Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • The World Quality Report 2018-19: Focus on the Financial Services Sector
    The World Quality Report 2018-19: Focus on the Financial Services Sector
    Jonathon Wright, Vivit Advocacy Board Director and Malcolm Isaacs, Solutions Marketing, Micro Focus Recorded: Jan 16 2019 60 mins
    The 2018-19 edition of the World Quality Report (WQR) discusses the trends shaping QA and testing today, and offers recommendations for addressing tomorrow’s challenges. In this webinar, we’ll present an overview of the WQR’s key findings, with a deep dive into the analysis of the responses from the Financial Services sector, which is going through a radical change in its approach to application development and quality.

    Attend this webinar to learn:
    • How end-user satisfaction is top priority for QA and testing
    • Why an increase in digitalization is driving disruption in the Financial Services sector’s approach to application development and delivery
    • How the emergence of new technologies in Financial Services such as blockchain, Internet of Things and Artificial Intelligence are reshaping how QA and testing is done
    • Trends over the next two to three years that will combine automation, AI, and analytics to become a key differentiator for Financial Services organizations
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Doug Landoll, CEO, Lantego Recorded: Jan 16 2019 35 mins
    Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.

    In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:

    - How to define cybersecurity success
    - Common approaches that fall short
    - Risk-based cybersecurity strategy planning

    Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Jan 16 2019 82 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Top 5 Ways Your Network Can Give Your Business a Competitive Edge
    Top 5 Ways Your Network Can Give Your Business a Competitive Edge
    Guido Kragten, Sales Enablement Cloud Platforms, EMEA Recorded: Jan 16 2019 52 mins
    Seventy percent of today's Midsize businesses are investing in technology to customize the user experience, improve customer satisfaction, build loyalty, and gain a competitive advantage. But the ability to deliver amazing user experiences is dependent on high-performance, reliable connectivity. It requires a business-class network.

    Join us on 16th January, as we showcase the Top 5 business-class features your network must have for you to automate and optimize the delivery of network services to drive your business success.

    A high-level discussion will be followed by a demo of Aruba Central, network management in the Cloud.
  • Webroot 2019 Threat predictions
    Webroot 2019 Threat predictions
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Jan 15 2019 46 mins
    The Threat landscape has seen a rise of Cryptojacking, evolution of scams and malware such as Emotet and other cybersecurity issues such as Trickbot and Ransomware that have affected businesses in 2018.

    Join this 30-minute webinar where our Threat Expert will walk you through Webroot's Threat predictions for 2019, so MSPs and SMBs can stay ahead of attacks and keep your clients and businesses safe.

    Some of the topics that will be covered:
    - AI Disruption
    - US adoption of similar GDPR legislation
    - Cryptojacking will keep rising while ransomware will decline


    Register today!
  • 802.11ax or 802.11ac: Which is Right for Your Business?
    802.11ax or 802.11ac: Which is Right for Your Business?
    Cherie Martin, Sr. Solutions Marketing Manager - Aruba Recorded: Jan 10 2019 48 mins
    The industry is buzzing about the 802.11ax Wi-Fi standard that will greatly increase wireless speed and optimize client battery life. Are you ready to take your network to the next level? Join us as Aruba’s Cherie Martin, Sr. Solutions Marketing Manager, shares the top three things you need to consider in deciding which technology to choose to give your business, employees, and guests, simple, business-class networking without sacrifice
  • Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Chris Marsh of 451 Research & Matt Crawford of Citrix Recorded: Jan 10 2019 55 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • Customer Briefing: Aerospike 4.5 for Intel Optane DC Persistent Memory
    Customer Briefing: Aerospike 4.5 for Intel Optane DC Persistent Memory
    Brian Bulkowski, CTO & Co-founder, Aerospike and Alper Ilkbahar, Vice President & General Manager Memory and Storage, Intel Recorded: Jan 9 2019 59 mins
    Intel’s Optane DC persistent memory with 3D Xpoint technology will fundamentally change the database market. Machine Learning-based applications such as fraud prevention, digital payments, real-time bidding and recommendation engines ingest hundreds of terabytes or more of data continuously.

