Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Making the shift to unified endpoint management for workforce agility
    Making the shift to unified endpoint management for workforce agility
    Suzanne Dickson, Senior Director, Product Marketing, Citrix and Frank Srp, Senior Manager, Technical Marketing, Citrix Recorded: May 23 2019 62 mins
    Increasingly, more companies have recognized that unified endpoint management (UEM) is a critical component of their overall digital transformation as UEM allows for greater workforce agility.

    By managing all your users, devices, apps, and data from a single platform, Citrix helps you maximize user and IT productivity while helping to secure your information and reduce costs.

    In this webinar, you will learn how to:
    - Modernize Windows 10 management
    - Manage Windows 7, Windows 10, iOS, Android, ChromeOS, macOS and iOT endpoints from a single platform
    - Simplify and improve users’ onboarding experience
    - Provide users a consistent, secure approach to access all their apps (virtual, mobile, web, SaaS, native Windows) and data regardless of the device, network or location
    Leverage user-centric analytics that correlates device, application, network and data access information to proactively prevent security threats


    Suzanne Dickson, Senior Director, Product Marketing, Citrix
    Frank Srp, Senior Manager, Technical Marketing, Citrix
  • Come See LetSee Cyber Range
    Come See LetSee Cyber Range
    Lisa Parcella, VP of Product and Marketing and Brandon Cooper, Cyber Range Support Specialist Recorded: May 23 2019 47 mins
    Finding security experts is hard, but training emerging experts is becoming easier! Security Innovation’s CMD+CTRL Cyber Ranges feature intentionally vulnerable web and mobile applications that teach teams how applications are attacked by actively exploiting them, creating higher engagement and retention.

    The CMD+CTRL Cyber Range suite includes several banking websites - you may have heard of ShadowBank, the original and most popular cyber range - as well as a back-office HR application, social media app , mobile fitness tracker app and our newest edition, LetSee!

    LetSee is an online marketplace that lets users shop and sell a variety of hand-made and vintage goods. LetSee is also our first Single Page App (SPA) with a heavy focus on API vulnerabilities.

    Come see LetSee along with our entire Cyber Range suite and get 24 hour access post-webinar to test your hacking skills with our newest application!
  • Customer Briefing: Aerospike Client Services Overview
    Customer Briefing: Aerospike Client Services Overview
    Tom Meese, Director of Client Services Recorded: May 23 2019 38 mins
    Aerospike Client Services is a new suite of professional services, including a new highly innovative virtual and on-site training program - Aerospike Academy. Aerospike Client Services are designed to reduce friction and accelerate the time to value of putting applications built on the Aerospike database into a high scale production environment.

    Join us on May 23th at 10am PT to hear from Aerospike Director of Client services, Tom Meese, who will cover:
    -The Aerospike Client Services strategy
    -Service Packages for New Customers
    -Service Packages for Existing Customers
    -Aerospike Academy
    -How the Services packages can accelerate the deployment of Aerospike databases in large scale enterprise environments
  • Beyond SQL Server 2008 - Modernising your platform Webinar
    Beyond SQL Server 2008 - Modernising your platform Webinar
    Michael Coutanche, Technical Solutions Architect Recorded: May 23 2019 53 mins
    Extended Support for SQL Server 2008 and SQL Server 2008 R2 will end on 9th July 2019. Couple this with end of support for Windows Server 2008 and 2008 R2 six months later, it is important you build a plan to modernise your environment and understand the options available to you.

    This webinar exposes the problem, its scale and shares all the options you have for life beyond extended support.

    Join Microsoft, Coeo and CANCOM (formerly OCSL) to learn about:
    • Microsoft's view of Health and data
    • What the SQL Server Support Lifecycle is
    • Risks of being unsupported
    • Options to modernise your data environment and remain supported
    • Advantages of data centre modernisation and hybrid cloud
    • Key considerations on moving to a modern data centre
    • Advice on the above and our assessment offer

    Speakers:
    Michael Coutanche - Michael works as a Technical Solutions Architect at CANCOM, a Microsoft Gold Partner providing consulting and managed services for Microsoft cloud technologies. He specialises in datacentre and hybrid cloud technologies, and has over 25 years’ of experience working in the IT industry. Michael is also a Microsoft Certified Solutions Expert in Cloud Platform and Infrastructure and Microsoft P-CSA.

    James Boother - James is the Sales and Marketing Director at Coeo, a Microsoft Gold Partner providing consulting and managed services for Microsoft data platform and analytics technologies. He has extensive experience within the software industry, and before joining Coeo had 15 years’ experience working as a programmer, system architect, head of technology and consultant. James is also a Microsoft Certified Master for SQL Server and regularly presents at industry and community events.

    We have recently rebranded to CANCOM and so any queries, please send these to info@cancom.co.uk
    Website: www.cancom.co.uk
  • Policy, context, and analysis…and some more context
    Policy, context, and analysis…and some more context
    Richard Leadbetter, Technical Sales Specialist, EMEA Recorded: May 23 2019 29 mins
    Today’s mobile users have rendered the traditional enterprise network perimeter obsolete. Armed with three or more devices, these users continuously test network boundaries and force IT to accommodate anywhere, anytime access for everything from email to corporate resources.

