Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
Digital transformation is moving at lightning speed. From a global enterprise software perspective, the use of rapid application development, continuous integration, and standards-based code and tech stacks is growing - your organization can’t afford to miss the boat.
Join OutSystems CEO Paulo Rosado and a panel of experts as they dish out best practices for planning, launching and expanding your digital transformation journey without crashes or failures.
Welcome to Pulse Secure’s webinar series on The Six W’s of Pulse Secure! We will take you through the journey on the perfect formula for staying contemporary in the vast evolving world of Hybrid IT.
The fifth webinar in our series will lead you through Pulse Workspace, our app-agnostic container solution, allowing employees to enjoy the true native user experience of their preferred mobile device for both work and life.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they break many of the traditional security approaches and spark questions like:
With massive volumes of data, how are organizations going to ensure that their customer information is safe from people looking to exploit it?
Is it possible to adopt big data technologies while demonstrating compliance with industry regulations?
Will security get in the way of the analytics tools?
How can security apply to different data consumption technologies like Hadoop and NOSQL?
Join Gemalto on Thursday, December 1, 2016 as we discuss what’s in store for the ‘big data’ technologies of the future and how security models like encryption can solve the security conundrum.
Mobile VR is going to be far and away the largest market for virtual reality in both the immediate term and as the VR market expands. This is where VR is going to come in and disrupt entrenched competition in the digital landscape. Currently less than 1% of PCs worldwide are powerful enough to run the Oculus Rift or HTC Vive, so producing VR for low end hardware specs on Mobile VR is going to be the best strategy for accessing large numbers of consumers. 5G and expanding wifi is going to explode current bandwidth limitations and be the backbone for next generation Mobile VR experiences. Together with the new WebVR format, 5G and Mobile VR will be the place to build your disruptive VR application and open up a whole new realm of solution, acquisition, and engagement. Through social VR, sharing, avatars, and solutions-based VR, Mobile VR is going to be the brand of VR that changes the world. What can you build in VR that has the same value, or more value, than non-VR applications?
Will Virtual Reality connect us to the world or separate us?
Join world creator Rob Crasco and speaker Ryan A Bell for a special live discussion on immersive media, tipping points and the future of creating. In this session you’ll learn how to get started in VR, the mentality of the future creator, building worlds and, of course, what will happen in the future.
The webinar will tackle the possibilities for brand communication with location-based Virtual Reality experiences. VR lets the consumer not just step inside the brands world but also feel, smell and touch. The presentation gives insights on VR theory with a focus on marketing and
an overview on currents state of the technology.
The session will explore how this rapidly developing area of VR / AR / Mixed Reality and its position and convergence in the areas of advanced Customer Experience, Digital Asset Management and new A.I. led augmentation strategies starting to transform processes and experience.
We introduce a novel approach to framing digital spaces and how to measure Augmented impact on performance metrics and then explore how this is further developing into A.I. Intelligent spaces and what this may mean for Business Operating Models and future work automation design in what is described as Intelligent Business Strategy.
We include a few actual cases studies of how Cyber-physical systems driving “Digital Twins” are extending across processes and changing supply chain feedback and interaction for smart energy, smart design and new knowledge capabilities.
Can immersive reality actually help us better understand each other? Understand ourselves? How does human cognitive processing change, or become enhanced, once VR and AR are added to the mix?
What does that mean for our (future) sense of self? What is the impact of literally ‘putting oneself in somebody else’s shoes’ and what that means for human empathy?
Exploring recent findings on the treatment of phobias, PTSD and mental health issues using VR, and theories around the virtual-physical illusion of presence, this webinar asks how neuroscience has been affected and/or advanced by the development of immersive tech.
Ed Greig will be talking about how Deloitte Digital is working with clients using virtual and augmented realities today, as well as describing how these technologies are being adopted more broadly across industries.
He will also describe how to assess and work with new technology so that your organisation can get the most out of it before your competitors do.
Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news.