    Effectively storing and accessing this data to allow the applications to make the right decisions in real-time is critical. Intel Optane DC persistent memory is a ground breaking innovation that will enable databases to scale and meet the demands of modern machine learning based applications.

    Intel and Aerospike have been working for years to test and tune how Optane DC persistent memory works for production level environments.

    Aerospike Enterprise Edition 4.5 is the first commercially available open database that takes full advantage of Intel Optane DC persistent memory (PM) technology. The combination of Aerospike 4.5 and Optane DC promise to deliver massive scale improvements – orders of magnitude - at low cost, with unsurpassed persistence and reliability.

    Join this Special Customer Briefing featuring Brian Bulkowski, CTO & Co-founder of Aerospike, along with Alper Ilkbahar, Vice President & General Manager Memory and Storage Solutions Group of Intel. Each will share perspective on the significance of these advancements.

    You’ll hear details on Intel Optane DC Persistent Memory directly from one of Intel’s most influential executives and Brian’s expectations for what 4.5 will mean for Aerospike customers.
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Recorded: Dec 20 2018 53 mins
    Windows 10 and the proliferation of BYOD introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • ABCs of AI
    ABCs of AI
    Sudheer Matta, VP of Product, Mist Recorded: Dec 19 2018 56 mins
    There's a lot of buzz around Artificial Intelligence and how it can help IT operations. There's also a lot of confusion.

    Watch this on-demand AI:rchitect series webinar where we'll cut through the AI noise. In this interactive session, we'll cover:

    - The need for AI-driven IT
    - The difference between AI, machine learning, deep learning, data science, and other common techniques
    - Ways to implement data science in your Wi-Fi network
    - How to prepare yourself (and your IT team) for the transition to AI-driven IT
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Bryan Sartin, Chris Novak, Bruce Benedict, Jimmy Nilsson, Rodolphe Simonetti, Dave Kennedy, John Grim, Farzad Seihoun Recorded: Dec 19 2018 85 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:

    Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • 5 Steps to Get Ready for 802.11ax
    5 Steps to Get Ready for 802.11ax
    Newsha Sharifzadeh - Aruba Networks Recorded: Dec 18 2018 59 mins
    Wi-Fi is becoming the connectivity method of choice, even for mission critical applications, such as voice, collaboration and patient monitoring devices. With an increasing number of diverse applications, along with mobile and IoT devices reliant on wireless access, networks must deliver high performance, reliability and security. The sixth-generation wireless standard, 802.11ax (Wi-Fi 6), promises to address issues related to the growing density and diversity of devices by increasing network capacity and improving user experiences.

    Join us to learn about 802.11ax advantages and the 5 things to consider before making your next Wi-Fi purchase:

    - How does 802.11ax differ from 802.11ac?
    - What use cases and applications is 802.11ax optimal for?
    - When will I start seeing advantages with 802.11ax?
    - Do I need to replace access switches to support 802.11ax APs?
    - If considering 802.11ax, do I need to replace all of my existing Wi-Fi infrastructure?
  • Happy Holidays from DataMotion
    Happy Holidays from DataMotion
    The DataMotion team Recorded: Dec 17 2018 1 min
    Greetings from DataMotion for a happy holiday!
  • Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Uli Wallscheid, DP Solutions Product Manager, Micro Focus Recorded: Dec 17 2018 81 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor.

    Im Webinar am 17. Dezember dreht sich alles um das Thema Data Protector 10.20: Das interne Reporting wurde in Data Protector 10.20 weiter ausgebaut. Desweiteren erhalten Sie einen Einblick in alle neuen Features der Version 10.20 von Data Protector.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
  • How Process Owners Can Build Their Own ‘Apps’ in 15 Minutes Using SMAX Studio
    How Process Owners Can Build Their Own ‘Apps’ in 15 Minutes Using SMAX Studio
    Neville Ward, Senior Solutions Architect & Noel Hopkinson, Senior Solutions Architect Recorded: Dec 14 2018 28 mins
    Codeless configuration is commonly accepted as the only way to ensure that process modifications can be seamlessly incorporated into software upgrades without requiring teams of programmers to make the changes.

