Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Powering digital transformation and driving business value with new LEAP family Powering digital transformation and driving business value with new LEAP family Ahson Ahman, Head of Products & Design- LEAP Dell EMC Recorded: Dec 21 2016 33 mins
    Watch and learn how the LEAP family of products will power digital transformation strategies, while creating new value proposition across the larger ECD portfolio. 

    Attend this session to learn the value proposition for our new LEAP family of products and to understand why and how LEAP will bring value in the context of digital transformation. We’ll also explain the role of the LEAP family within the larger ECD Portfolio.
  • Addressing a Key Challenge in Network Security – ZERO DOWNTIME Addressing a Key Challenge in Network Security – ZERO DOWNTIME Joshua Kooh, Strategic Security Solutions Consultant, Forcepoint Recorded: Dec 21 2016 60 mins
    One of the top CIO challenges is to maintain 100% uptime. Access to applications, data, and resources on the network is mission-critical for every organization. Downtime costs can be high and in various forms - loss of revenue and productivity, the cost of recovery and other intangible costs, such as damage to their reputation and brand value. Downtime is simply unacceptable. Hence, security for that network must be highly available and not cause any performance degradation of the network - in migration, deployment or through human error.

    In this session, we will explore these questions:
    • Is it possible to have no downtime when maintaining network security?
    • What are the different causes of downtime?
    • What are the different approaches to minimize downtime?
    • How do you manage the costs to achieve 99.999% uptime in the network security solutions?

    Join Forcepoint and (ISC)² on Dec 21 (Wed) at 1:00p.m. (Singapore time) and learn how to maintain 100% uptime.
  • Performance Engineering Core Capabilities Performance Engineering Core Capabilities Todd DeCapua, CSC, Petar Puskarich, Bank of America Recorded: Dec 19 2016 62 mins
    Please join us for a roundtable discussion around several topics concerning what core capabilities performance engineering provides to your organization big and small.

    Topics include:
    * Visibility
    * Accountability
    * Consistency
    * Reliability
  • Redefining Endpoint Incident Response with Behavioral Analysis Redefining Endpoint Incident Response with Behavioral Analysis Michael Angelo Vien, CounterTack Cyber Response Expert Recorded: Dec 15 2016 48 mins
    Cybersecurity teams and incident responders struggle to gather the most accurate intelligence on threats, and targeted, specific security incidents. Teams need technology to drill down into information on incidents, often to respond quickly, and in doing so, determine root cause.

    Is it malware? Are there other indicators that you are blind to? Are your systems maligned with attack residue that you can’t analyze in-memory?

    The art of incident responses contains three key components typically:

    1)Understanding your threat landscape to the point where you can effectively begin to eradicate threats quickly and with confidence
    2)Determining through deep investigation the root cause of security incidents, and the broader impact incidents that are not triaged
    3)Applying forensic-level analysis to add a layer of intelligence based on what was found, and what can be predictably analyzed

    CounterTack delivers incident response capabilities built for analyzing today’s threats, and for drilling down forensically into incidents that might stem from varying levels of malicious code associated with malware and other IOC’s. Leveraging behavioral traits and predictive analytics through its solutions, CounterTack is dedicated to continually improving IR for organizations globally.

    This webinar will feature key trends on how the discipline of incident response has shifted toward needing more definitive analysis. The presentation will convey a few real-world use cases, leveraging CounterTack technology across multiple common and uncommon types of threats from a forensic point of view, so attendees can learn new techniques to elevate their IR workflow.

    As a takeaway, we’ll leave you with an endpoint IR checklist and a set of best practices, and a special incentive to acquire Responder PRO for detailed incident investigation.
  • Masters of Mobile Data IV: From hype to reality in 2017 and beyond Masters of Mobile Data IV: From hype to reality in 2017 and beyond James Peng, Head of Mobile and Social Acquisition, Match Group Recorded: Dec 15 2016 59 mins
    Remember when the experts scoffed at the idea that people would buy stuff with their smartphones? In an industry that reinvents itself every five years, what was once groundbreaking becomes table stakes in the blink of an eye.

    Staying ahead of the curve isn’t simply adopting new technology, but reinventing your approach as new platforms and channels emerge. The next wave is about to crest with the advent of wearables, VR, and the Internet of Things. Are you ready to catch it?

    In our latest VB Live event, we’re going to smash the myths that are holding your company back, and make some big, audacious predictions about the state of mobile business over the next five years—from 2017 and beyond.

