Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Recorded: Dec 7 2018 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • The Digital Workplace Requires AI-Driven IT
    The Digital Workplace Requires AI-Driven IT
    Jeff Aaron, VP of Marketing, Mist Systems; Kevin Fenn, Global Head of Networks, ThoughtWorks Recorded: Dec 6 2018 57 mins
    Join this webinar where Kevin Fenn, Global Head of Networks at ThoughtWorks, and Jeff Aaron, Vice President of Marketing at Mist, will discuss the emerging role of Artificial Intelligence (AI) in IT and how you can benefit from this trend. AI is critical to the emerging digital workplace, reshaping the way IT organizations deploy and manage infrastructure and how users consume those services.

    The IT department at ThoughtWorks is on the leading edge of the “AI for IT” movement, bringing unprecedented automation and insight into daily operations with a state of the art AI-driven Wireless LAN from Mist. Their new digital workplace, which enables new initiatives such as open seating and video collaboration, is boosting employee efficiency and experience.

    We will explore:

    · AI technology and the impact it has on wireless networking

    · Best practices for deploying an AI-driven WLAN

    · How to support wireless video conferencing, open seating, and other strategic initiatives

    · Quantifying the benefits of a new AI-driven network infrastructure
  • Best Practices for Securing Mobile App DevOps
    Best Practices for Securing Mobile App DevOps
    Jeff Fairman, Senior Vice President of Engineering & Brian Reed, Chief Mobility Officer Recorded: Dec 6 2018 49 mins
    As DevOps teams seek to accelerate the mobile app dev pipeline, they rely on tools and best practices to gain speed. Because our engineering leader Jeff Fairman previously ran software development for a top online brokerage, he understands the challenges of scaling security testing to meet current demands.

    After discovering the NowSecure automated testing platform, Jeff Fairman was so impressed with the tech that he joined the company to help DevOps and security teams build and release safe mobile apps. Attend this webinar to learn:
    + Why you need dynamic application security (DAST) testing to flag vulnerabilities in the post-build phase
    + The unique requirements, toolchain options and best practices for secure mobile DevOps
    + How to combine continuous daily testing with outsourced pen testing.
  • Dartmouth College's Network of the Future is Powered by AI
    Dartmouth College's Network of the Future is Powered by AI
    Mitch Davis, Dartmouth; Rahul Vir, Juniper Networks; Felix Windt, Dartmouth; Jeff Aaron, Mist Systems Recorded: Dec 5 2018 61 mins
    When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.

    In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.

    Watch now, and learn how to:

    - Gain visibility into the Wi-Fi user experience
    - Quickly troubleshoot network problems with an AI-driven virtual assistant
    - Predict network problems before they arise
    - Implement personalized location services, such as wayfinding and proximity notifications

    Panelists:
    Mitch Davis, CIO, Dartmouth College
    Rahul Vir, Sr. Director, Product Management, Juniper Networks
    Felix Windt, Network Engineer, Dartmouth College
    Jeff Aaron, VP Marketing, Mist Systems
  • Ask the Experts: How to adopt a BYOD policy that will delight your employees
    Ask the Experts: How to adopt a BYOD policy that will delight your employees
    Mark Elwood Recorded: Dec 5 2018 24 mins
    Employee expectations to technology are changing rapidly. In their personal lives they often use the very latest technology, but often that can be difficult for firms to replicate. So, BYOD is becoming increasingly attractive for many employees who would like to use the technology they know and love for business as well as pleasure.
    Join our panel of experts who will explore how BYOD strategies are evolving and how Re:Call from TeleWare could be the secret weapon you didn’t know you needed.
  • A Walk in The Clouds: The Modern Customer Experience
    A Walk in The Clouds: The Modern Customer Experience
    Jacqueline Touma, Sandy Mathis, Amy Protexter, Razia Richter Recorded: Dec 4 2018 60 mins
    The customer expects fast, personal and engaging experiences, integrated and aligned across touch points in real time.

    The Cloud brings along a paradigm shift in the way customers interact with the businesses and what businesses must be prepared for. Understand what the Modern Customer Experience is and how content and customer analytics are keys to success.

    Organizations need to have the right tools to capture feedback and provide needed content at each point in the life cycle.

