Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy.
Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.
This 30-minute webinar will discuss how the Sayers Cloud can be an off-premise extension of your existing IT infrastructure. Now in its second year, Sayers Cloud has proven success in helping our customers scale IT services flexibly and cost-effectively, whether for production compute, test/dev or disaster recovery needs.
Produced jointly by BPM.com and Business Process Incubator, the Business Architecture Virtual Summit is the first event of its kind, designed to specifically to understand and evaluated tools and methods for Enterprise Modeling, Business Architecture, and Process Analysis.
The Summit combines expert-led sessions with 30-minute capability demonstration from leading participating tool providers.
Why You Should Attend:
• Learn the most up-to-date strategies, techniques, and technologies for successful Enterprise Modeling, Business Architecture, and Process Analysis.
• Gain first-hand knowledge of the transformation success stories and current initiatives underway within Fortune 500 and Global 2000 firms.
• Find new opportunities and partners for succeeding with business transformation
• Gain actionable information for enabling continuous process improvement.
All participants will receive a copy of the “Enterprise Modeling and Business Architecture Buyer’s Guide” to be released during the Virtual Summit.
Who Should Attend:
Architecture & Process is defined foremost for Enterprise Architects and Program Managers, as well as Business Process Architects, Operations Managers, IT Strategists, and Business Analysts. Participants will be involved in managing business operations, defining enterprise architecture, as well as standards definitions, policy making and business process management initiatives. Previous participants were split between government, defense and Fortune 500 companies.
According to Infonetics Research, the VoIP industry will grow to $76.1 billion by 2015. It is safe to say that VoIP is here to stay, making it crucial to stay up to date with the latest industry shifts to ensure easy, cost-effective and efficient communications within your business.
Join industry experts in this panel session as they discuss the impact cloud computing and mobility are having on the VoIP industry and what this means for your enterprise. Attend this webinar and participate in the discussion in real time.
The panelists will discuss:
- the drivers for moving to cloud, the different types of cloud and its benefits for small and medium businesses and enterprises
- the security concerns of moving to the cloud
- mobility strategies and BYOD
Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible.
Join us as we explore current trends in enterprise mobility and how to get ahead of the explosion in devices that will soon hit your company.
With the changing dynamics of the business workplace where location is no longer important, we take a look at what business need to do to better enable their workforce to remain connected whilst communicating effectively. Customer demands and expectations are higher now than ever before and customer response times have significantly reduced meaning regardless of where you are, your customers expect answers faster. Mobility in the workplace looks at how you can remains connected regardless of location securely to provide a consistent user experience to your customers to ensure you are reachable all of the time.
Are you experiencing users wanting to use devices other than BlackBerry? Is a migration to BES 10 too costly? Are you looking to migrate to iOS or Android but are concerned about security? This webinar will explain how to securely migrate to or add a new platform, and how Cortado Corporate Server can make this transition easy.
Cortado boosts your mobile productivity while keeping your business as secure as when using BlackBerry.
We will also show you the new features and functions Cortado brings to your mobile environment.
There’s a great deal of hype surrounding iBeacon right now. But that technology is just one part of a much larger story about indoor location.
Using a range of technologies, major retailers, malls, airports and others are testing or rolling out indoor location in their venues and stores. We’ve come a great distance since last year when few people understood the benefits of indoor positioning and real-world analytics.
Join aisle411, iInside and Opus Research’s Greg Sterling for a webinar and discussion about the current state of indoor location. The webinar will feature existing, in-market B2B and B2C case studies.
What you’ll learn:
•How in-store mobile brand advertising impacts sales
•How indoor location can be used to combat retail showrooming
•How in-store (and even department level) presence is being used to measure the offline effectiveness of traditional and digital advertising.
In the 4th annual survey that CIO’s IDG Research Services conducted with their community members, it is not surprising to find that, consistent with previous years’ results, IT organizations are putting an ever increasing importance on the ability to meet user expectations.
What may be surprising, however, are data that reveal a significant disconnect between those expectations and IT’s ability to actually meet them, as well as the answer to where IT organizations need to focus their efforts in order to bridge that gap.