    Join industry leaders for a lively hourlong discussion on the future of mobile apps -- and get your real world questions answered live.

    In this webinar you’ll:
    * Learn which mobile analytics will matter in the next five years
    * Understand the ways that KPIs monthly active users (MUA) can be interpreted
    * Measure beyond smartphones -- including wearables, connected cars and more.

    * James Peng, Head of Mobile and Social Acquisition, Match Group
    * Bob Sherwin, VP Direct Marketing, Wayfair
    * Jesse Robbins, CEO, Orion Labs former CEO of Chef
    * Evan Schuman, Moderator, VentureBeat

    Sponsored by mParticle
  • The Realities of Testing High Speed Fiber “Engineered Links” in the Field The Realities of Testing High Speed Fiber “Engineered Links” in the Field Robert Reid, Panduit Recorded: Dec 15 2016 66 mins
    This webinar will focus on the pitfalls associated with tight field test specification of pre-terminated fiber systems for high speed channels in the context of the real capability of portable testers.
    Best practices are discussed (proper test limit specification) such that field test costs will be minimized.

    Attendees will earn one BICSI CEC
  • Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst Recorded: Dec 14 2016 62 mins
    The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.

    Join guest speaker, Forrester’s Joseph Blackenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.

    Topics include:
    - How to grapple with “malware-free” threats, like BEC spoofing
    - Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
    - Managing a move to the cloud without losing visibility into attacks
  • Instant messaging: The future of mobile marketing Instant messaging: The future of mobile marketing Stewart Rogers, Dir. of Marketing Technology, VentureBeat Recorded: Dec 14 2016 62 mins
    The rise of instant messaging has created the largest and fastest-growing potential consumer audience ever—and a powerful opportunity to form instant, one-to-one connections between your brand and your customers. According to Juniper research, by 2019, over 160 trillion messages will be sent every year. That amounts to 438 billion messages daily.

    Most messages are read within three minutes of being opened—this kind of immediacy is unparalleled in other communications. And IMs can include a stunning variety of contextual, relevant, interactive content, and create conversations, engagement, and a deeply personalized connection that’s never been possible with email.

    Join our latest VB Live executive workshop to learn how to leverage the power of instant messaging to form meaningful connections and reimagine how you think about retail, customer service, and the entire customer experience.

    By participating in this VB Live event you’ll:
    * Learn how to leverage instant messaging
    * Capture customer details in IM
    * Leverage instant messaging technologies to improve your marketing strategy overall
    * Use the high engagement of messaging in terms of viewabilty

    * George Corbin, Senior Vice President, Marriott Digital
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Quinn Banks, Sr. Mobile Marketing Manager, Farmer's Insurance
    * Wendy Schuchart, Moderator, VentureBeat
  • How to accelerate your transition to embracing Secure Access How to accelerate your transition to embracing Secure Access David Goldschlag, CTO & Senior VP of Strategy Recorded: Dec 14 2016 29 mins
    Welcome to Pulse Secure’s webinar series on The Six W’s of Pulse Secure! We will take you through the journey on the perfect formula for staying contemporary in the vast evolving world of Secure Access.

    The final webinar in our series will show you how to get up to speed on a new robust security perimeter with policy at its core, compliance for the cloud, and frictionless experience for workers.
  • 5G, IoT and Autonomy 5G, IoT and Autonomy George Karayannis, Chris Clayton and Limor Schfman Recorded: Dec 14 2016 62 mins
    The Internet of Things will redefine services offered in such industry sectors as eHealth, smart communities, retail, transportation and energy.  To provide the levels of service required, infrastructure networks will be suffused with levels of complexity beyond any deployed and operated to date. 