    Learn more from our Panel of experts as they share their experiences, best practices, and lessons from leading Companies.
  • How esports can combine old and new monetization models to reach new heights
    How esports can combine old and new monetization models to reach new heights
    Dean Takahashi, Lead Writer, GamesBeat Recorded: Dec 4 2018 60 mins
    Money is pouring into esports. There are more players, more games, more viewers, and bigger prize pools — and companies are taking note. Investment is coming from all angles, and everyone is looking for a piece of the pie. But many of the existing monetization models of esports only seek to follow the tried and true formats from traditional sports.

    There is a lot for the video game industry to learn from the legacy sports broadcast model; but there’s a catch: The video games industry uses some of the world’s most advanced interactive technology to create some of the world’s most compelling entertainment experiences.

    So why would we just do it the same way as before? The answer? We probably won’t. Not for long at least.

    In this special session, our panel of experts will unpack the old and the new of esports, and explore where genuine innovation may come from in the future. We’ll discuss how to get the most out of traditional methods, and how some companies are experimenting with new approaches to engaging with audiences and driving revenue.

    Register now to join us for free.

    Attend this webinar and learn:
    * How the current esports model stacks up against traditional sports, and where the money is coming from now
    * The new technologies that will change the existing business model
    * The difference between formal esports and personalized broadcasting — and what those differences mean for your bottom line

    Speakers
    * Jonathan Singer, Industry Strategist, Akamai
    * Robb Chiarini, Director esports, NCSA at Ubisoft
    * Dean Takahashi, Lead Writer, Gamesbeat
    * Kent Wakeford, Co-founder and COO, Gen.G

    Sponsored by Akamai
  • 2018 Threat Landscape Roundup and Predictions
    2018 Threat Landscape Roundup and Predictions
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Dec 4 2018 36 mins
    Small and medium-sized businesses are major targets for cybercriminals. To stay safe, today’s businesses must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses faced this year and what's upcoming in 2019 to get details and tips that will help you keep your business and clients safe. Our Threat expert will be discussing ransomware, banking Trojans, phishing and all the crypto-crime that’s wreaking havoc on IT pros.
  • Smart Meetings and Intelligent Spaces
    Smart Meetings and Intelligent Spaces
    Jon Howell, Aruba Smart Office and Location Based Solutions, EMEA Recorded: Dec 4 2018 46 mins
    The Digital Workplace is quickly becoming a critical initiative for today’s modern enterprise. To keep pace IT and business leaders must not only stay ahead of the competition but must now reassess how their greatest assets - their employees, work and collaborate.

    Watch our OnDemand webinar and discover how smart, modern workspaces can bridge the physical and digital environment with actionable intelligence to further improve team productivity and effectiveness while boosting resource efficiency, productivity and reducing costs.

    Topics
    - Overview of current trends in the workspace
    - Challenges faced by employers and employees
    - Aruba Intelligent Edge solutions
    - Analytics and how to improve workspace utilisation
  • Introducing Re:Call
    Introducing Re:Call
    TeleWare Recorded: Dec 4 2018 1 min
    Introducing Re:Call - An App that gives you a second number on your personal phone for business calls and SMS
  • Airheads Tech Talks_ Aruba AppRF – AOS 6.x & 8.x
    Airheads Tech Talks_ Aruba AppRF – AOS 6.x & 8.x
    Pagalavan Karunanidhi, Aruba TAC Team Recorded: Nov 30 2018 168 mins
    During this webinar, we will cover AppRF - a suite of application visibility and control features that are part of Aruba's Policy Enforcement Firewall. AppRF is a PEF feature that is designed to give network administrators insight into the applications that are running on their network, and who is using them.
  • The Future of Work: Growth Opportunities and Trends
    The Future of Work: Growth Opportunities and Trends
    Rob Arnold, Industry Principal, Connected Work, Frost & Sullivan Recorded: Nov 29 2018 43 mins
    Is your workforce built for disruption and a rapidly ever-changing future of work?

    Policies, demographics, technologies, economics, environmental sustainability, and social movements are shifting how people work and how employers are managing their workers. As many jobs face the prospect of automation, workers and employers need to collaborate to create a modern workplace that supports the growing knowledge economy.