Please join for a review of CIO’s newest APM best practices survey and year over year comparison with Senior Editor at IDG's Custom Solutions Group, Bill Laberis, and Aruna Ravichandran, Vice President , Product Marketing at CA Technologies and learn the secrets to bridge the gap between the promise of APM and its reality today.
The rise of cloud computing has lead to many questions about the economic model associated with them. James Staten, VP and principal analyst, and Senior TEI Consultant, Sean Owens from Forrester discuss cloud economics as one of the key concepts within cloud computing. During this webinar, these experts explain the economic considerations companies should take into account when migrating to the cloud. Topics from cloud scaling to cloud optimization are covered and how cloud economics can be used to your organization’s advantage.
RingCentral Meetings gives you the power to hold face-to-face conferences with anyone,
anytime and anywhere. RingCentral has incorporated the power of HD video into an already robust phone system, now making RingCentral Enterprise Office edition and an all-inclusive mobile-centric business communications and collaboration solution. Top features and benefits:
- Invite up to 25 people – colleagues, project teams, clients, partners - to your meeting
- Connect from anywhere around the world using any computer (PC or Mac), tablet (iPad or
Android) or smartphone (iPhone or Android)
- Share presentations, websites, and files from cloud services like Box and Dropbox.
- Enhance your demonstrations by making notes and illustrations using mark-up and drawing
- Scheduling meetings is easy with your Outlook, Google Calendar or iCalendar.
- Boost productivity by bringing together remote teams and ensure better, faster
- Increase sales by turning sales calls into demos, conduct online presentations and review
proposals and agreements online.
- Save thousands of dollars on travel expenses and other standalone video and web
This presentation will take a deeper look at the Webroot® Mobile Data Report, released January 2014, and dive into the interesting details including which app categories are most often associated with malicious apps, which malicious apps were most often detected and which families showed the strongest growth. Additionally, the use of device level security features, such as lost device protection, will be evaluated. In addition to analysis of the report’s data, key mobile security events from 2013 will be discussed and analyzed to expose their real impacts to businesses and users alike. Lastly, taking what was learned in 2013, the presentation will leave you with a number of mobile security predictions for the year to come along with mobile security policy suggestions to ensure you’re prepared.
Dan Miller, Senior Analyst with Opus Research, presents results from the latest Opus Research “Intelliview” report. He will describe criteria that should be taken into account when marketing, sales and contact center professionals evaluate vendors of Enterprise Virtual Assistants (EVAs) – especially those providing human-like interactions on the Web and with mobile devices.
Miller will be joined by Brett Beranek, Solutions Marketing Manager at Nuance Communications, who will provide insights into customer acceptance of EVAs based on implementations of Nuance’s Nina Web and Nina Mobile services.
Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
It is no secret, comprehensive mobile application testing is the business-critical last mile on the road to success.
However the testing for multi-platform application presents businesses with a number of serious challenges that can affect product quality, time-to-market, and profitability.
Various mobile test automation approaches have evolved recently - from unit, image, instruments, object based test automation to hybrid.
Join this webinar to get current view and future trends in mobile test automation.
We will talk about:
•Mobile test automation challenges
•Evolution of test automation challenges from unit tests to image based and object comparison methods
•Impetus solution approach for comprehensive mobile testing automation
Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.
The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
Although NTP reflection/amplification attacks have been observed in the wild for many years, recent high-profile attacks have drawn more attention to them. In this webinar, a member of the Arbor Security Engineering and Response Team (ASERT) will conduct a deep dive into some recent NTP attacks. Network-scalable best practices for detection, classification, trace-back and mitigation of high-impact attacks, ranging from the tens of Mbps up to more than 300 Gbps in size, will be addressed.
Your business never stops. Neither should your network. Learn how an always-on, always-available enterprise provides users with complete access to business-critical applications such as unified communications and collaboration (UC&C) anytime, anywhere, from any device.
In fact, UC&C is a key driver of business transformation. As your organization grows, evolves and competes, seamless global communications are a must. In this session, industry experts will reveal what is driving network change and share what’s needed to enable a quality UC&C experience. Learn how Juniper Networks ON Enterprise solutions can keep your business connected and reduce operational complexity while achieving the best ROI for your UC&C investments.