    The concept known as “5G” is still being defined.  It will include legacy systems such as 3G, expand the development of 4G LTE, incorporate newly developed technologies such as holographic beamforming and virtualization, and include other types of networks such as WPLANs, satellite, and fiber.  Interoperability of the networks, seamless integration of applications and the transfer of data across the networks and systems will require autonomous and artificial intelligence to ensure seamless, secure and ensured delivery. 
    Chris Clayton, Head of Solution Design & Delivery for Beyond Limits, and George Karayannis, Vice President of CityNOW for Panasonic, will take us on a deep dive on how the integration of networks and autonomous artificial intelligence capabilities will enable trusted IoT connectivity demands within Smart Cities.
  • IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント 中西一博, セキュリティプロダクトマーケティングマネージャ, アカマイ・テクノロジーズ 合同会社 Recorded: Dec 14 2016 61 mins
    現在、最も頻繁に用いられるサイバー攻撃のひとつとなったDDoS攻撃。Mirai Botnetに代表されるIoTを媒介する新たな攻撃手法によって、ビジネス停止のリスクがかつてないほど高まっています。実際にその攻撃を受け止めたAkamaiが観測した最新の攻撃データに基づき、現在のDDoSの特徴としくみ、その対策を用意する際に留意すべきポイントを中心に、企業Webを中心にしたシステムが今まさに直面しているリスクを解説します。
  • Who You Gonna Call? Arm the Service Desk to Ghost-Bust Issues Before They Occur Who You Gonna Call? Arm the Service Desk to Ghost-Bust Issues Before They Occur Chris Marsh, 451 Research; Chris Dunn, Easy Vista; & Bruce Aboudara, Scalable Software Recorded: Dec 13 2016 59 mins
    The Service Desk is at the frontlines of a changing landscape in IT. IT is now, more than ever, required to provide 100% uptime of their services, and provide them to users anytime and anywhere – thanks in large part to the growth in new consumer apps and services accessed through mobile devices.

    To support this demand the service desk must be aware of and prepared for several key trends:

    •Mobile. More and more, users are accessing their services through their mobile devices. Powerful trends are shaping the mobile world that will impact the Service Desk. We in the service desk must adapt, but what does that mean?

    •Service Availability. Users expect their services to always be up – just like they experience with their other mobile apps and should there be an issue, they expect it to be resolved immediately. What can the Service Desk to make this dream a reality?

    •New Technologies. Prompted by this need for always-on, mobile-available services, infrastructure teams are looking toward newer technologies such as public clouds, software defined networking (SDN), and hyperconverged architectures. How does this impact the Service Desk?

    Join, Chris Marsh, lead mobility analyst at 451 research, Chris Dunn, Global Director of Product marketing for EasyVista, and Bruce Aboudara SVP at Scalable Software as they discuss the key trends the service desk need to know about as well as actions the service desk can take to capitalize on those trends.

    If you have any questions, feel free to email Chris Dunn at cdunn@easyvista.com
  • Evolving the Digital Experience in 2017 Evolving the Digital Experience in 2017 Simon Crawley Recorded: Dec 13 2016 59 mins
    The digital revolution within society is in full swing, as the rate of consumer-facing technological advancement accelerates to unprecedented levels. Your users have never been so tech aware, and businesses need to keep up in order to stay relevant in the current marketplace. The pressure on businesses is two-fold – not only do they need to successfully transform themselves and their processes, but they need to apply that transformation to their customers’ experience.
    So where do organizations need to focus their digital transformation efforts in order to be successful? And what part does analytics play in this digital revolution? How beneficial is a comprehensive and experienced analytics partner to organizations currently attempting to transform digitally?
    During this webinar we will discuss the difficulties organizations are encountering when undertaking their digital journey, investigate why some organizations are more successful at digital transformation than others, and take a look at the impact and repercussions of failing to successfully transform in 2017.
    Huge business challenges are also often opportunities, and where some businesses struggle, others will excel. Organizations today need to view digital transformation as their defining moment, and reap the benefits moving into the future.
  • 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" John Ray, Senior Product Strategist and EricHanselman, Chief Analyst at 451 Group Recorded: Dec 13 2016 63 mins
    The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.

    Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.

    Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
    • Recent findings on enterprise cloud usage from 451 Group
    • How to analyze the security risks of your cloud platforms
    • Security practices for different cloud platforms and business processes
    • Future-proofing your Cloud security and data protection compliance
    • How security can work in the multi-cloud universe
    • Implementing a key management system that you own
  • Smart Planning and Design for the Evolving Data Center Landscape Smart Planning and Design for the Evolving Data Center Landscape McKenzie Hughes and Carrie Goetz, The Siemon Company Recorded: Dec 13 2016 59 mins
    This webinar will cover latest trends, the shift to hybrid IT/cloud and colocation, the value of modular designs with preconfigured cabinets, growing vertically instead of horizontally, 40/100G migration (and future 400G) and the importance of low-loss fiber connectivity in backbone switch to switch links.
  • The End of Proprietary Software The End of Proprietary Software Merav Yuravlivker, Co-founder and CEO, Data Society Recorded: Dec 8 2016 49 mins
    Is it worth it for companies to spend millions of dollars a year on software that can't keep up with constantly evolving open source software? What are the advantages and disadvantages to keeping enterprise licenses and how secure is open source software really?