    Mobility is a double-edged sword. It drives innovation and productivity. But it also creates serious challenges by breaking traditional security architectures and protective mechanisms that weren’t designed to accommodate the worker that’s always on the move. Join us to learn more.
  • Integrating Security into the Mobile App DevOps Ecosystem
    Integrating Security into the Mobile App DevOps Ecosystem
    Brian Lawrence, Solutions Engineering Manager // Brian Reed, Chief Mobility Officer, NowSecure Recorded: May 22 2019 54 mins
    Are you seeking to accelerate the delivery of secure mobile apps? DevSecOps is all about letting tools do the work for you.

    Many DevSecOps shops plug mobile appsec testing directly into the CI/CD toolchain to find and fix vulnerabilities faster. Automate the workflows and tune the testing to meet your needs. Empower devs with nearly zero false positives and remediation details. Break the build when necessary and release apps faster when you don’t.

    Whether you focus on security or development, join this webinar to see how the NowSecure platform integrates with your ecosystem of DevOps tools such as:
    + CI/CD (CircleCI, CloudBees Jenkins, etc)
    + Issue tracking (GitHub, Jira, etc)
    + Vuln management (Brinqa, Code DX, etc.)
  • How ATOS Uses PlateSpin Migrate
    How ATOS Uses PlateSpin Migrate
    Stephan Riebroek, Jo de Baer Recorded: May 22 2019 52 mins
    This webinar is brought to you by the Vivit Automation and Cloud Builders Special Interest Group (SIG).

    In this webinar, you will learn all about Micro Focus PlateSpin; what it is and how can this tool be used to migrate workload from one place to another. The speaker will also explain how the migration to different platforms is setup. After attending this webinar, you will know:

    • The core principles of 'lift-and-shift" server migration
    • How ATOS is using PlateSpin to successfully migrate customer applications to the cloud and other platforms
    • What major features were recently added to PlateSpin and what the future road map looks like
  • GDPR turns one: Protecting Privacy & Maintaining Security in the new GDPR world
    GDPR turns one: Protecting Privacy & Maintaining Security in the new GDPR world
    Markus Grueneberg, GDPR Evangelist and Michael McGrath, Senior Director, Compliance and Digital Risk Recorded: May 22 2019 44 mins
    According to the 2019 Cyber Security Breaches Survey conducted by the UK government, the number of data breaches suffered by businesses has declined over the last twelve months since the introduction of the EU GDPR.

    However, is this decline because of the changing threat landscape, is it due to investments in security controls that protect our people or has GDPR truly transformed the way businesses protect the privacy of consumer data?

    Join Michael McGrath and Markus Grüneberg as we discuss the impact GDPR has had one year on and the new challenges and opportunities it presents as we pass into the second year.
  • Insights from SITS (Service & IT Support Show) May 2019
    Insights from SITS (Service & IT Support Show) May 2019
    Neville Ward, Senior Solutions Architect Recorded: May 22 2019 42 mins
    Unable to make The Service Desk & IT Support Show (SITS) this year? Then join the Micro Focus team as we present the highlights from the show, comprising of customer testimonials and industry insight, including the latest discussion on the difference between a traditional ITSM tool and the latest Forrester Wave report introducing the cutting-edge ESM tools on offer at Europe’s leading Service Desk event!

    Join us as we examine how traditional and manual ITSM tools simply cannot keep up in the digital era - and look at the introduction of ESM (Enterprise Service Management) solutions, including:

    1) How Machine Learning and AI are fundamental parts of any Service Management solution

    2) How codeless automation supports KPI and SLA success.
    3) How Flexible Container Technology provides Portability, Faster Time to Value, and Lower TCO!
  • How Micro Focus PlateSpin Strengthens Operational Agility
    How Micro Focus PlateSpin Strengthens Operational Agility
    Alain Salesse, Senior Solutions Architect, Micro Focus Recorded: May 21 2019 40 mins
    Budget shrinking but still need to deliver application services to your organization to maintain agility? You have options you could move to software-as-a-service, redesign your apps, or you could opt for the fastest, least risky option or re-hosting.
  • How We Approached Evaluation of ALM Octane and Now Run Agile Testing
    How We Approached Evaluation of ALM Octane and Now Run Agile Testing
    Gerd Fladrich, Risang Sidik Recorded: May 16 2019 60 mins
    This webinar is brought to you by the Vivit Testing Quality ALM Special Interest Group (SIG).

    Join this webinar that will demonstrate how BNP Paribas started and performed evaluation of ALM Octane and is now using the tool to run complete agile testing lifecycles. The testing lifecycle will be presented as a live demo that follows Behavior-Driven Development (BDD) methodology and uses Gherkin notation for defining test suites.