But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
In this webinar, you’ll learn:
- Why email spoofing works
- What the current BEC trends and attack methods are
- How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox
Why You Must Attend:
• Discover why digital transformation is at the heart of customer experience
• Learn about next-generation intelligent contact centers incorporating Artificial Intelligence (AI) and leveraging the power of SMAC
• See how digitalization is driving the 4Cs of global contact centers: consistent customer experience, customer segmentation, consolidation and control
• Follow customer use cases, which demonstrate the benefits of Tata Communications’ hosted contact centers
This webinar will provide expert insights on the latest cybercriminal activity and recognize the year's most innovative, dangerous, and pervasive malware. Specifically, we will be covering the latest developments and providing updates on Angler, Neutrino, CryptXXX, TeslaCrypt, Locky, Cerber, CryptoMix, and RaaS. Come learn about these developments and strategies to help secure your organization from ransomware and next-generation cyberthreats.
This unique and fresh webinar will take a look at the process foundation of Performance Engineering and various solution blueprints organizations are using at each step of the process to deliver effective Performance Engineering. We’ll take a look at blueprints from HPE, CA, IBM, Micro Focus, Open Source, etc. We’ll also discuss Agile solutions. You may be surprised to discover how well these solutions may work together and you may already have them in-house. We’ll also show example blueprints some larger organizations are using. We are looking forward to this collaborative webinar. We hope you will join us.
Join 451 Research to learn how IoT and connectivity are shifting user behavior and payment vendors' offerings, and will ultimately make transactions far more integrated while far less visible to consumers and enterprises. In this webinar we’ll examine previous attempts at integrated commerce, discuss what worked and what didn't, and detail the drivers underpinning the next frontier of commerce. Throughout the discussion, 451 will leverage recent insights from its Voice of the Connected User Landscape and Voice of the Enterprise: IoT surveys to paint a 360 degree picture of the key opportunities rapidly emerging at the intersection of IoT and payments.
There's no such thing as bad publicity? In the era of data breaches, that's not really true. Time and again in recent years, the mighty have fallen. And as sensitive data reaches the hands of bad guys the world over, so go the fates of customers and companies alike. That's why security is the fastest growing sector of enterprise IT today, with privacy issues front and center.
Register for this episode of The Briefing Room to hear veteran Analyst Dr. Robin Bloor explain why companies need to pay serious attention to the ever-growing importance of privacy, not just security. He'll be briefed by Jay Irwin of Teradata and Carole Murphy of HPE Security, who will demonstrate how their technologies can be combined to create a robust privacy infrastructure that allows organizations to avoid data breaches, or at least keep the data encrypted, thus avoiding the damage of a breach.
Join this presentation and experience what a mobile attack looks like from the viewpoint of the victim. Get insight into the complete process of a man-in-the-middle Wi-Fi attack.
This talk will cover a specific attack which took place at Dallas Fort Worth International Airport on AT&T Wi-Fi while a business traveler was waiting in terminal A for his flight. The presentation will examine details of the attack, including how the wireless carrier rerouted the user's personal wireless traffic from an LTE network to Wi-Fi. You will see exactly what the user experienced on his device and all of the correlating events that took place during and after the attack. All of the detailed forensics and threat data are provided in this presentation to give you an understanding of the exact data provided to the security team.
The first wave of adoption of container technology was focused on micro services and ephemeral workloads. The next wave of adoption won’t be possible without persistent, shared storage. This webcast will provide an overview of Docker containers and the inherent challenge of persistence when containerizing traditional enterprise applications. We will then examine the different storage solutions available for solving these challenges and provide the pros and cons of each.
In this webcast we will cover
•Overview of Containers
◦Quick history, where we are now
◦Virtual machines vs. Containers
◦How Docker containers work
◦Why containers are compelling for customers
•Storage Options for Containers
◦NAS vs. SAN
◦Persistent and non-persistent
◦Opportunities for future work
This webcast should appeal to those interested in understanding the basics of containers and how it relates to the storage used with containers.
