ICT KTN Webinar Series: Cloud Based Security

Ian Osborne
Cloud Based Security: We have all become familiar with the process of installing anti-virus and other internet monitoring tools on our pc’s and then maintaining them on a regular, if sporadic, basis to keep up with the wave of spam, viruses, and other malware infecting our systems. Have you ever wondered whether there was another way? Perhaps using the modern techniques of Cloud computing to fight bot-net fire with fire? Perhaps there is. Ian Moyse will present the thought process and implementation strategy behind Webroot. A cloud based security service. This is an event in our Getting into the Cloud Series of events offered by the ICT KTN. It’s relevant to all Enterprises whether in the private or public sector. All delegates will gain access to the materials presented via registration on the ICT KTN website and the event will offer interaction between the speaker and Ian Osborne, the ICT KTN Host and Facilitator.
May 26 2011
55 mins
ICT KTN Webinar Series: Cloud Based Security
Cloud Based Security
Join us for this summit:
More from this community:

Mobile Computing

  • Live and recorded (1173)
  • Upcoming (34)
  • Date
  • Rating
  • Views
  • With 40% of time at work spent on administrative chores, inefficient communication is a big problem in business. Find out how to use tech to reduce wasted time in meetings, spend less time in your inbox and improve the way your company collaborates.

    About the presenter: Ray Gillenwater is the Co-founder and CEO of SpeakUp (getspeakup.com) an Enterprise Collaboration platform that enables collaborative problem solving and ideation. A student of Communications and a former executive at BlackBerry, Ray will share his experience and recommendations to help improve communication at your company.
  • A lot has changed in the way we communicate for business. A decade ago, most organizations had employees who came to the office every day, used desktop computers and desk phones, and stopped communicating for work when they went home.

    Today, people communicate for work anywhere, anytime, and on any device. Per Forrester, sixty-six percent of employees use two or more mobile devices for work. And according to Frost & Sullivan, nearly 25 percent of employees work from home or the road. What’s more, the desk phone is not the only business device. Based on a RingCentral survey, 35 percent of employees are using their mobile phones for work even when they are in the office. And nearly 80 percent of employees text for business, with 32 percent reporting that they’ve even closed a business deal via text.

    Even with these undeniable business behavior changes, the vast majority of companies haven’t optimized their communications infrastructure for mobile workforces or BYOD.

    Join this webinar to get ahead of the pack and learn the benefits of a cloud communications solution that supports the new world of work.

    •Understand the trends driving mobility and behavior changes in the work place, with Melanie Turek, VP of Research for Enterprise Communication & Collaboration, Frost & Sullivan.
    •Get the real story from a business that has addressed their mobility needs first hand from Adam Fishman, director of growth and operations for Lyft, a community ride-sharing service.
    •Hear how a cloud communications solution is addressing several challenges businesses face in the new work world from Nisha Ahluwalia, VP of product marketing at RingCentral.
  • We all want our families and homes to be safe with the convenience of remote monitoring, but do these smart home security devices really make our families safer or put them at more risk by inviting easier access to our homes electronically via insecure Internet of Things? In a follow-up to HP’s 2014 report on the Internet of (Insecure) Things we explore the security of popular off-the-shelf connected Home Security Systems and discuss various testing techniques we used in our study along with recommendations for manufacturers, developers and consumers.
  • Mobile is changing the way we work in the enterprise. Today’s workforce is demanding the ability to access and share business files from any device. In this webinar learn why Fortune 5000 companies select Syncplicity to achieve the promise of mobile productivity and solve the “Dropbox” problem.
  • From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
  • Speakers:
    John Koetsier: VP Research; VentureBeat
    Jen Kavanagh: EVP, General Manager (US); Beamly

    The biggest apps and the most successful enterprises do things differently. Mobile marketing automation is how Subway Surfer improves monetization. It's how Starbucks engages deeper with its customers. And it's how Plants vs Zombies gets you back.