    The testing lifecycle starts with definition of requirements and user stories, heavily builds on test automation and advanced reporting, manages and synchronizes defects across tools, and feeds learnings from testing back into the requirements. It uses an integrated development and testing infrastructure including products like Confluence, Jira, Micro Focus ALM, Micro Focus ALM Octane, Jenkins, GIT, Cucumber, IntelliJ, TestCafe, and others.

    BNP Paribas’s journey with agile test automation using ALM Octane started in 2017. The webinar presents in a nutshell how evaluation of ALM Octane was approached and conducted. It explains how new methods were introduced with the objective to leverage full tool functionality. The initiative has soon helped to increase testing efficiency and created important business value.

    Webinar participants will learn:

    • How BNP Paribas has conducted evaluation of ALM Octane
    • Why ALM Octane is much more than just a successor of ALM/Quality Center
    • How ALM Octane eases flexible management of its entire surrounding tool chain
    • Why methodology like BDD shall precede tools, and not vice versa
    • How Gherkin establishes a common language for the entire agile development lifecycle that helps integrating business, development, and testing
    • How to use ALM Octane for pipeline management, reporting, defect synchronization, import of performance testing and BPT results, integration of in-sprint testing etc.
  • Honeycomb Learn Episode 1: Instrument Better for a Happy Debugging Team
    Honeycomb Learn Episode 1: Instrument Better for a Happy Debugging Team
    a conversation with Nathan LeClaire, Sales Engineer and Deirdre Mahon, VP Marketing @honeycombio Recorded: May 15 2019 40 mins
    Honeycomb Learn is a webcast series designed to educate DevOps teams about what observability is and how to get started. Observability-driven development is the ability to ask any question about your production systems so you better understand and debug when incidents occur. Teams ship code confidently, learn continuously, and spend more time innovating.

    Nathan LeClaire, Sales Engineer @honeycombio knows first-hand that the key to instrumenting code is to start with baby steps. With Honeycomb, a little instrumentation will give vast insights as soon as you ingest your data. With Honeycomb Beelines, we take the heavy lifting out of instrumenting.

    Join us live Wednesday, May 15 @10AM PST to learn

    *why instrumentation helps you ship code faster and smarter
    *how to start small and get quick wins.
    *how to level-up your whole team with shared results

    You will also see a short demo of Honeycomb's NodeJS Beeline.

    See Honeycomb in action, hear best practices, and learn how fast and painless instrumentation can be.
  • Global encryption trends -- is your organization keeping pace?
    Global encryption trends -- is your organization keeping pace?
    Dr. Larry Ponemon, Ponemon Institute and John Grimm, nCipher Security Recorded: May 15 2019 61 mins
    Corporate data breaches are in the headlines on an almost daily basis, while business critical applications face malicious threat, or are accidentally compromised by employee mistakes. The 2019 Global Encryption Trends study, with data from almost 6000 respondents in 14 countries/regions, reveals:

    - How organizations in different industries and countries are using encryption to protect sensitive data
    - What use cases for hardware security modules (HSMs) are growing the fastest
    - Features of encryption solutions that organizations value the most

    Join Dr. Larry Ponemon and John Grimm for an overview of the top findings of this industry-leading study on encryption trends, and advice on addressing encryption's top challenges.
  • Avoiding the risks of vulnerable endpoints
    Avoiding the risks of vulnerable endpoints
    Bob Tarzey, Bernard Parsons Recorded: May 15 2019 28 mins
    An interview with Industry Analyst Bob Tarzey, discussing how a security-focused operating system can help organizations optimize their end user device strategy
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, Investigative Response - America Recorded: May 15 2019 70 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Data Breach Investigations Report (DBIR) and the current cybersecurity threat landscape.

    This month's theme: Data Breach Investigations Report (DBIR)

    We'll cover:
    •Key findings based on thousands of breaches analyzed
    •Threat actors, their motives and their tactics
    •Impacted victim industries and targeted assets

    Our Verizon Threat Research Advisory Center presenters will be:
    •Alex Pinto, Head of Verizon Security Research Team
    •John Grim, Senior Manager, Investigative Response - America
    •Dustin Maxwell Tobin Shubin, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Why data quality is integral to Pensions Dashboard success
    Why data quality is integral to Pensions Dashboard success
    Experian's: Mike Sheridan, Client Director, Wealth, Life & Pensions, and Mark Pearce, Strategic Business Development Director Recorded: May 15 2019 33 mins
    The introduction of the Pensions Dashboard presents a transformative opportunity for the pensions industry, driving greater public engagement and boosting long-term savings.



    To ensure success, it’s vital that from the outset users can easily validate themselves and only the correct data is shown to the correct person. Inaccurate data going into the dashboard will result in a poor outcome for customers, potential penalties for the providers, and customers will be unlikely to return to the dashboard as a result.



    Experian’s work with Pension Providers has shown data quality to be challenge for the industry. It’s essential Pension Providers tackle this challenge and focus on improving the quality of their customer data for the dashboard to be a success, and providers to reap the benefits.