    Key Takeaways:
    • Learn which office technologies are supplanting the massive installed base of legacy equipment in the workplace.
    • Discover the devices and applications that will support the workplace of the future.
    • Understand the role that collaboration and wearable technologies play in making workers happier and more satisfied.
  • CCISO War Games
    CCISO War Games
    Tari Schreider Recorded: Nov 29 2018 52 mins
    CCISO Instructor-led War Games training: What are they, How are they run (as a C-Level Roundtable, and as part of the CCISO class), and Why are they a critical part of C-Level Executive training.
  • Is Your Wi-Fi Network Putting Your Business at Risk?
    Is Your Wi-Fi Network Putting Your Business at Risk?
    Patrick LaPorte - Aruba Networks Recorded: Nov 29 2018 48 mins
    86% of midsize companies agree that digital technologies are disrupting their industry. Your network has never been more critical. It is the onramp to your cloud applications. It is the way your mobile users connect, work and collaborate. And it is what enables amazing, memorable customer experiences. Choosing the right network solution has never been more important.

    Join us November 29th, 10am PST to learn about the latest trends and the Top 5 things your business network can’t live without.

    Attend and you may qualify for a free Instant Access Point

    Register today!
  • Shifting Controllers to Cloud
    Shifting Controllers to Cloud
    Mist Recorded: Nov 29 2018 47 mins
    The aging architecture of wireless controllers can no longer meet the pace of technology innovation. With the growing number of smart phones and connected devices, your organization needs a network built on an elastic, cloud-based microservices architecture that leverages AI to automate operations and eliminate manual troubleshooting.

    Join this webinar to learn how to set your wireless free from monolithic controllers, saving you time and money as you shift your network operations to the cloud and leverage machine learning. We'll explore:

    - Trends driving the need for change
    - Challenges faced by the 15-year-old controller architecture
    - Benefits of a modern cloud architecture using microservices
    - What to look for when evaluating cloud solutions
  • 2019 Forcepoint Cybersecurity Predictions
    2019 Forcepoint Cybersecurity Predictions
    Raffael Marty, VP Research & Intelligence, and Carl Leonard, Principal Security Analyst Recorded: Nov 29 2018 49 mins
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your enterprise and the primary source of security breaches driving cyber risk to all-time highs.

    In 2019, attackers will stop at nothing to steal our identities, evade detection through new techniques, and bring disruption to our doorsteps. The stakes are high, the world more connected than we could have ever imagined.

    Join our webcast now, where we’ll examine topics such as:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale

    Join Forcepoint's Raffael Marty, VP Research & Intelligence, and Carl Leonard, Principal Security Analyst, for a webcast discussing the most pressing cybersecurity issues – and what you can do to protect against them.
  • DigiCert Monthly Threat Briefing - November 2018
    DigiCert Monthly Threat Briefing - November 2018
    Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Recorded: Nov 29 2018 51 mins
    Stay updated on November's threats within the SSL, TLS, PKI, IoT, encryption, identity and digital certificate space. From DigiCert.
  • Microsoft Future Decoded
    Microsoft Future Decoded
    Mark Elwood Recorded: Nov 29 2018 2 mins
    Launching Re:Call from TeleWare at Microsoft's premier UK event. The TeleWare stand was a great success. Watch the video today
  • Modern Cyberattacks and How to Keep Businesses Safe
    Modern Cyberattacks and How to Keep Businesses Safe
    Dan Slattery, Sr. Information Security Analyst, Webroot Recorded: Nov 29 2018 21 mins
    Small and medium-sized businesses and the MSPs who serve them are major targets for cybercriminals. To stay safe, today’s businesses and MSPs must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses will face this year to get details and tips that will help you keep your business and clients safe.

    Some of the topics Dan Slattery, Sr. Information Security Analyst, Webroot will cover:

    • Ransomware, banking Trojans, and phishing
    • Cryptomining, cryptojacking, and other crypto-crime
    • Best practices for keeping businesses safe.
  • Secure and Always-On Connectivity Changes the Game
    Secure and Always-On Connectivity Changes the Game
    Gerri Hinkel, Sr. Marketing Manager for Primary Education Recorded: Nov 28 2018 61 mins
    With so many users and devices on the network at any given time, universities and colleges struggle to keep up with the demand for always-on connectivity. What can you do to optimize your network infrastructure to tackle these challenges?