    Join this webinar to discover how Micro Focus Service Management Automation X (SMAX) Studio takes codeless configuration to the next level by enabling new process-based applications to be created in minutes. Designed for IT and line of business personnel, SMAX offers fast and risk-free configuration and extension of service management applications.

    With SMAX, Enterprise Service Management is delivered out of the box and is based on content such as HR workflow management, ideation and proposal management, and portfolio optimization—all of which can be easily extended or complemented with brand new content using SMAX Studio.

    In this webinar, you’ll learn:

    How SMAX Studio offers faster Time to Value and Lower TCO
    How our modern user interface enables the instant creation of new applications
    How the required data model, business rules, forms, notifications, reports, and user-defined actions can be created without coding
  • How to Choose Your Big Data Analytics Solution
    How to Choose Your Big Data Analytics Solution
    Dominic Colson, ITOM Solutions Architect Recorded: Dec 14 2018 21 mins
    In the past, IT operations teams tended to focus on using either big data analytics or machine learning to grow business intelligence. But the big data landscape has evolved, and emerging platforms now combine both types of solutions. The question is, how do you choose the one that’s right for you?

    This 35-minute webinar tells you how. You’ll learn:

    What big data is and where it fits in your IT operation.
    How to ensure comprehensive insight into past, present, and future states of IT systems. (Hint: Employ AIOps platforms that can ingest and access log data, text data, wire data, metrics, and API data.)
    How multivendor solutions can be deployed and supported across both new and existing applications.
    How the Micro Focus solution works (you’ll see a demo) and why it’s worth your consideration.
  • Comparing CASB Solutions from Microsoft and Forcepoint
    Comparing CASB Solutions from Microsoft and Forcepoint
    Mike Osterman, CEO, Osterman Research Recorded: Dec 13 2018 46 mins
    CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.

    In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:

    - Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
    - Provide a detailed analysis of how both products compare over 13 key feature areas
    - Consider coverage of third-party apps beyond Office 365

    Attend this session to explore the best route to full Office 365 security.
  • The State of the CASB Market
    The State of the CASB Market
    Mike Osterman, CEO, Osterman Research Recorded: Dec 13 2018 38 mins
    CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.

    In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:

    -Key cloud adoption concerns
    -Most valued CASB features
    -Levels of confidence in controlling data and maintaining compliance

    Attend this session to learn more about the need for and use of CASBs in today’s organizations.
  • 9 Steps to Building a Smarter Network
    9 Steps to Building a Smarter Network
    Cherie Martin, Network Solutions Manager - Aruba Recorded: Dec 13 2018 53 mins
    Did you know that over 50% of issues with network experience can be attributed to lack of pre-installation planning? There is a lot to consider, but the effort you put in up front saves time, money, and frustration over the life of your network. Join us as Cherie Martin, Network Solutions Manager, reviews the 9 critical steps you should take to ensure your network is smart and reliable.

    Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis?
    Mark Elwood, Marketing Director, TeleWare Recorded: Dec 13 2018 50 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • Agile Portfolio Management: Three best practices
    Agile Portfolio Management: Three best practices
    Alan Wendt, Micro Focus Recorded: Dec 12 2018 59 mins
    DevOps and Enterprise Agile frameworks are key enablers of Digital Transformations at the operating level of organizations, but to achieve true agility across the enterprise, these principles must become the norm in all business areas. Some of the most critical connection functions in the organization are Portfolio Management, Program Management, and Project Delivery. This presentation will offer three best practices for Agile Project and Portfolio management to help your organization succeed in this transformational era.