During this webinar, the MulteFire Alliance will provide an overview of MulteFire technology and detail how it provides a new wireless connectivity option for enterprises. MulteFire is an LTE-based technology that operates in unlicensed and shared spectrum, enabling an enterprise to deploy its own high-performance wireless network. 451 Research analyst Ken Rehbehn and Alliance members will discuss MulteFire in enterprise IT applications and share why IT decision makers should start planning to incorporate MulteFire into their networks.
Attendees will learn how MulteFire:
•Improves indoor and outdoor capacity
•Delivers a neutral host to serve any user
•Offers opportunity to cover more area and devices with fewer nodes than Wi-Fi
•Leverages LTE’s strong security, authentication, and more
•Supports features such as VoLTE, LTE broadcast, interface management, advanced radio resource management and more
•Plans for the continued evolutionary path established for LTE
Digital transformation affects every industry, every type of organisation and every country in Europe. It is a strategic priority for businesses to address the top drivers behind industry change: (1) changing needs of customers; (2) new distribution channels; and (3) new products entering the industry.
A unified suite of applications running off of a single database answers these challenges efficiently, and Frost & Sullivan research finds that businesses increasingly see cloud as a solution to the challenges of industry transformation, competition, and as a means to facilitate global expansion. They are turning to the cloud for its agility, scalability and flexibility, and reaping the rewards by delivering innovative products and services that are transforming industries.
Ensure KYC, Reduce Fraud, Provide a Great Customer Experience -- How digital currency is Winning on 3 Fronts
From traditional banks to, money transfer and now the growing Bitcoin market, meeting KYC requirements is critical. Come learn how Coinbase, the leader in digital currency, is using Jumio to ensure regulatory compliance, reduce fraud, and ensure a frictionless customer experience.
Data volumes are growing in both size and complexity; we have increasingly less control and awareness of the data we hold. In this session, we will highlight the benefits of information governance practices enabling organisations to build intelligence about their own data and identify their critical information assets. In the event of a data breach or security incident, this information provides actionable intelligence, allowing you to discover and respond to an incident before the matter escalates into a crisis.
1. Understand the basic principles required to understand your data
2. See how leveraging intelligence can get you to the answer faster
3. Extract hidden links and relationships with analytics
Join Nuix and (ISC)² on Dec 07 (Wed) at 02:00p.m. (Singapore time) in learning how to add intelligence to investigations (focus on data breach investigations).
- Stuart Clarke, Chief Technical Officer, Cybersecurity, Nuix
- John Douglas, Technical Director, first response - data investigation & incident response
Join NFC World, Proxama and South Africa-based payments processor Tutuka to get real world insight into the practical issues involved in implementing a host card emulation (HCE) mobile payments service using Visa and MasterCard's cloud based payment standards.
Today’s threats evolve at an alarming pace. That means cybersecurity and threat intelligence have to move even faster to help businesses stay secure against modern cyberattacks. Join us for in-depth technical demonstration of Webroot SecureAnywhere® Business Endpoint Protection to learn how Webroot works to safeguard your employees, clients, and data without adding complexity or slowing users down.
Customer Service: Maximizing Service Management Beyond IT
There is a distinct need for a tech support staff with a desire for supporting customers with immediacy and social intelligence— creating a better connection in a digital world.
Both internal and external customers are utilizing more communication channels and more devices now than ever before. The mobile workforce, remote work, consumerization, increased self-service, and emerging technologies have all played a part in creating the demand for better ways to serve customers and users.
Join us for this Customer Service webinar & learn:
Instant information to clients
- Workflow to run based on known and secure criteria
- Voice system knows everything the Service Desk knows
Multiple communication channels
- Integration and capabilities
- Omni Channel
- Single message representation
- Repatriation of Call Centers
Voice of the Customer Score
- Personalization of Interaction and Routing
- Custom Surveys based on Service and Category
Auditing and Compliance
- Reporting on actual effort for Labor Law compliance
Who should attend?