    Join Data Society CEO, Merav Yuravlivker, as she goes over the software trends in the data science space and where big companies are headed in 2017 and beyond.

    About the speaker: Merav Yuravlivker is the Co-founder and Chief Executive Officer of Data Society. She has over 10 years of experience in instructional design, training, and teaching. Merav has helped bring new insights to businesses and move their organizations forward through implementing data analytics strategies and training. Merav manages all product development and instructional design for Data Society and heads all consulting projects related to the education sector. She is passionate about increasing data science knowledge from the executive level to the analyst level.
  • Customer Service: Maximizing Service Management Beyond IT Customer Service: Maximizing Service Management Beyond IT Paul Kelsey, Kifinti Solutions Inc. & Mike Heberling, HEAT Software Recorded: Dec 8 2016 57 mins
    Customer Service: Maximizing Service Management Beyond IT

    There is a distinct need for a tech support staff with a desire for supporting customers with immediacy and social intelligence— creating a better connection in a digital world.

    Both internal and external customers are utilizing more communication channels and more devices now than ever before. The mobile workforce, remote work, consumerization, increased self-service, and emerging technologies have all played a part in creating the demand for better ways to serve customers and users.

    Join us for this Customer Service webinar & learn:

    Instant information to clients
    - Workflow to run based on known and secure criteria
    - Voice system knows everything the Service Desk knows

    Multiple communication channels
    - Integration and capabilities
    - Omni Channel
    - Single message representation

    Distributed Support/Telecommuting
    - Globalization
    - Repatriation of Call Centers

    Voice of the Customer Score
    - Personalization of Interaction and Routing
    - Custom Surveys based on Service and Category

    Auditing and Compliance
    - Reporting on actual effort for Labor Law compliance

    Who should attend?
    - VP of Support
    - IT Service Desk managers
    - Desktop Support managers
  • Smarter Cybersecurity™ solutions start with next-gen protection Smarter Cybersecurity™ solutions start with next-gen protection Shane Cooper | Senior Sales Engineer Recorded: Dec 8 2016 44 mins
    Discover the smarter way to protect endpoints.

    Today’s threats evolve at an alarming pace. That means cybersecurity and threat intelligence have to move even faster to help businesses stay secure against modern cyberattacks. Join us for in-depth technical demonstration of Webroot SecureAnywhere® Business Endpoint Protection to learn how Webroot works to safeguard your employees, clients, and data without adding complexity or slowing users down.
  • Data Center Optical Fiber Standards and Technology Update Data Center Optical Fiber Standards and Technology Update John Kamino, OFS Recorded: Dec 8 2016 61 mins
    The webinar will cover the latest adopted application and cabling standards including draft proposals in front of IEEE and Fibre Channel, the latest progress on 50/100/200 Gigabit Ethernet and 64/256 GFC, and recent and in-process updates of both TIA and ISO/IEC cabling standards.
  • Lessons learned from implementing HCE for cloud-based NFC mobile payments Lessons learned from implementing HCE for cloud-based NFC mobile payments Sarah Clark, Rob Macmillan and Shaun Hodgkiss Recorded: Dec 8 2016 46 mins
    Join NFC World, Proxama and South Africa-based payments processor Tutuka to get real world insight into the practical issues involved in implementing a host card emulation (HCE) mobile payments service using Visa and MasterCard's cloud based payment standards.
  • Adding Intelligence to Investigations (Focus on data breach investigations) Adding Intelligence to Investigations (Focus on data breach investigations) Stuart Clarke, CTO, Cybersecurity, Nuix; John Douglas, Technical Director, First Response Recorded: Dec 7 2016 61 mins
    Data volumes are growing in both size and complexity; we have increasingly less control and awareness of the data we hold. In this session, we will highlight the benefits of information governance practices enabling organisations to build intelligence about their own data and identify their critical information assets. In the event of a data breach or security incident, this information provides actionable intelligence, allowing you to discover and respond to an incident before the matter escalates into a crisis.

    Key takeaways:
    1. Understand the basic principles required to understand your data
    2. See how leveraging intelligence can get you to the answer faster
    3. Extract hidden links and relationships with analytics

    Join Nuix and (ISC)² on Dec 07 (Wed) at 02:00p.m. (Singapore time) in learning how to add intelligence to investigations (focus on data breach investigations).