    We surveyed 375 mobile developers with over 900 million monthly average users to find the best mobile marketing automation platforms. Then we analyzed 1.8 million apps in Google Play and the iOS app store, conducted 17 live interviews, and surveyed 19 MMA providers.

    The result is the most complete report on mobile marketing automation available.
  • With 75% of enterprise users reporting that they use their cell phones for making work calls, the inevitable question we must ask is, "can we just run our business on cell phones and ditch the PBX?" In this webinar, we will review the massive changes in the wireless landscape that have made this viable in the past 3 months, the solutions that make it possible and what implications this has for the modern BYOD organization.
  • Most IT providers have offers related to big data, cloud, mobility and security, and companies are looking at IT as the way to reduce costs and be competitive during an economic crisis. Investments in IT trends such as cloud computing and big data will rise thanks to a new player in the game: the business departments. This analyst briefing will show why companies are investing in IT, and what will change in 2015.

    Why you should attend:

    - Discover how many companies will adopt big data, cloud, mobility and security in 2015
    - Understand the current scenario of these trends in Latin America
    - Learn what will be different in 2015 regarding each trend
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.

    This week tune in and learn about how RingCentral integrates with Google Gmail, Calendar, Docs and more.
  • Advances in Unified Communications are being driven in large part by the necessity of enabling a remote and mobile workforce to be as connected as those in the office. As a result, communications platforms must evolve into truly unified, personal solutions to meet the needs of the changing mobile workplace. Zeus Kerravala, founder and principal analyst with ZK Research, will discuss his new white paper titled “Mobility Drives Need for Personal Unified Communications.” In this webinar, Zeus will detail why a shift to a Personal UC strategy is critical for increasing productivity and engagement with employees, customers and partners, and provide recommendations IT leaders can put in action today to gain and maintain a competitive edge.
  • Channel
  • Channel profile
  • An Introduction to Clustering Recorded: Mar 19 2014 61 mins
    An Introduction to Clustering
  • Practical Machine Learning using Ensemble Methods Recorded: Mar 5 2014 61 mins
    Practical Machine Learning using Ensemble Methods
  • Big Data Analytics Recorded: Feb 19 2014 59 mins
    Machine learning is an ever-evolving field which enables computers to make and improve predictions and behaviours based on data. A series of three webinars will be given by staff from the Industrial Maths KTN which introduce the topic of machine learning, provide examples of machine learning methods and demonstrate their application to real world problems. The webinars will be:

    1) An Overview of Machine Learning: Categorisation and approaches. Dr Michelle Ledbetter (Wednesday 19th February, 14.00)
    2) Practical Machine Learning using Ensemble Methods. Dr Siddhartha Ghosh (Wednesday 5th March, 14.00)
    3) An Introduction to Clustering. Dr Owen Jones (Wednesday 19th March, 14.00)
  • CeBIT 2014 - Research & Innovation how to apply for free POD space Recorded: Jan 27 2014 53 mins
    In this 60 minute webinar, the ICT KTN, UK Trade and Investment and a guest speaker from CeBIT will describe how you can apply for free PODS in the UK Research & Innovation zone at CeBIT. It will also provide information on how you can benefit from participation at this major event. We will also inform you of what support we can offer to UK exhibitors in terms of grants, UKTI pavilion participation, matchmaking, start-up competition, ICT summit etc.
  • Horizon 2020 Recorded: Dec 19 2013 44 mins
    Horizon 2020 – The next Steps

    Although Horizon 2020 does not officially start until January we are only days away from the release of the first call for proposals. The ICT elements alone add up to over €700 million and there is a wide range of opportunity for UK research.

    This is your chance to get involved in a simplified scheme with programmes specially designed for SMEs!
    ICT KTN has just completed a UK tour of events with 800 organisations getting on board. We have also had over 34,000 hits on the topic on our web site.