    Join this webinar to hear from Experian pension specialists as they discuss:

    · Key takeaways from the DWP’s Feasibility Report

    · Data challenges facing pension organisations

    · Why data quality is key to Pension Dashboard success

    · What steps you can take to begin to address your data quality challenges
  • Top 3 Ways to Improve the Mobile User Experience
    Top 3 Ways to Improve the Mobile User Experience
    Cherie Martin, Sr. Solutions Marketing Mgr (Aruba) Recorded: May 14 2019 48 mins
    Join us May 14th, 10am PDT and learn the top 3 ways your network can provide mobile users with a solid connection and unmatched experiences – all while improving your IT efficiencies.You will also see how you can get simplified management and control. This webinar includes a demonstration of Aruba Central, our Cloud network-management solution. Attend and you could qualify for a FREE Access Point and 90-day trial of Aruba Central.
  • JavaScript: Not Just for the Web
    JavaScript: Not Just for the Web
    Laurie Voss, Chief Data Officer Recorded: May 14 2019 25 mins
    Every year, npm, Inc. surveys hundreds of thousands of developers around the world to assess current trends, use cases and what’s coming next in the world of JavaScript.

    During the last webinar of this series, we will focus on the demographic shift towards developers with more experience and a greater appetite for applying best practices in tooling and security. We will also discuss evolving trends in React, TypeScript, GraphicQL and Web Assembly adoption and how developers are deploying their JavaScript code.
  • The Future of PKI in the Modern Enterprise
    The Future of PKI in the Modern Enterprise
    Tim Callan, Senior Fellow & Jason Soroko, CTO of IoT at Sectigo Recorded: May 14 2019 38 mins
    When you hear “Private PKI,” you probably immediately think about securing intranet sites and outsourcing Microsoft CA. These are indeed very common use cases.

    But with enterprises facing increasingly complex IT environments, and an ever-growing number of interconnected devices, the need for encryption has become greater than ever before.

    Did you know that Private PKI allows you to secure and manage devices and applications as diverse as:
    • Web servers
    • Mobile devices
    • IoT devices
    • DevOps
    • Cloud/Multi-Cloud applications

    Join our industry experts Tim Callan and Jason Soroko and discover how Sectigo Private CA allows you to secure and automate the management of your internal devices and applications (regardless of which internal protocols you have in place), and save you costs, time and resources in the long run.
  • Embrace the Configuration Data Chaos in DevSecOps
    Embrace the Configuration Data Chaos in DevSecOps
    Benny Van de Sompele, CTO Recorded: May 14 2019 44 mins
    Why configuration data matters - today and tomorrow!

    Configuration data is more important now than ever before, as we get releases into production faster and more frequently. We need new code, the right “settings” for the right environment and the right release which comes down to configuration data.

    You probably already use a distributed source code management (SCM) platform like git or bitbucket? You’ve invested in automated testing of your code? You’ve thought about automating the deployments from DEV to TEST to PRODUCTION?
    But how do you manage, test and validate all the configuration data and settings that go with it?

    Join us for this webinar where Benny Van de Sompele will talk about:

    - The current state of configuration data management and the challenges that come with it.
    - How you can introduce a non-intrusive automated process, which will allow your DevOps teams to release more often and faster, whilst at the same time reducing the risk of failure and service degradations.
    - Real use cases from legacy type environments from pure cloud native architectures and hybrid applications. With the increase of CI/CD automation in the market, comes the risk of rapidly breaking application environments.

    The more we automate the less there is “human validation”, but without rigorous testing and validation sooner or later failure will happen.

    The future is digital – everybody agrees, the cost of failure is now the difference between surviving and thriving.
  • Unsecured Networks and the Risks for Your Business
    Unsecured Networks and the Risks for Your Business
    Francis Bourke, Sales Engineer, Webroot Recorded: May 14 2019 14 mins
    More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. It’s also capable of blocking DDoS attacks, botnets, cache poisoning, and other threats.

    Additionally, DNS filtering allows admins to take back control of their network, secure all devices, prevent internet misuse, and improve productivity.

    In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection protect against attacks while benefitting your business.
  • The Myths and Future of Low-Code Development Platforms
    The Myths and Future of Low-Code Development Platforms
    John Rymer - VP Application Development & Delivery Professionals at Forrester & Ed Gross - SVP, Product Management at Kony Recorded: May 9 2019 69 mins
    Corporate development teams are adding low-code platforms to their arsenals to speed application development. Why? Speed of delivery is crucial to business success, particularly for digital transformation initiatives. Come to this webinar to learn the reality of the low-code trend. Our guest speaker, John Rymer, from Forrester will bust the most common myths associated with low-code development platforms and look ahead to the new uses and unfolding strategic value that low-code brings to enterprises.
  • Turning a Service Management Support Engineer Effortlessly into Learning Content
    Turning a Service Management Support Engineer Effortlessly into Learning Content
    Anna Marie Jupp Recorded: May 9 2019 50 mins
    There are many challenges facing those who work in the ITSM field. It seems the most significant challenge is the constant changes, whether they are within the tools and customers you are supporting, the on-and-off boarding of employees, or the changes in your ITSM solution from upgrades or total replacement. The Micro Focus Adoption Readiness Tool can help you guard against these changes affecting your business.