    Join us to hear more about:
    • How lean thinking helps to meet changing business demands and speed up the decision-making
    • The limitations of annual-only portfolio planning cycles
    • The incredible power of aligning the work to the organization’s intended outcomes
  • Bridging the online and offline marketing gap
    Bridging the online and offline marketing gap
    Mark Coffey, SVP of Strategic Partnerships, GasBuddy Recorded: Dec 12 2018 57 mins
    While companies have been ditching traditional marketing methods in their race to capture the online-savvy millennials, no one is on their phone 24/7, and delivering brand messages out in the world is still vital to capturing mindshare.

    Those first-gen marketing methods, including outdoor, tv, direct mail, and more, are still valuable and essential to building a stronger bottom line, especially when integrated as a vital part of an overarching marketing campaign, firing on all cylinders. That’s easier than ever, because traditional doesn’t mean old-school and analog anymore, and innovations in marketing technology don’t only apply to your online channels. You can apply your martech capabilities not just for tracking, measurement, and attribution, but to keep tabs on omnichannel competitor strategies, design the most effective campaign copy in every arena, create the most impactful rollouts between all your channels and more.

    To find out how to integrate offline marketing channels with your online efforts, how marketing technology can bring those traditional methods into the twenty-first century, and more, don’t miss this VB Live event!

    Registration is free.

    Attend this webinar and learn:
    * How to use martech to digitize offline channels
    * How to integrate traditional marketing efforts into their newer tech-driven marketing stack
    * The importance of combining online and offline marketing
    * How to track offline conversions

    Speakers:
    * Evan Jones, CMO, Fender
    * Mark Coffey, SVP of Strategic Partnerships, GasBuddy
    * Myllisa Patterson, Senior Director, Event Cloud Marketing, Cvent
    * Shannon Ryan, Head of Marketing, CI&T
    * Dilan Yuksel, VentureBeat

    Sponsored by Cvent
  • DigiCert Monthly Threat Briefing - December - 2018 in review, 2019 ahead
    DigiCert Monthly Threat Briefing - December - 2018 in review, 2019 ahead
    Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Recorded: Dec 12 2018 43 mins
    Let's wrap up 2018 with a recap of last year's major events, and a forecast on what's coming next year.
  • 10 Things to Consider When Implementing a Secure Message Center
    10 Things to Consider When Implementing a Secure Message Center
    Ally Cancino, DataMotion Recorded: Dec 12 2018 6 mins
    Are you considering implementing a secure message center in your business client portal? If you're in the insurance, healthcare, or financial services industry, this is definitely a good choice. In this video/slideshow learn about how secure message centers improve your customer service, increase customer satisfaction, make it easier for your employees to track and maintain message strings, and of course-- stay compliant! If you'd like more detailed information on implementing a secure message center, check out our whitepaper at: http://info.datamotion.com/implementing-secure-message-center-white-paper-1-0
  • The Digital Workplace Requires AI-Driven IT
    The Digital Workplace Requires AI-Driven IT
    Jeff Aaron, VP of Marketing, Mist Systems; Kevin Fenn, Global Head of Networks, ThoughtWorks Recorded: Dec 6 2018 57 mins
    Join this webinar where Kevin Fenn, Global Head of Networks at ThoughtWorks, and Jeff Aaron, Vice President of Marketing at Mist, will discuss the emerging role of Artificial Intelligence (AI) in IT and how you can benefit from this trend. AI is critical to the emerging digital workplace, reshaping the way IT organizations deploy and manage infrastructure and how users consume those services.

    The IT department at ThoughtWorks is on the leading edge of the “AI for IT” movement, bringing unprecedented automation and insight into daily operations with a state of the art AI-driven Wireless LAN from Mist. Their new digital workplace, which enables new initiatives such as open seating and video collaboration, is boosting employee efficiency and experience.