Using the “cloud” to run your business processes is a big step. More and more, organizations are looking to the cloud as a means to address all manner of business challenges. However, the cloud is far from being a silver bullet and not always the most appropriate option.
Join BPM.com’s Nathaniel Palmer with guest Carl Hillier to learn the seven things you should know before you take the step of running your processes in the cloud. Based on both best practices and original research, the include:
• The true cost comparison of cloud vs. on-premise
• The benefits of a truly elastic infrastructure
• The different types of cloud and deployment architectures
• Which types of companies have been the most successful and why
As part of the presentation, BPM.com will unveil its latest research (not yet publically disclosed) indicating where, how and how companies succeed (and fail) with leveraging the cloud in the deployment and delivery of process-oriented applications. After participating in this webinar you will have a better appreciation of the business challenges in deploying your processes in the cloud, the potential benefits that can be realized and maximize your chances of success.
Still using a file server to share documents? What about that FTP? Emailing large attachments which get stuck in your inbox? The move to cloud computing allows businesses to access information , applications and content from anywhere, anytime on any device. As individuals have demanded the need to have the same ease of use in their enterprise grade applications as in consumer applications, the move to cloud has accelerated product adoption, lowered costs and increased productivity. Learn about various companies who moved to the cloud with Box, best practices and how to easily share without on-premise technology.
With confidential data under attack on many fronts, it is time to look at how encryption can protect data access and what your business could be doing to employ encryption, from servers to endpoints to removable media.
Most companies deploy virtual environments in order to get the most out of their hardware (maximize utilization). Traditional security was designed to be deployed in a one-to-one fashion, relying heavily on existing computing resources (CPU, RAM, Storage) and often taking full advantage of all resources available. In virtual environments with multiple machines and signature based protection, when a scan runs or signatures are updated (typically daily) and simultaneously, it has the potential to consume all resources available, creating what is called an AV storm. This presentation will explore the modern VM security landscape and the introduction of Agentless Security and associated efficacy.
Businesses today are navigating a complex field of communication services and solutions in search of a comprehensive system that will keep up with the needs of an ever-evolving organization.
In this live discussion, Forrester’s VP, Principal Analyst, Art Schoeller and Mike Zavos, IT Director of TruGreen Landcare will share leading trends and first-hand experiences in adopting and deploying a cloud-based phone solution.
Join this eSeminar to learn:
-Top drivers and trends in the integrated communications market
-Best of breed capabilities that scale with your business and decrease common IT complexities
-Success steps for transitioning your on-premise PBX solution to a cloud-based phone solution
Every year, Frost & Sullivan surveys its customers to gain true end-user insight into the trends that will deliver new growth opportunities across the ICT industry. From M2M and Cloud to UC and Big Data, we look at the major trends that will influence strategies and revenue potential in 2014.
Why You Should Attend:
- Identify the key trends to follow across the ICT industry in 2014
- Gain a true end-user perspective on hot topics
- Hear Frost & Sullivan's opinion on key ICT growth drivers
Envisioning how mobility will transform your business in the near future and beyond can be difficult, however there are practical strategies you can adopt today that will help accelerate your mobility transformation.
Join Arun Bhattacharya, Advisor, Product Marketing, CA Technologies as he discusses the core tenants of a successful enterprise mobility strategy and provides practical guidance for business and IT Leaders on how to manage their businesses’ mobile future.
Join experts from Rand Corporation and Juniper Networks for a fascinating overview of new research about the economics of the cyber crime market. In this research, Key economic indicators show cybercrime is rapidly maturing, leading to a more diverse and challenging threat landscape for businesses, governments and people operating in the digital world. In fact, the ability to attack is outpacing the ability for many to defend themselves.
RAND researchers will discuss:
• Current and historical trends in cyber crime methods and tools
• How the black and grey market for vulnerabilities shapes the criminal landscape
• Key indicators of cyber crime market maturation
Juniper experts will outline:
• How organizations can use these findings to help inform a better and more active defense strategy
• Breaking the cyber crime economic model with advanced intrusion deception technologies
Mocana Atlas is a single, unified platform that empowers organizations to establish secure authentication, identity and trust relationships with applications on virtually any mobile device—a platform that makes these connections much simpler to provision and much less expensive to maintain.