep at the pace of the business.

    In this webinar, discover:
    - What is hyper convergence
    - The benefits of converged infrastructure
    - Best practices and use cases for leveraging hyper converged architectures
  • Envisioning how mobility will transform your business in the near future and beyond can be difficult, however there are practical strategies you can adopt today that will help accelerate your mobility transformation.

    Join Arun Bhattacharya, Sr. Director, Product Marketing, Enterprise Mobility, CA Technologies as he discusses the core tenants of a successful enterprise mobility strategy and provides practical guidance for business and IT Leaders on how to manage their businesses’ mobile future.
  • In business today, it’s all about the applications. Cloud, mobility, big data, and social media have changed applications in the business world, and they are ever more critical to delivering business outcomes. Are you confident that you have the right data center network to support your new business applications? This webinar will examine the network from the point of view of the application:

    • Does it deliver the right performance?
    • Is it reliable to ensure the uptime you need?
    • Is it easy to scale as your needs grow?
    • Is it easy to manage when you need to make changes?

    In this webinar, we will discuss switching architectures, including Juniper’s Virtual Chassis Fabric, to meet these requirements and support your business outcomes.
  • Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • End-users have become increasingly tech savvy and now demand the same consumer-quality experiences when it comes to enterprise mobile applications. Join James Rendell, Sr. Director, Technology Strategist, CA Technologies as he discusses why the mobile end-user experience is a critical element of a successful enterprise mobility management strategy and how organizations can ensure increased innovation and performance of their workforce.
  • Today, a transformation is underway and we are witnessing the next great frontier in computing. Law firms are trading in legacy software and desktop PCs for tools that are more flexible, affordable and allow them to tap into information from applications, smart phones and tablets. The need to facilitate secure communication and collaboration internally and externally on any device and at anytime is essential. The rise of new cloud-based applications and mobile technologies are transforming the delivery of legal services. Many lawyers are abandoning traditional technology in favor of online alternatives, including secure cloud collaboration tools. Learn how law firms can use cloud applications effectively and securely in this webinar.

    Join this webinar to learn:
    -- Common misperceptions about cloud services
    -- How law firms are using cloud and mobile technologies to deliver better legal services
    -- What law firms should be looking for when choosing cloud service providers