    We will explore:

    · AI technology and the impact it has on wireless networking

    · Best practices for deploying an AI-driven WLAN

    · How to support wireless video conferencing, open seating, and other strategic initiatives

    · Quantifying the benefits of a new AI-driven network infrastructure
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure
    Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Jan 17 2019 11:00 am UTC 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • How AI-Based, Zero-Effort Authentication is Changing the Customer Experience
    How AI-Based, Zero-Effort Authentication is Changing the Customer Experience
    Ravin Sanjith, Intelligent Authentication, Opus Research; Alexey Khitrov, IDRnD Jan 17 2019 6:00 pm UTC 45 mins
    With access to mountains of data — scoured, analyzed, and made actionable thanks to Artificial Intelligence, machine learning, and neural networking — enterprise organizations are staking their claim on seamless, context-aware customer interactions as a business differentiator. Altogether these technologies help deliver on the promise of secure, personalized digital self-service and can have a demonstrable impact on an enterprise’s bottom line.

    Indeed “zero-effort authentication” enables intelligent automation, reduced customer effort (no more PINs and passwords), reduced call handling time, and improved confidence in security. Enterprises are building zero-effort authentication strategies for maximum return on investment and increased customer loyalty.

    In an upcoming webinar, Ravin Sanjith (Intelligent Authentication, Opus Research) and Alexey Khritov (CEO, IDRnD) will discuss how voice biometrics, combined with AI techniques, sensors and increased processing power, can provide a virtuous cycle for greater convenience and less effort to validate a consumer’s identity in mobile apps, on messaging platforms, and beyond.
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Jan 22 2019 11:00 am UTC 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • Architecting Your Mobile Storage Solution With a NoSQL Data Platform
    Architecting Your Mobile Storage Solution With a NoSQL Data Platform
    Priya Rajagopal, Principal Product Manager, Mobile, Couchbase Jan 23 2019 7:00 pm UTC 60 mins
    Architecting a mobile storage solution may feel like a daunting task, but it doesn’t have to be. In this webinar, we’ll guide you through the toughest challenges and demonstrate how NoSQL can deliver a seamless mobile experience anywhere by extending your data center to the edge.

    We’ll walk you through:

    -Critical requirements of an offline or offline-first storage solution
    -Why NoSQL is uniquely suited for data storage on the edge
    -Key architectural elements of the Couchbase Mobile NoSQL data platform

    You’ll see how Couchbase Mobile makes it easy to ensure your local data is always available. We’ll show you how to achieve auto sync from edge to cloud and direct peer-to-peer sync for exceptional online and offline experiences. And you’ll learn how Couchbase provides enterprise-grade security with end-to-end and over-the-wire encryption.
  • Mobile App Security Predictions 2019
    Mobile App Security Predictions 2019
    Brian Reed, CMO, NowSecure // Alan Snyder, CEO, NowSecure // David Weinstein, CTO, NowSecure Jan 23 2019 7:00 pm UTC 60 mins
    2019 is already shaping up to be a standout year for mobile appsec and secure DevOps. If we can say anything with certainty, it’s that cybersecurity is unpredictable and the wave of DevSecOps is unstoppable. But we foresee intensifying concerns about digital privacy amidst high-profile breaches.

    Attend this webinar to hear our predictions about what’s in store for our customers and the community in the year ahead. Our veteran industry leaders will prognosticate about developments in these areas:
    + Mobile ecosystem: OSes, devices, apps and app stores
    + Evolving mobile security threats
    + The rise of DevSecOps and the automation of everything
    + The disruptive economics of automating manual pen testing
    and more.
  • Four steps to enabling real-time insight in a data-driven world
    Four steps to enabling real-time insight in a data-driven world
    Sachin Smotra | Director of Product Management at Couchbase & Matt Aslett | 451 Research Vice President Jan 24 2019 10:00 am UTC 60 mins
    Today’s businesses must operate in the moment in order to maintain a competitive advantage. To do this, they need rapid time to insight, but how ready are businesses to deliver on the promise of real-time operational analytics?