    • How to stop your knowledge leaving the building when the SME’s move on
    • How to put together a knowledge repository and maintain your content efficiently
    • How to create new content on the fly
    • How to make this knowledge available for everyone at the point of need
  • CISO Series Deconstructs the Verizon Data Breach Investigation Report (DBIR)
    CISO Series Deconstructs the Verizon Data Breach Investigation Report (DBIR)
    Moderator: David Spark (@dspark), Producer, CISO Series Recorded: May 8 2019 60 mins
    Moderator: David Spark (@dspark), Producer, CISO Series
    Mike Johnson, co-host, CISO/Security Vendor Relationship Podcast and former CISO, Lyft
    Allan Alford (@allanalfordintx), co-host, Defense in Depth, and CISO for Mitel
    Alex Pinto (@alexcpsec), head of Verizon Security Research

    It's launch day for the Verizon Data Breach Investigation Report (DBIR), and all the hosts for the CISO Series' podcasts have invited the head of Verizon Security Research to discuss latest findings of the report and what they mean for the cybersecurity industry.

    Hashtags for event: #CISOseries and #DBIR

    Please join as we want you to be part of the discussion
  • Airheads Tech Talks: Port and User-based Tunneling on Aruba Switches
    Airheads Tech Talks: Port and User-based Tunneling on Aruba Switches
    Chandrakanth, Aruba TAC Team May 28 2019 9:00 am UTC 90 mins
    Port and User-based Tunneling on Aruba Switches allows you to integrate wired and wireless users by applying the same level of traffic control possible on the Aruba Controller for wireless users to wired users as well.
    It helps in unifying the access control for both wired and wireless users. You can apply features like Deep packet Inspection, Application Filtering, Stateful Firewall to wired traffic also using tunnelled node configuration

    Join this webinar to learn about:
    · Introduction to Port and User-based Tunneling on Aruba Switches
    · User-based Tunneling on Aruba Switches and
    · Port- based Tunneling on Aruba Switches
    · Traffic handling by the Controller and Switch in different tunnelled node modes
  • The Rise of Targeted Cyberattacks against SMBs and MSPs
    The Rise of Targeted Cyberattacks against SMBs and MSPs
    Kelvin Murray, Sr. Threat Research Analyst, Webroot May 28 2019 10:00 am UTC 60 mins
    Cybercriminals have long targeted MSPs, but in 2019 this trend reached worrying proportions.

    Learn about the key targeted cyberattacks MSPs have been facing this year and how best to protect your business—and your clients—from the damage they can cause.
  • What's New with Service Virtualization 10.5?
    What's New with Service Virtualization 10.5?
    Koustubh Warty and Jeffrey Hughes May 28 2019 3:00 pm UTC 60 mins
    Service Virtualization is releasing version 10.5 with exciting new features including a huge focus on Developers - enabling the ease of use with Enhanced APIs, the New Eclipse Plugin, SVAsCode and the Jenkins Plugin. In addition, we have significantly enhanced our docker implementation to support Kubernetes, new database support for PostgreSQL and last but not the least customer driven reporting enhancements. These new features, along with others, will help your testing teams adopt and improve their Continuous Testing journey with the eventual goal of Digital Transformation. Join Jeff Hughes and Koustubh Warty for a complete discussion and demonstration of the latest features of SV 10.5.
  • Enabling Next Generation Patient Care with a Mobile First Network
    Enabling Next Generation Patient Care with a Mobile First Network
    Tim Vanevenhoven (Aruba), Jake Dorst (CIO, Tahoe Forest Health System) May 28 2019 5:00 pm UTC 60 mins
    Join us May 28th, 10am PDT to hear Tahoe Forest Health System CIO, Jake Dorst, share how they have worked with Aruba to strengthen their IT network infrastructure and save money with the goal of improving patient care. Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
  • Micro Focus ALM Octane: Quality at the speed of Agile
    Micro Focus ALM Octane: Quality at the speed of Agile
    Oren Ziv, ALM Octane Product Manager and Liran Levy, ALM Octane Product Manager, Micro Focus May 29 2019 3:00 pm UTC 60 mins
    In today’s world of software development and IT, there is a continuous race between agility and quality. In many cases when agility wins, the result is a faster delivery with lower quality.

    Micro Focus ALM Octane allows you to deliver high quality products in an agile world, whilst seamlessly integrating into your Agile and DevOps processes and tool-chain.