    - Stuart Clarke, Chief Technical Officer, Cybersecurity, Nuix
    - John Douglas, Technical Director, First Response

    Member, Asia-Pacific Advisory Council, (ISC)²
  • Identity & KYC Webinar Series Identity & KYC Webinar Series Michelle Schofield, Ervinna Lim Recorded: Dec 6 2016 29 mins
    Ensure KYC, Reduce Fraud, Provide a Great Customer Experience -- How digital currency is Winning on 3 Fronts

    From traditional banks to, money transfer and now the growing Bitcoin market, meeting KYC requirements is critical. Come learn how Coinbase, the leader in digital currency, is using Jumio to ensure regulatory compliance, reduce fraud, and ensure a frictionless customer experience.
  • The Right Transformation Model for European Businesses in 2017 The Right Transformation Model for European Businesses in 2017 Alexander Michael and Neil Kapoor, NetSuite Recorded: Dec 6 2016 52 mins
    Digital transformation affects every industry, every type of organisation and every country in Europe. It is a strategic priority for businesses to address the top drivers behind industry change: (1) changing needs of customers; (2) new distribution channels; and (3) new products entering the industry.

    A unified suite of applications running off of a single database answers these challenges efficiently, and Frost & Sullivan research finds that businesses increasingly see cloud as a solution to the challenges of industry transformation, competition, and as a means to facilitate global expansion. They are turning to the cloud for its agility, scalability and flexibility, and reaping the rewards by delivering innovative products and services that are transforming industries.
  • Secure Web Application Delivery with Real Time Analytics Secure Web Application Delivery with Real Time Analytics Asha Kalyur, Citrix and Juan Asenjo, Thales e-security Recorded: Dec 6 2016 63 mins
    View our webinar with Citrix to learn how to build an end-to-end network architecture that enables you to secure web applications with robust security
  • 2017 Trends in Mobility 2017 Trends in Mobility Brian Partridge, Research Vice President - Mobility Jan 17 2017 4:00 pm UTC 60 mins
    Mobility in 2017 is all about 5G, which is not just another “G” – its scope is far larger. Previous G’s focused on increasing bandwidth and latency to support Mobile Internet consumption patterns accelerated by universal adoption of smart devices. The revolutionary attributes of 5G converge the latest innovations in network, cloud, and devices in a way that has never been done before. 5G’s impact will be far reaching across industries generating massive value not possible in previous technology shifts. Ultra-broadband communication and computing power will combine and extend across networks and devices such that information and computing power will be instantaneously available.

    Join Brian Partridge, Research Vice President for Mobility, as he explores how this will catalyze a wave of innovation in applications, services and functions built to run on the new 5G infrastructure.
  • 2017 Trends in Services 2017 Trends in Services Kelly Morgan, Research Vice President - Services Jan 18 2017 3:00 pm UTC 60 mins
    The next wave of cloud computing is coming, and it is going to take the shape of serving distinct enterprise needs in an on-demand fashion. It is normal for enterprise IT departments to provision or procure IaaS, PaaS or SaaS services now. That in turn means that a larger galaxy of business needs and operational complexities will be tackled as the next way to monetize cloud infrastructure. The trickle of specialized providers doing boutique services such as disaster recovery as a service, compliance as a service and database as a service could well become a flood.

    Join Kelly Morgan, Research Vice President for Services as she uncovers what service providers will need to change in order to gain a competitive advantage in 2017, and what the sources of demand for multi-tenant datacenters will be in the coming year.
  • Escaping the Storage Licensing Money Pit Escaping the Storage Licensing Money Pit Dave Wright - Vice President & General Manager, NetApp SolidFire and Tim Stammers - Senior Storage Analyst, 451 Research Jan 18 2017 7:00 pm UTC 60 mins
    The tables have been stacked against storage buyers for decades, but a change is coming. Forget the endless refresh treadmill of monolithic storage systems, and licensing models that are not just inflexible, but also force you to pay again and again for the same technology. Join this webinar to learn how to liberate your storage budget, and pay for storage the way that suits your business rather than the vendors, with 451 Research senior analyst Tim Stammers, and NetApp SolidFire’s Vice President & General Manager, Dave Wright.
  • What’s New in LEAP: Concert What’s New in LEAP: Concert Hironmay Basu, Product Manager - LEAP Jan 19 2017 4:00 pm UTC 90 mins
    LEAP, is a suite of purpose-built, cloud-native content apps designed to revolutionize the content management industry and transform interactions with business content.