    We now start our second UK tour with a webinar where you will learn the following:
    •Details of the ICT Work Programme and in particular the elements in the first call.
    •Summary of the rules for participation
    •Details of the NEW SME scheme
    •Details of Commission information and brokerage events as well as the ICT KTN regional programme
    •How can get started, where can I find help
  • Analytical Skills for Big Data Part 2 Recorded: Dec 18 2013 62 mins
    Robert Leese, Director of the Industrial Maths KTN, brings his knowledge and understanding of the skills and techniques required to allow developers to analyse and characterise data sets. This is an essential skill for 21c software developers. Join us to learn more about the knowledge and tools available and how best to apply them.
  • Statistical Analytical Techniques for Big Data Part 1 Recorded: Dec 4 2013 61 mins
    Robert Leese, Director of the Industrial Maths KTN, brings his knowledge and understanding of the skills and techniques required to allow developers to analyse and characterise data sets. This is an essential skill for 21c software developers. Join us to learn more about the knowledge and tools available and how best to apply them.
  • Software Defined Data Centre Recorded: Nov 20 2013 60 mins
    Colleagues: Joe Baguley, VMware; Chris Swan, Cohesive FT and Alex Heneveld the CTO of Cloudsoft join us to bring the next frontier of IT as a Service into focus. How will we utilise public cloud services to replace our existing Data Centres? Who is doing that today, what are the processes involved and what issues and obstacles arise?
  • Trusted Software Development Recorded: Nov 6 2013 60 mins
    Ian Bryant of the Trustworthy Software Initiative, represents that cadre of software engineers which is most concerned with ensuring that software development produces an output which meets exacting standards for quality and trustworthiness. Not all applications require such an approach, but where software is developed for highly sensitive services or in high reliability environments, an understanding of best practice in engineering is of great benefit. Ian will present the TSI model for discussion.
  • Pragmatic Big Data in the Cloud. Recorded: Oct 16 2013 60 mins
    Fran Bennett and Bruce Durling from Mastodon C are experts in Big Data analysis and orchestration. In this session they will describe the key processes and challenges to be faced and demonstrate with examples how cloud services can be exploited to deliver new insight into published data sets.
  • Design for Availability. Recorded: Oct 9 2013 59 mins
    Joining us from California Adrian Cockcroft, Cloud Architect at Netflix, will provide an insight into how the use of commercial cloud capabilities allow Netflix to continue to innovate and reliably deliver its streaming video and other entertainment services. What are the key concerns related to availability and resilience? How can they be addressed and assured?
  • ICT KTN Autumn Schedule and Update on Cloud Standards Recorded: Sep 25 2013 55 mins
    Ian Osborne, ICT KTN, will provide an introduction to the Autumn Webinar Series and then, with David Terrar, D2C, a member of Cloud Industry Forum Governance Board and ISO Cloud Standards body, he will provide an update on the progress being made on the ISO standards related to Cloud; the European Commission's Cloud Strategy and Data Protection Regulation; and finally an update on the Codes of Practice emerging in the UK and Europe aimed at smaller businesses.
  • Horizon 2020 Briefing Recorded: Sep 19 2013 60 mins
    The €70 Billion R&D programme, Horizon 2020, is almost here. ICT KTN and the National Contact Point are bringing you a webinar with all the information you require to get started.
  • Achieving the Productivity Gains of BYOD without compromising security Recorded: Dec 10 2012 53 mins
    What it is about

    •Bring Your Own Device (BYOD) is the Device Centric part of the Consumerisation of IT (COIT). BYOD unblocks many opportunities for significant Productivity gains for both large companies and small companies. The low cost of developing an App for a Smartphone or a Tablet can make the payback time very attractive. Allowing it to run on the employee’s preferred personal platform guarantees a higher take-up and usage of the app and allows a reduction in the replacement costs of PCs .

    •Attempting to achieve these gains without a methodical approach to evaluating the risks to the business might cause the company to fail to meet its compliance requirement, whether you are a Solicitor, a Financial Services company, or a Manufacturer supplying to a Defence Ministry or Government supply chain

    •60% of UK businesses are believed to be implementing BYOD either formally or informally but less than 40% are taking adequate security precautions. New Generation Viruses can bypass traditional Firewalls and Virus Protection and are targeted to steal Trade Secrets and High Value Financial Information from industry generally. The employee’s own Tablet or Smartphone with all their games and social networking might be the carrier that infects the network.