    Join this live demo to:
    • Learn what’s new with ALM Octane
    • Discover how to leverage existing assets when transforming to Agile
    • Get your questions answered by our product management team, during an interactive Q&A
  • Brazil's Fixed Broadband Services Market: Current Stage and Growth Opportunities
    Brazil's Fixed Broadband Services Market: Current Stage and Growth Opportunities
    Carina Goncalves, Senior Consultant, Digital Transformation, Frost & Sullivan May 29 2019 5:00 pm UTC 60 mins
    Unlike global participants, Brazilian broadband providers offer relatively lower speeds but at higher prices. This trend is now changing.

    Frost & Sullivan invites you to join Carina Goncalves, Senior Consultant, as she discusses the value of fiber for new video service options in the webinar, Brazil's Fixed Broadband Services Market: Current Stage and Growth Opportunities. It will be followed by an interactive, live question-and-answer session.

    Key Takeaways:
    • Learn how to protect core service revenues
    • Gain insight on what the future status of broadband service offerings will be
    • Identify new use cases with business innovation
    • Receive recommendations that will help service providers increase their competitive edge and customer retention rate
  • Aerospike Database Editions: Everything You Ever Wanted to Know
    Aerospike Database Editions: Everything You Ever Wanted to Know
    Ronen Botzer, Director of Product, Aerospike May 29 2019 5:00 pm UTC 60 mins
    Aerospike Community Edition is a powerful, freely available database, but did you ever wonder what else was available with Enterprise Edition? What are the scale limitations? What are the additional features?

    In this webinar:
    - Discover what you can do today with Community Edition.
    - Get feature walk-throughs specific to Enterprise Edition such as Cross-Datacenter Replication (XDR), Strong Consistency, Compression, Security, Advanced Monitoring - and more!
    - Learn about Aerospike Connect for Kafka and Connect for Spark.
    - Hear about the newly launched Aerospike Client Services and Training to get up and running faster
  • Web Apps vs Native Apps - Will Progressive Web Apps Dominate in 2019?
    Web Apps vs Native Apps - Will Progressive Web Apps Dominate in 2019?
    Michael Facemire, Alex Cobb, & Ed Gross May 30 2019 4:00 pm UTC 63 mins
    Don’t miss this webinar with guest speakers Michael Facemire, VP, and Principal Analyst from Forrester and Alex Cobb, CTO from Vestis, as they join the Kony team to discuss a hotly debated topic in the industry - Web Apps vs Native Apps.

    Up until recently, the pros and cons behind building native mobile apps versus mobile web apps were well understood. But the rapid evolution and adoption of Progressive Web Apps (PWAs) is leading many to believe the need for building native mobile apps is diminishing. The state of digital technology is at an inflection point, with wide implications for the future of your next app development project.

    Join us to learn:
    •Is the debate around mobile still mobile web app vs. native app, or are there new options that change this dynamic?
    •If you already have a native mobile app, should you get rid of it to build something new?
    •What is a Progressive Web App, what makes it different than existing web assets, and different than the apps we’ve currently built, and what tools do we need to build them?
    •Key considerations for selecting the right app development strategy based on specific needs
    •How do hybrid app technologies like Cordova / PhoneGap fit in the picture in the future?
  • Introducing npm Enterprise
    Introducing npm Enterprise
    Dave Bloom, Solutions Architect May 30 2019 5:00 pm UTC 30 mins
    npm Enterprise is the same codebase that powers the public registry. It works with the same standard npm client you already use, but provides the features needed by larger organizations who are now enthusiastically adopting Node.js. It's built by npm, Inc., the sponsor of the npm open source project and the host of the public npm registry.

    Join us to watch a demo on npm Enterprise and how we are helping Fortune 500 companies globally with:

    Easy internal sharing of private modules.
    Better control of development and deployment workflow.
    Stricter security around deploying open-source modules.
    Compliance with legal requirements to host code on-premises.
    Better code discovery and sharing within their organization.
  • Data Protector zum Wochenstart: Data Protector 2019.05 Neuerungen (DP 10.40)
    Data Protector zum Wochenstart: Data Protector 2019.05 Neuerungen (DP 10.40)
    Sprecher ist ein Technical Consultant mit Spezialisierung auf Data Protection Jun 3 2019 7:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.
  • Ask the IoT Security Expert: How to Protect your Business in the IoT
    Ask the IoT Security Expert: How to Protect your Business in the IoT
    Jason Soroko, Sectigo | Yotam Gutman, Cybersecurity Marketing Community Jun 4 2019 9:30 am UTC 30 mins
    Today's digitally connected businesses require multi-layer defence against rising and more sophisticated web-based threats across websites, devices, infrastructure, and cloud.

    Join this interactive 1-2-1 discussion where IoT security expert, Jason Soroko, will share how to deal with IoT security challenges.

    - How to determine if IoT connected devices in your operations infrastructure are secure
    - What is the difference between symmetric tokens, PKI based certificates and device identities?
    - What is the role of trust models to enable third-party device interoperability?
    - What are some methods to provision a device with a x509 certificate?
    - How to secure a digital identity for devices that do not have a hardware secure element such as a TPM?