    Concert, allows multiple contributors to collaborate structurally on a single version of a document by easily dividing and assigning sections to individuals. Concert can be used for RFPs, Product Launch Documents, Contracts, Clinical Trials or similar use cases, bringing order to these collaborative processes while freeing participants to do their best work. Divided documents, workflow notifications, and authoritative controls are all combined to prevent unauthorized or unnecessary content changes.

    Topics to be discussed: LEAP Concert has the following key capabilities:
    •Document creation, editing and collaboration
    •Section based assignment and control
    •Review and approval workflows for individual sections
    •Document history and version comparison
  • 2017 Trends in Infrastructure 2017 Trends in Infrastructure Al Sadowski, Research Vice President - Infrastructure Jan 19 2017 4:00 pm UTC 60 mins
    Enterprises and service provider customers have more storage, networking, and cloud technology choices at their disposal than ever before, and aggressive technology adopters will gain a performance and agility edge over their rivals in 2017. All Flash Arrays, Object Storage and Disaster Recovery to Cloud/Disaster Recovery as a Service are key technologies transforming the storage landscape. These new innovations account for a relatively small amount of storage revenue today, but will gradually displace traditional disk based storage systems, ultimately opening up opportunities for new innovators. The pace of change in networking technology provides the speed, capacity and agility demanded by cloud, IoT, social media, content delivery and the fabric that makes digital transformation possible.

    Join Al Sadowski, Research Vice President for Infrastructure, as he dives into what’s accelerating the virtualization of network applications and how traditional vendors will need to transform their “innovation supply chain” to produce product equivalents to highly scalable cloud infrastructure.
  • 5G RAN: A Reality Check 5G RAN: A Reality Check Brian Daly-AT&T, Adam Drobot-OpenTechWorks, Inc.,Steven Glapa-Tarana Wireless,Robert Azzi-Argyle Griffin Grp Jan 19 2017 4:00 pm UTC 60 mins
    High speed and autonomous transportation, remote surgical procedures, and mixed reality experiences are just a few of the upcoming Internet of Things (IoT) technological game changers that require high speed and low latency communications infrastructure. 5G Radio Access Network (RAN) technologies continue to evolve to meet the complex and continually evolving network requirements of IoT applications.

    This webcast will explore the latest advances in RAN, including:
    • Which technologies will see the earliest deployments?
    • How important will the 3.5 GHz band networks (also known as the Citizen’s Broadband Radio Service (CBRS)) be in future 5G applications?
    • Will mmWave networks change the game in the last mile?
    • How far will the industry advance in real deployments in the next year or two?
    • Where are companies participating in this ecosystem investing their money?
    • Are there concerns for Return on Investment (ROI) that companies are trying to resolve?

    Brian Daly, Director - Core & Government/Regulatory Standards, AT&T Access Architecture & Devices
    Adam Drobot, Chairman, OpenTechWorks, Inc.
    Steven Glapa, VP of Marketing, Tarana Wireless
    Robert Azzi, Executive Managing Partner. Argyle Griffin Group (Moderator)
  • 2017 Trends in Cloud 2017 Trends in Cloud William Fellows, Founder and Research Vice President - Cloud Jan 24 2017 4:00 pm UTC 60 mins
    Digital transformation is a business imperative, not an option. Cloud is powering this change: It provides the new style of IT that supports the information, process and platform transformations required to link technology and information assets with marketing and customer experience to deliver new or enhanced digital processes.

    Join William Fellows, Founder and Research Vice President for Cloud, as he discusses what’s coming this year in cloud, and how the industry’s major battleground in 2017 will be how, from where and at what price cloud transformation services are delivered to customers.
  • Elevate IT Operations in the Boardroom with App Analytics Elevate IT Operations in the Boardroom with App Analytics Bryan Whitmarsh, Sr Principal Product Manager, Application Performance Management, CA Technologies Jan 24 2017 6:00 pm UTC 60 mins
    Over the past 20+ years, IT has mastered the art of collecting performance and user data. But to succeed in today’s application economy, you need to learn how to take this information and evolve into a data-driven business. Your success hinges on ensuring that every customer experience is the best it can be, and that means gaining insight across the vast complexity of your mobile, web and application environments. In this session, learn how analytics can sort the wheat from the chaff in your performance data to highlight key business insights that will separate you from your competitors and gain you a seat in the boardroom.
  • How to Prepare for Cyber Threats in 2017 How to Prepare for Cyber Threats in 2017 Patrick Wheeler Director,Threat Intelligence, Proofpoint Jan 24 2017 6:00 pm UTC 60 mins
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Patrick Wheeler, Proofpoint's Director of Threat Intelligence, for "How to Prepare for Cyber Threats in 2017" and learn:

    * What we predict for the threat landscape in 2017

    * Key actions you can take to prepare

    * What top resources will help support your security efforts
  • Pay TV, Video on Demand, and IPTV Growth Opportunities in Africa Pay TV, Video on Demand, and IPTV Growth Opportunities in Africa Deepti Dhinakaran, Naila Govan-Vassen and Oluchi Enuha, General Manager, iROKOX Jan 25 2017 2:00 pm UTC 60 mins
    The pay TV, VOD, and IPTV market is still evolving in terms of content and pricing models, but the demographics of Africa and its large population are highly attractive to existing and new market participants. Internet penetration, supplemented by a significant uptake in smartphone adoption, has altered the manner in which Africa consumes video content. This growth will be further augmented by the availability of cheaper DTT services, data-saving video consumption options, and attractively packaged triple-play services. It is critical for market participants to gauge market trends, price sensitivity and growth opportunities while offering their services. Along with pricing and richness of content, strategic partnerships will play a key role in defining the market leader in the next five years.
  • Security in the Age of Social Media Security in the Age of Social Media Jeff Lenton, Solutions Architect, RiskIQ Jan 26 2017 2:00 pm UTC 60 mins
    Social Media has come of age. Collectively, social platforms have attracted two-thirds of the world’s internet users with more joining every day. This ubiquity has lead many organisations to make social an integral part of their digital channels strategy, along with their web presence and mobile apps.

    For organisations engaging in social media, the importance of having an advanced social media strategy is more critical than ever.

    During the session you will learn:
    * The attack methods hackers use to exploit social media platforms and profiles.
    * Which weaknesses cyber criminals look for so you can protect your company’s social media reputation.
    * How to strengthen your security approach to combat social media threats.
    * The defense techniques an organization must employ to prevent social phishing attacks, brand impersonation, recruiting scams, customer service impersonations, malware attempts, RDC, and more.
  • Value at the Speed of Business: Insights from the 2016-17 World Quality Report Value at the Speed of Business: Insights from the 2016-17 World Quality Report John Jeremiah, Product Marketing Manager, Hewlett Packard Enterprise Jan 26 2017 5:00 pm UTC 45 mins
    Today we are in an age of digital consumers who are hyper-connected, expecting information and service wherever and when ever they want. Companies must be able to respond to the increasing demands of their customers with superior products and services without sacrificing quality or security.

    In this webinar you will learn about key findings from the eighth edition of the World Quality Report, which illustrates the impact of trends like Agile, DevOps, IoT and others. These trends are forcing organizations to disrupt with digital at an ever faster pace. Specifically you will learn more about these 4 key trends in QA and Testing:

    • Digital Transformation driving and shaping IT strategy
    • Agile and DevOps continue to expand and grow in adoption
    • Internet of Things a disrupting force with real implications on quality
    • Infrastructure costs (test environments); a rising concern
  • Build Self-Service Dev/Test Environments with Google Cloud Platform & CloudBolt Build Self-Service Dev/Test Environments with Google Cloud Platform & CloudBolt Bernard Sanders, CTO and Cofounder, CloudBolt; Chris Sells, Product Management Lead, Google Cloud Developer Tools Jan 26 2017 5:00 pm UTC 30 mins
    Enterprise IT organizations looking to get a foothold into public cloud need solutions that deliver the efficiency and innovation promised by cloud platforms—without throwing away the investments they've made in on-prem technology, policies, and skills.

    Creating self-service Development & Test (or Dev/Test) environments is one of the first and most popular cloud workloads enterprise IT organizations explore in their journey to cloud. Google Cloud and CloudBolt have partnered to create a hybrid cloud solution for this important workload that's easy to set up, and can be fully tailored to your environment. CloudBolt is a cloud management platform that integrates your on-prem virtualization and private cloud resources with the public cloud, serving as a bridge between your existing infrastructure and Google Cloud Platform.