    •Companies need to protect themselves against the bad apple Insiders who will use the technology change to commit fraud or to steal the company’s trade secrets, source code, commercial information, without restricting their employee’s ability to carry out their day to day job.

    The Benefits of Watching

    •Find sources for more information about the implementation of BYOD.
    •Discover a framework for evaluating the decision to introduce, restrict or forbid the technique
    •Discover a framework for a sensible decision on how much to spend on securing the network in order to use it
    •Discover some of the existing resources to support introduction of the technique
  • An introduction to Cloud Standards Recorded: Jun 19 2012 63 mins
    Cloud Computing is a relatively new and innovative area of business activity in the IT industry. The delivery of network based services is not a new idea, but the recent advances in network capabilities, the commoditisation of computing equipment and rapid advance of software as a service has taken this to a new level of business utilisation affecting all sectors and all types of business. What are the building blocks for these services? How are they regulated and controlled? How will the market continue to develop? A key element in the answers to these question are standards.
  • Maximising the Multi-core Advantage 6 Recorded: Jun 13 2012 57 mins
    John Easton is from IBM, a company which requires no introduction. However, you may not be aware of the extent of IBM investment in applied research in areas such as HPC and multicore. John Easton will guide you along this path.
  • Multicore and Scalability: What Really Matters for High Performance at Low Power Recorded: May 9 2012 57 mins
    The term “multicore” is increasingly misunderstood and over-simplified, as many still think this simply refers to having more than one conventional CPU. In this seminar, we’ll explain how Imagination uses the concept of multiple datapaths and execution units utilising range of different hardware and software architectures to implement high performance, highly scalable IP (Intellectual Property) cores covering graphics (GPU), video (VPU), communications (RPU) as well as CPU functionality. Tony will also explain how Imagination uses this to deliver much more than just performance scaling, including power management, product portfolio, and application software flexibility.
  • Maximising the Multi-Core Advantage -€“ Easier Parallel Programming With GPUs Recorded: Mar 14 2012 55 mins
    : In the past five years, NVIDIA has driven the use of graphics processing units (GPUs) for general-purpose computing tasks from nowhere to a mainstream technology. Today, three of five most powerful supercomputers in the world are powered by GPUs and we see many examples where new science and technology is enabled by faster, better, more accurate simulation applications running on GPU accelerated computers.

    How can a working computational engineer or scientist take advantage of this new computing paradigm? The simplest way is to use an application that has been ported to GPUs; more and more commercial applications in the fields of structural mechanics, fluid dynamics, computational chemistry, bioinformatics, etc. are being ported to GPUs. For those using high-productivity scripting languages like MATLAB and Mathematica, the latest releases of these packages are accelerated by GPUs.
    Libraries offer a route to exploit the benefits of a GPU with minimal effort. NVIDIA and our partners provide a broad spectrum of libraries for dense and sparse linear algebra, Fourier transforms, random number generation, image processing, video encoding and decoding etc. Simply replacing calls to libraries running on a CPU with calls to libraries written for the GPU will give an immediate boost in performance.
  • Multicore Design Tools: An Overview of Parallell Studio XE Recorded: Feb 8 2012 60 mins
    From multicore to many-core: How to write portable, scalable, parallel applications that take advantage of the mushrooming number of cores.
    In the session we will look at some of the programming tools and parallel programming models that you can use to make your code parallel. We present an overview of Intel Parallel Studio XE, along with a discussion on what methodology to use when adding parallel code to existing programs.
Accelerating Business Innovation in ICT
The new KTN will focus on Knowledge Transfer as a stimulus to economic growth. It will seek to deliver improved UK industrial performance by facilitating the development and take up of information and communications technologies and their adoption as key enablers in other industries.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ICT KTN Webinar Series: Cloud Based Security
  • Live at: May 26 2011 1:00 pm
  • Presented by: Ian Osborne
  • From:
Your email has been sent.
or close
You must be logged in to email this