    -Provisioning data in legacy data architectures can take weeks, or even months.
    -The skills required to modernize don’t exist within a traditional IT department.
    -Building business cases for modernization can be challenging without a fast and direct return on investment.
    -A lack of operational dashboarding limits insight due to the complexity of custom reporting.

    To combat these hurdles, you are invited to hear from two experts in the field of operational analytics. Referencing firsthand research and reports, Matt Aslett from 451 Research will discuss the current trends in operational analytics and how they relate to the emergence of hybrid operational and analytic processing (HOAP) databases.

    Matt will also present the four steps organizations must take in order to prepare for real-time insight, and take a peek into the future of what this means for the companies that will succeed, and for those that won’t. Sachin Smotra, Director of Product Management at Couchbase, will then explain how operational analytics can be achieved without the heavy lifting of data lakes, data warehouses, and complex ETL processes.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Jan 24 2019 11:00 am UTC 38 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Build for the future with voice search
    Build for the future with voice search
    Dustin Coates, Voice Search go-to-market lead at Algolia Jan 24 2019 5:00 pm UTC 30 mins
    Speaking commands into actions isn’t a futuristic fantasy anymore - it’s the present. Voice as a user interface has arrived and it can elevate the search and discovery experience.

    Join Dustin Coates, Voice Search Go-to-Market Lead, to learn how voice search and its capacity to transform everyday, conversational speech into functional, relevant responses can redefine the way you interact with the world.

    In this session we will cover:

    Why your business should implement voice search
    - Where voice search is useful
    - What good voice search UX looks like
    - How relevancy differs between voice search and typed search
  • Airheads Tech Talks: Advanced Clustering in AOS 8.x
    Airheads Tech Talks: Advanced Clustering in AOS 8.x
    Arun S, Aruba TAC Team Jan 29 2019 10:00 am UTC 60 mins
    Clustering is a new feature introduced in AOS 8.0 that enables seamless roaming of clients between APs, hitless client failover and load balancing of users across Mobility Controllers in the cluster. This solution provides the configuration required to create a cluster of Mobility Controllers that are managed by the same Mobility Master.

    Join this webinar to learn about:

    · Cluster load balancing (AP and client)
    · AP termination in cluster
    · AP move
    · Authorization
    · Cluster troubleshooting
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Jan 30 2019 11:00 am UTC 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Visibility and Governance into the Release process
    Visibility and Governance into the Release process
    Erika Leifker, Micro Focus Jan 30 2019 4:00 pm UTC 60 mins
    Release Management, much like Waterfall Development, is no longer drawn out over months or sometimes years. With the advent of Agile, the goal is to release more often and as a result, be more efficient. How do we achieve these expectations when we must adhere to regulations, policies, security requirements and complex technology? DevOps is commonly the answer, but what does that mean?

    This session will provide an overview of some of the DevOps best practices that customers are implementing to ensure their frequent release cycles are shorter and more successful.

    Attend this webinar and you will:
    • Understand how to define and coordinate Release Management activities with other DevOps activities, such as Continuous Integration/Delivery/Testing
    • Learn best practices for release process governance
    • Discover how to gain visibility into your release process
  • Using Risk Analysis to Enhance Compliance
    Using Risk Analysis to Enhance Compliance
    Andras Cser, Vice President and Principal Analyst, Forrester Jan 30 2019 4:00 pm UTC 20 mins
    For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.

    In this session, Forrester Vice President and Principal Analyst Andras Cser will share how to prioritize security and compliance efforts. Specific topics include:

    - How your auditors are behaving
    - Why risk-based prioritization is the only way to find threats
    - The importance of context
    - Forrester’s recommendations and best practices

    Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
  • Your App Security Stack: How to Defend Against the Evolving Threat
    Your App Security Stack: How to Defend Against the Evolving Threat
    Ken Jochims, Arxan Director of Product Marketing | Amy DeMartine, Forrester Principal Analyst Feb 5 2019 6:00 pm UTC 60 mins
    Web and mobile applications have become the primary customer touchpoint for financial services, payments, hospitality, travel and scores of other businesses. With the increased dependence on applications comes greater opportunity for attacks to expose customer data, sensitive IP, or a roadmap into an organization’s back-end infrastructure.