    With these hybrid solutions, users can rapidly provision the resources they need through an intuitive self-service portal. IT organizations maintain full control over system configuration, usage quotas, and cost transparency. By delivering a self-service, fully auditable alternative to shadow IT, CloudBolt and Google Cloud let you tap the latest cloud innovations from Google directly from the technology you're already familiar with on-prem.
  • The True State of Security in DevOps and Expert Advice on How to Bridge the Gap The True State of Security in DevOps and Expert Advice on How to Bridge the Gap Maria Bledsoe, Dir of Product Marketing, HPE and Jeff Payne, CEO and Founder of Coveros Jan 26 2017 6:00 pm UTC 60 mins
    Rapid application delivery is dramatically transforming how software is created and delivered, pushing the limits on the speed and innovation required of development teams. If you are wondering how this change in culture, process and operations affects Application Security, you are not alone.

    HPE research reveals that while fully mature DevOps programs are rare, well over half of organizations surveyed are implementing key DevOps methodologies such as Automated Testing and Frequent Delivery. And while most agree that this presents an opportunity to integrate Application Security methodologies – that is not the reality. In fact, only 20% of organizations cite Static Testing during the coding process.

    Join HPE and Coveros to discuss practical advice that DevOps and Application Security Teams, of any maturity level, can take away from these findings and begin to build a roadmap for building security into every step of the SDLC, from coding through production.
  • 6 Essentials for Secure BYOD in Healthcare 6 Essentials for Secure BYOD in Healthcare Salim Hafid, Product Marketing Manager Feb 1 2017 7:00 pm UTC 60 mins
    For healthcare organizations struggling to secure BYOD, Mobile Device Management (MDM) was widely heralded as a solution, one that could completely control unmanaged assets. However, physicians with multiple hospital affiliations coupled with privacy concerns has resulted in stagnant adoption.

    In this webinar, we explore alternatives to MDM that protect mobile data and devices without impeding on employee privacy. We'll also explore 6 critical capabilities for securing BYOD to help your firm achieve compliance.
  • The Foundations and Future of PKI: Yes, it’s Alive and Kicking The Foundations and Future of PKI: Yes, it’s Alive and Kicking Asaf Lerner, PKI product development at Gemalto Feb 6 2017 4:00 pm UTC 60 mins
    According to a report from the Ponemon Institute, 62% of businesses surveyed regard cloud-based services as the most important trend driving the deployment of applications using PKI, an increase from 50% in 2015. While 28% say IoT will drive PKI deployment. PKI is once again in the spotlight, thanks to the growing number of use cases.

    The foundations of PKI technology and it’s future potential will help professionals determine the best security strategy for the long term. This session will go over the building blocks of a PKI ecosystem and discusses the functionality and use cases of the technology. Whether you’re a security professional looking for a PKI refresher or you are starting from scratch, you will find this webinar useful.

    During our webinar, The Foundations and Future of PKI: Yes, it’s Alive and Kicking, we will cover:

    •Brief overview of PKI technology and it’s components
    •PKI for identity and data protection
    •Advanced security functions of PKI
    •Basic PKI practices
    •PKI vertical use cases
    •The brave new world of PKI – a look at emerging trends and technology
  • Improve Your Cybersecurity Visibility by Thinking Beyond the Network Improve Your Cybersecurity Visibility by Thinking Beyond the Network SVP, Cybersecurity Strategy, David Jevans, VP Mobile Security, Celeste Wynchopen, Social Media Strategist, ProofPoint Feb 8 2017 6:00 pm UTC 60 mins
    Today’s cyber attackers exploit human weakness more often than infrastructure gaps: 90% of attacks target email, but social media links and mobile apps are also fair game.

    In this webinar you will learn:

    • How cyber attackers gain visibility into organizations.
    • How you can see across all major threat entry points and stop attacks.
    • How to stop business email compromise (BEC), credential phishing, ransomware and other advanced threats.
    • How to eliminate social media risk so you can focus on social success.
    • How to protect against malicious apps that mishandle data or install malware.
  • The Do’s & Don’ts of Creating & Managing Global Content The Do’s & Don’ts of Creating & Managing Global Content Brendan Kenney (Transifex), Matt Grotenstein (Acclaro), Brian McConnell (Medium) Feb 8 2017 7:00 pm UTC 60 mins
    Learn best practices on how to effectively manage your multilingual content so you can deliver the most value to your customers and partners internationally.