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Livestream Video - Securing the IoT in the Age of Threats
    Livestream Video - Securing the IoT in the Age of Threats
    Wallace Sann, Forescout | Nigel Stanley, TÜV Rheinland Group | Jonathan Zulberg, LogRhythm | Jason Soroko, Sectigo Jun 4 2019 1:00 pm UTC 45 mins
    The ever-growing Internet of Things continues to pose security and privacy threats. How are businesses managing the risks associated with IoT devices on their networks? What are the best strategies for achieving basic security and cyber hygiene?

    Join this interactive panel with IoT and security experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Panellists
    Jason Soroko, CTO of IoT, Sectigo
    Jonathan Zulberg - Director of Sales Engineering - EMEA, LogRhythm
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies
    Nigel Stanley, CTO - Global OT & Industrial Cyber Security CoE, TÜV Rheinland Group

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • IT Industry Outlook 2019
    IT Industry Outlook 2019
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen Jun 4 2019 2:00 pm UTC 60 mins
    CompTIA explores the forces shaping the IT industry, its workforce, and its business models in 2019. Some of the trends we’re monitoring and will discuss include:

    • How the cloud, edge computing, and 5G form modern economic infrastructure
    • How IoT and AI are opening new doors for ambient computing
    • How distributed technology models challenge existing structures
    • How the business of emerging technology prompts sales channels’ reinvention
    • How partnerships are bridging gaps in the new tech ecosystem
    • How persistent tech personnel shortages are fueling new, creative staffing solutions
    • How global tech hubs shine the spotlight on the ingredients for innovation
  • Ask the Cloud Security Expert: How to Protect your Critical Data in the Cloud
    Ask the Cloud Security Expert: How to Protect your Critical Data in the Cloud
    Dave Barnett, Forcepoint EMEA | Alex Hilton, Cloud Industry Forum Jun 4 2019 3:30 pm UTC 30 mins
    Effectively protecting critical data in the cloud is a key challenge for today's data-driven businesses.

    Join this interactive 1-2-1 discussion where Cloud Access Security Broker (CASB), Dave Barnett will share insights on;

    - Why and how today organisations are protecting data in the cloud.
    - What are the main risks inherent in the adoption of cloud services?
    - Where the key challenges are in protecting data in the Cloud?
    - What to look for when selecting cloud security for your organisation

    Moderated by Alex Hilton, Chief Executive, Cloud Industry Forum
  • 9 Steps to Building a Smarter Network
    9 Steps to Building a Smarter Network
    Cherie Martin, Network Solutions Manager - Aruba Jun 4 2019 5:00 pm UTC 52 mins
    Did you know that over 50% of issues with network experience can be attributed to lack of pre-installation planning? There is a lot to consider, but the effort you put in up front saves time, money, and frustration over the life of your network. Join us as Cherie Martin, Network Solutions Manager, reviews the 9 critical steps you should take to ensure your network is smart and reliable.

    Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
  • Livestream Video - CISO Challenges and How to Solve Them
    Livestream Video - CISO Challenges and How to Solve Them
    Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, Proofpoint Jun 5 2019 10:30 am UTC 45 mins
    Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    David Boda, CISO, Camelot Group
    Darren Thomson, CTO - EMEA, Symantec
    George Patsis, CEO, Obrela Security Industries
    Martin Mackay, Senior Vice President - EMEA, Proofpoint

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • The 5 Virtues of Continuous Testing
    The 5 Virtues of Continuous Testing
    Stephen Feloney, VP Product Management Continuous Testing @ Broadcom Jun 6 2019 5:00 pm UTC 60 mins
    Keeping pace with Agile development in the Internet of Things is no small task. Software development is expected to improve quickly, iteratively and continuously. These are significant challenges for both the Testing Center of Excellence and distributed Agile development teams across the business.

    Join Stephen Feloney (VP of Product Management | Continuous Testing), as he shares his thoughts on the 7 Sins of Application Quality, and talks about the 5 Virtues of Continuous Testing, including best practices that pragmatically addresses these pitfalls.


    We'll cover:

    · How to achieve cost optimization from streamlining Agile releases for efficiencies

    · Maintaining quality user experiences when transforming to an application economy

    · Ways to enable rapid time to market by increasing agility of the Testing Center of Excellence


    Note: Presentation is followed by a Q&A session
  • Does Your Network Have the Right Tools for the Job?
    Does Your Network Have the Right Tools for the Job?
    Cherie Martin (Aruba), Brandon Butler (IDC) Jun 6 2019 5:00 pm UTC 42 mins
    With the increasing demands on IT due to the explosion in connected devices, your time and money are more valuable than ever.

    Join us March 28th as Aruba welcomes our featured speaker, Brandon Butler of IDC, to discuss how you can simplify day-to-day network administration tasks and increase visibility and control to save you time and get the most out of your network.