- VP of Support
- IT Service Desk managers
- Desktop Support managers
Is it worth it for companies to spend millions of dollars a year on software that can't keep up with constantly evolving open source software? What are the advantages and disadvantages to keeping enterprise licenses and how secure is open source software really?
Join Data Society CEO, Merav Yuravlivker, as she goes over the software trends in the data science space and where big companies are headed in 2017 and beyond.
About the speaker: Merav Yuravlivker is the Co-founder and Chief Executive Officer of Data Society. She has over 10 years of experience in instructional design, training, and teaching. Merav has helped bring new insights to businesses and move their organizations forward through implementing data analytics strategies and training. Merav manages all product development and instructional design for Data Society and heads all consulting projects related to the education sector. She is passionate about increasing data science knowledge from the executive level to the analyst level.
The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.
Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.
Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
• Recent findings on enterprise cloud usage from 451 Group
• How to analyze the security risks of your cloud platforms
• Security practices for different cloud platforms and business processes
• Future-proofing your Cloud security and data protection compliance
• How security can work in the multi-cloud universe
• Implementing a key management system that you own
The Service Desk is at the frontlines of a changing landscape in IT. IT is now, more than ever, required to provide 100% uptime of their services, and provide them to users anytime and anywhere – thanks in large part to the growth in new consumer apps and services accessed through mobile devices.
To support this demand the service desk must be aware of and prepared for several key trends:
•Mobile. More and more, users are accessing their services through their mobile devices. Powerful trends are shaping the mobile world that will impact the Service Desk. We in the service desk must adapt, but what does that mean?
•Service Availability. Users expect their services to always be up – just like they experience with their other mobile apps and should there be an issue, they expect it to be resolved immediately. What can the Service Desk to make this dream a reality?
•New Technologies. Prompted by this need for always-on, mobile-available services, infrastructure teams are looking toward newer technologies such as public clouds, software defined networking (SDN), and hyperconverged architectures. How does this impact the Service Desk?
Join, Chris Marsh, lead mobility analyst at 451 research, Chris Dunn, Global Director of Product marketing for EasyVista, and Bruce Aboudara SVP at Scalable Software as they discuss the key trends the service desk need to know about as well as actions the service desk can take to capitalize on those trends.
The digital revolution within society is in full swing, as the rate of consumer-facing technological advancement accelerates to unprecedented levels. Your users have never been so tech aware, and businesses need to keep up in order to stay relevant in the current marketplace. The pressure on businesses is two-fold – not only do they need to successfully transform themselves and their processes, but they need to apply that transformation to their customers’ experience.
So where do organizations need to focus their digital transformation efforts in order to be successful? And what part does analytics play in this digital revolution? How beneficial is a comprehensive and experienced analytics partner to organizations currently attempting to transform digitally?
During this webinar we will discuss the difficulties organizations are encountering when undertaking their digital journey, investigate why some organizations are more successful at digital transformation than others, and take a look at the impact and repercussions of failing to successfully transform in 2017.
Huge business challenges are also often opportunities, and where some businesses struggle, others will excel. Organizations today need to view digital transformation as their defining moment, and reap the benefits moving into the future.
The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.
Join guest speaker, Forrester’s Joseph Blankenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.
- How to grapple with “malware-free” threats, like BEC spoofing
- Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
- Managing a move to the cloud without losing visibility into attacks
The rise of instant messaging has created the largest and fastest-growing potential consumer audience ever—and a powerful opportunity to form instant, one-to-one connections between your brand and your customers. According to Juniper research, by 2019, over 160 trillion messages will be sent every year. That amounts to 438 billion messages daily.
Most messages are read within three minutes of being opened—this kind of immediacy is unparalleled in other communications. And IMs can include a stunning variety of contextual, relevant, interactive content, and create conversations, engagement, and a deeply personalized connection that’s never been possible with email.