    In 2018 high-profile attacks hit major hotel chains, international airlines and banks, leaving companies in a tailspin to repair customer trust and brand damage. The top two attack methods for such breaches? Software vulnerabilities and web app attacks.

    Join Arxan Director of Product Marketing Ken Jochims and special guest Forrester Principal Analyst Amy DeMartine to learn how the threat landscape may evolve in 2019, and what you can do to strengthen your app security posture. We’ll cover:

    -What makes applications inherently insecure
    -The anatomy of an application attack (web and mobile)
    -How to build your security stack to defend against app level threats
  • Is Your Wi-Fi Network Putting Your Business At Risk?
    Is Your Wi-Fi Network Putting Your Business At Risk?
    Richard Leadbetter, Security Technical Specialist, EMEA Feb 6 2019 10:30 am UTC 60 mins
    86% of midsize companies agree that digital technologies are disrupting their industry. Your network has never been more critical. It is the on-ramp to your cloud applications. It is the way your mobile users connect, work and collaborate. And it is what enables amazing, memorable customer experiences.

    Choosing the right network solution has never been more important.

    Join us on 6th February to learn about the latest trends and the Top 5 things your business network can't live without.
  • Outsmarting Contact Centre Fraudsters with Supercharged Voice Biometrics
    Outsmarting Contact Centre Fraudsters with Supercharged Voice Biometrics
    Ravin Sanjith and Dan Miller, Opus Research; Amiram Pinto, Senior Product Manager, RTA, NICE Feb 7 2019 6:00 pm UTC 45 mins
    By incorporating the latest advances in machine learning techniques combined with voice biometrics used for caller authentication, contact centers now have the ability to expose previously unsuspected fraudulent intent. In the ongoing response to sophisticated fraud attacks, the creation of high-quality fraudster watchlists from historical recordings not only provides a highly effective defence, but also an improved ability to prosecute fraudsters. Removing these ‘bad actors’ from the picture is a revolution in the fight against fraud.
  • How to Get the Most of Your (ISC)² Membership - Local Benefits and Global Reach
    How to Get the Most of Your (ISC)² Membership - Local Benefits and Global Reach
    Tony Vizza, CISSP , Director of Cyber Security Advocacy, APAC and Hazel Hung, Customer Services Manager, APAC Feb 12 2019 6:00 am UTC 60 mins
    As an (ISC)² Member, you now have access to a wide range of global resources, educational tools, peer networking opportunities, as well as exclusive discounts to industry events. There is so much more to discover to what your (ISC)² membership brings!

    In this webinar, you will learn about:
    - The latest news and developments across APAC and (ISC)² from around the world.
    - Exciting and upcoming CPE opportunities to help you stay sharp
    - Member benefits and perks including fantastic discounts on a range day to day items
    - New, upcoming and FREE professionally developed education courses just for members.
    - An update on (ISC)² certifications to help you take your career to the next level.
    - Networking opportunity with like-minded professionals locally and globally via ((ISC)² chapters
    - An opportunity to ask questions in our Q&A session

    Join us on Feb 12, 2019 (Tue) at 14:00 (GMT +8) to get the most of your (ISC)² membership globally and locally.
  • Autonomous Threat Hunting
    Autonomous Threat Hunting
    Alexandre Pinto, Product Manager and Distringuished Engineer Security Services Global Products and Solutions Feb 12 2019 4:00 pm UTC 60 mins
    Attendees will learn how Verizon's Autonomous Threat Hunting...

    •Improves automation and efficiency on monitoring and incident response processes by mimicking and applying security analyst experience and intuition at unprecedented scale.


    •Automatically builds context and relationship between indicators of compromise (IOCs), their inferred Tactics, Techniques and Procedures (TTPs), and log or event data generated by their organization.