    View the webinar and find out how to:
    • Choose the right-sized network for your needs
    • Define key features for a successful network
    • Optimize performance

    Attend and you could qualify to receive a free Aruba Instant access point and a 90-day trial of Aruba Central, our cloud managed networking solution.
  • Edge Computing: Optimize With Advanced Local Storage, Sync, and Query
    Edge Computing: Optimize With Advanced Local Storage, Sync, and Query
    Priya Rajagopal | Principal Product Manager, Mobile | Couchbase Jun 6 2019 6:00 pm UTC 60 mins
    Edge computing is a new paradigm in computing where data is collected and processed closer to its source instead of communicating everything back to the cloud. The edge computing model facilitates faster response times, reduces network bandwidth usage, and enables applications to function in disconnected environments.

    In this webinar we’ll discuss the functional and operational requirements of edge computing from a data storage perspective. Then we’ll walk you through Couchbase Mobile’s:

    -Local storage capabilities and API
    -Advanced delta sync capabilities and peer-to-peer sync
    -Predictive Query API for smarter applications at the edge
    -End-to-end security from cloud to edge

    You’ll learn why our architecture is ideally suited for edge applications. And our customer BD will share how they’re using Couchbase to power a mobile app that logs real-time patient data and provides customized feedback.
  • 2019 CISSP 认证宣讲会
    2019 CISSP 认证宣讲会
    袁晓峰, CISSP, (ISC)²授权讲师; 方乐, CISSP, 谷安天下资深专家 Jun 11 2019 7:00 am UTC 90 mins
    追求卓越,持续发展,是每个有志之士不懈的坚持。进入2019,行业对网络安全技能和人才的重视和需求愈加凸显。抓住机遇,自我升值,让网络安全“金牌认证”为您和您的职业发展加速!

    CISSP认证是信息安全专业人士证明网络安全策略、认知和实践经验的理想之选。它表明您拥有设计、开发和管理一个组织整体安全态势的高级知识和技能。

    通过这次会议,您将了解到:
    • 行业对网络安全专业人才的需求CISSP认证的,考试,知识域,以及持证者的职业优势;
    • CISSP认证的全面介绍,包括工作经验要求、考试介绍、持证者福利、知识域、培训等各个方面;
    • 资深专家对CISSP知识域的讲解及分析;
    • CISSP培训的详细介绍;
    • 与CISSP认证相关的问题答疑

    参会人员还将有机会获得独家福利!
  • Webisode 1: 2019 Cyber Threat Landscape
    Webisode 1: 2019 Cyber Threat Landscape
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint Jun 12 2019 5:00 pm UTC 51 mins
    This year, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

    Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join us as we discuss:

    - Predictions for the 2019 threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Windows 10 & Office 365 Migration and Optimization Strategies
    Windows 10 & Office 365 Migration and Optimization Strategies
    Matt Crawford, Citrix Dir. Solutions Marketing and Matt Brooks, Citrix Sr. Technical Product Marketing Mgr. Jun 12 2019 6:00 pm UTC 51 mins
    Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.

    With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.

    For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:

    •Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
    •Windows 10 application incompatibilities
    •Mobile security risks with running Exchange on-prem
    •Network latency from running O365 in the cloud
    •Managing multiple file hosting services including OneDrive
  • Low-Code, AI & NLP Powered Digital Transformation
    Low-Code, AI & NLP Powered Digital Transformation
    Bill Bodin, Kony CTO and Carlos Carvajal, Kony CMO Jun 13 2019 4:00 pm UTC 75 mins
    This webinar focuses on the integration of high value technologies in digital transformations. These technologies reduce usability friction while leveraging and maximizing modern device capabilities. You’ll see production grade uses of AI, AR and NLP, and get a first-hand view of AI’s impact and value in the low-code development process.
  • Cloud Security Best Practices for Defending Against Targeted Attacks
    Cloud Security Best Practices for Defending Against Targeted Attacks
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Jun 18 2019 3:00 pm UTC 60 mins
    Recent years has seen a move towards more targeted attacks, especially in the realm of ransomware. Attackers are no longer trying to infect the globe, choosing instead to carefully select targets to increase their chances of success and maximise payouts.

    SMBs find themselves in the crosshairs of these attacks. Their defense and contingency plans often leave them vulnerable to ransomware, information theft, and other attacks.

    Is your organisation a soft target? Automated processes can often determine this in a matter of minutes, and cybercriminals are aware.

    Learn how to lift your organisation from easy target to robustly defended with learnings from this webinar.
  • Stop Losing Customers: Listen to Them with Speech Analytics
    Stop Losing Customers: Listen to Them with Speech Analytics
    Opus Research and Age of Learning Jun 18 2019 5:00 pm UTC 45 mins
    Customers are the lifeblood of your company--but customer retention can be a challenge. In today’s highly competitive marketplace, how do you foster the type of customer experience that deepens relationships? Speech analytics are a powerful tool to give you insights from every customer interaction to accelerate business responsiveness. You can identify techniques your best agents use to foster loyalty and share them across the organization—allowing you to move at the speed of customer expectations.