Join our latest VB Live executive workshop to learn how to leverage the power of instant messaging to form meaningful connections and reimagine how you think about retail, customer service, and the entire customer experience.
By participating in this VB Live event you’ll:
* Learn how to leverage instant messaging
* Capture customer details in IM
* Leverage instant messaging technologies to improve your marketing strategy overall
* Use the high engagement of messaging in terms of viewabilty
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Quinn Banks, Sr. Mobile Marketing Manager, Farmer's Insurance
* Wendy Schuchart, Moderator, VentureBeat
More speakers announced soon
Remember when the experts scoffed at the idea that people would buy stuff with their smartphones? In an industry that reinvents itself every five years, what was once groundbreaking becomes table stakes in the blink of an eye.
Staying ahead of the curve isn’t simply adopting new technology, but reinventing your approach as new platforms and channels emerge. The next wave is about to crest with the advent of wearables, VR, and the Internet of Things. Are you ready to catch it?
In our latest VB Live event, we’re going to smash the myths that are holding your company back, and make some big, audacious predictions about the state of mobile business over the next five years—from 2017 and beyond.
Join industry leaders for a lively hourlong discussion on the future of mobile apps -- and get your real world questions answered live.
In this webinar you’ll:
* Learn which mobile analytics will matter in the next five years
* Understand the ways that KPIs monthly active users (MUA) can be interpreted
* Measure beyond smartphones -- including wearables, connected cars and more.
* Mark Rasch, Chief Security Evangelist, Verizon
* James Peng, Head of Mobile and Social Acquisition, Match Group
* Bob Sherwin, VP Direct Marketing, Wayfair
* Jesse Robbins, CEO, Orion Labs former CEO of Chef
* Evan Schuman, Moderator, VentureBeat
Cybersecurity teams and incident responders struggle to gather the most accurate intelligence on threats, and targeted, specific security incidents. Teams need technology to drill down into information on incidents, often to respond quickly, and in doing so, determine root cause.
Is it malware? Are there other indicators that you are blind to? Are your systems maligned with attack residue that you can’t analyze in-memory?
The art of incident responses contains three key components typically:
1)Understanding your threat landscape to the point where you can effectively begin to eradicate threats quickly and with confidence
2)Determining through deep investigation the root cause of security incidents, and the broader impact incidents that are not triaged
3)Applying forensic-level analysis to add a layer of intelligence based on what was found, and what can be predictably analyzed
CounterTack delivers incident response capabilities built for analyzing today’s threats, and for drilling down forensically into incidents that might stem from varying levels of malicious code associated with malware and other IOC’s. Leveraging behavioral traits and predictive analytics through its solutions, CounterTack is dedicated to continually improving IR for organizations globally.
This webinar will feature key trends on how the discipline of incident response has shifted toward needing more definitive analysis. The presentation will convey a few real-world use cases, leveraging CounterTack technology across multiple common and uncommon types of threats from a forensic point of view, so attendees can learn new techniques to elevate their IR workflow.
As a takeaway, we’ll leave you with an endpoint IR checklist and a set of best practices, and a special incentive to acquire Responder PRO for detailed incident investigation.
One of the top CIO challenges is to maintain 100% uptime. Access to applications, data, and resources on the network is mission-critical for every organization. Downtime costs can be high and in various forms - loss of revenue and productivity, the cost of recovery and other intangible costs, such as damage to their reputation and brand value. Downtime is simply unacceptable. Hence, security for that network must be highly available and not cause any performance degradation of the network - in migration, deployment or through human error.
In this session, we will explore these questions:
• Is it possible to have no downtime when maintaining network security?
• What are the different causes of downtime?
• What are the different approaches to minimize downtime?
• How do you manage the costs to achieve 99.999% uptime in the network security solutions?
Join Forcepoint and (ISC)² on Dec 21 (Wed) at 1:00p.m. (Singapore time) and learn how to maintain 100% uptime.