    •Transforms hundreds of millions of raw data events into tens of high confidence alerts, so analysts can focus on investigating qualified leads.
  • The ROI for VR/AR in the Enterprise
    The ROI for VR/AR in the Enterprise
    Intel, Atheer, Accenture, Nielsen Feb 14 2019 5:00 pm UTC 75 mins
    The VR/AR Association Enterprise industry committee will present the latest case studies, best practices, and ROI
  • (ISC)² Info Session: SSCP -The Premier Security Administrator Certification
    (ISC)² Info Session: SSCP -The Premier Security Administrator Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Feb 19 2019 6:00 am UTC 60 mins
    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue SSCP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    www.isc2.org/sscp

    Are you ready to prove yourself? Register and begin your SSCP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Feb 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • The Future of IoT in Colombia and New Growth Opportunities
    The Future of IoT in Colombia and New Growth Opportunities
    Gina Sánchez, Senior Consultant, Latin America, Digital Transformation, Frost & Sullivan Feb 21 2019 4:00 pm UTC 60 mins
    IoT is at the beginning stages of its growth. Because it offers the ability to capture and leverage data across virtually every aspect of the human experience, its potential is enormous. Organizations that do not yet have IoT on the drawing board must figure out what the IoT looks like, where it fits, and its real-world issues and benefits as they weigh their decisions about deployment.

    Frost & Sullivan invites you to join Gina Sánchez, Senior Consultant, to gain insights on the current status and future growth potential of the Industrial Internet of Things market in Colombia, the factors that drive and restrict the market, success stories, and projected growth rates until 2022.

    Key Takeaways:

    • What are the key verticals in this market?
    • How will the revenue shares of the hardware, software, services, and connectivity segments change?
    • What are the top three drivers for IoT investments?
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Feb 22 2019 6:00 am UTC 60 mins
    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSLP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/csslp

    Are you ready to prove yourself? Register and begin your CSSLP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification
    (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Feb 26 2019 6:00 am UTC 60 mins
    Accelerate your cybersecurity career with the CISSP certification.

    Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!

    During the online info-session, you will:
    - Gain an insight into the CISSP credential-its domains and career benefits for credential holders
    - Hear about the practical application of the CISSP related to real world issues for security professionals
    - Ask questions about the credential, exam and experience requirements
    - Learn everything you need to know about getting certified

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

    https://www.isc2.org/cissp
  • Airheads Tech Talks: Understanding ClearPass OnGuard Agents
    Airheads Tech Talks: Understanding ClearPass OnGuard Agents
    Saravanan Rajagopal, Aruba TAC team Feb 26 2019 10:00 am UTC 60 mins
    ClearPass OnGuard agents perform endpoint posture assessment and ensure that compliance is met before granting access to the network. This session will cover the ClearPass OnGuard Agent components and work-flow in detail.


    Join this webinar to learn about:

    •OnGuard Introduction.
    •ClearPass OnGuard Agent Components.
    •ClearPass OnGuard Agent Work-Flow.
    •Troubleshooting Common Issues.
  • Bring Your Business Up-to-Speed with Smarter, Better Wi-Fi
    Bring Your Business Up-to-Speed with Smarter, Better Wi-Fi
    Kevin Crehan, Aruba - Lead Technologist, EMEA Feb 27 2019 10:30 am UTC 60 mins
    Workplaces are transforming - from cubes and square footage, to any location, any time, with mobile devices running a mass array of applications. That's why it's crucial to choose access points and network management tools that deliver the best-connected guest and employee experience and can be deployed and managed with minimal IT resources.

    Join us on 27 February, for our "Bring Your Business Up-to-Speed with Smarter, Better Wi-Fi" webinar and get a chance to experience intelligent cloud networking for yourself.

    Learn how to:

    •Scale your network to grow with your users and location needs
    •Flexibly manage your network the way you want to (Demo)
    •Detect user-level activity to better prioritize applications and optimize your network.