    Join our networking experts for a webinar that will discuss how Aruba solutions:

    * Provide always-on connectivity with features including RF optimization and controller hitless failover
    * Secure the network and identify risk with IoT devices pre-authentication and user and entity behaviour analytics (UEBA)
    * Provide deeper and predictive network insights
    * Address campus wired pain points with a unified wired AND wireless solution

    Speakers
    Michael Dickman, VP of Global PLM Campus Networking
    Peter Lane, Aruba WLAN PLM
    Danny Jump, Aruba ClearPass PLM
    Dan Comfort, Aruba Cloud PLM
  • Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Chris Marsh of 451 Research & Matt Crawford of Citrix Recorded: Nov 28 2018 55 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • Smart Cities: Real IoT Use Cases
    Smart Cities: Real IoT Use Cases
    Steve Brumer- Partner at 151 Advisors and Steve Wimsatt - Senior Director, Alliances and Business Development Ruckus Network Recorded: Nov 26 2018 60 mins
    Problems faced by IoT and smart city opportunities are knowing how all the moving pieces work together to obtain a real ROI! Join Steve Brumer, Partner at 151 Advisors and Steve Wimsatt, Senior Director, Alliances and Business Development Ruckus Networks, a unit of ARRIS for a 45-minute open discussion on IoT in Smart Cities, the real-world applications and uses cases across the globe and how to make money!

    Topics will include:
    - Real World Applications & Uses Cases
    -Where is the money in supplying products and services and the commercialization aspects of them!
    - What is the true meaning of ROI in the Smart Cities and Smart Buildings space?

    Key takeaways will focus on where should you focus your time, energy and efforts within this space and how to drive revenue.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Recorded: Nov 23 2018 38 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Search and destroy hard to detect security risks
    Search and destroy hard to detect security risks
    Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, Citrix Recorded: Nov 23 2018 46 mins
    Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

    Learn the benefits of advanced analytics, including:
    • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
    • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
    • Creating custom rules with conditions and actions to remediate problems
    • Halting ransomware and data loss prevention (DLP)

    * Verizon Data Breach Investigations Report (DBIR) 2017
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud
    Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Nov 23 2018 43 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    • Contextual and secure access to applications
    • Website and application protection from internal and external threats
    • Application and network visibility and intelligent analytics
    • Flexibility and performance
  • DigiCert Monthly Threat Briefing - December - 2018 in review, 2019 ahead
    DigiCert Monthly Threat Briefing - December - 2018 in review, 2019 ahead
    Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Dec 12 2018 4:00 pm UTC 60 mins
    Let's wrap up 2018 with a recap of last year's major events, and a forecast on what's coming next year.
  • Bridging the online and offline marketing gap
    Bridging the online and offline marketing gap
    Mark Coffey, SVP of Strategic Partnerships, GasBuddy Dec 12 2018 5:00 pm UTC 60 mins
    While companies have been ditching traditional marketing methods in their race to capture the online-savvy millennials, no one is on their phone 24/7, and delivering brand messages out in the world is still vital to capturing mindshare.

    Those first-gen marketing methods, including outdoor, tv, direct mail, and more, are still valuable and essential to building a stronger bottom line, especially when integrated as a vital part of an overarching marketing campaign, firing on all cylinders. That’s easier than ever, because traditional doesn’t mean old-school and analog anymore, and innovations in marketing technology don’t only apply to your online channels. You can apply your martech capabilities not just for tracking, measurement, and attribution, but to keep tabs on omnichannel competitor strategies, design the most effective campaign copy in every arena, create the most impactful rollouts between all your channels and more.

    To find out how to integrate offline marketing channels with your online efforts, how marketing technology can bring those traditional methods into the twenty-first century, and more, don’t miss this VB Live event!

    Registration is free.

    Attend this webinar and learn:
    * How to use martech to digitize offline channels
    * How to integrate traditional marketing efforts into their newer tech-driven marketing stack
    * The importance of combining online and offline marketing
    * How to track offline conversions

    Speakers:
    * Evan Jones, CMO, Fender
    * Mark Coffey, SVP of Strategic Partnerships, GasBuddy
    * Myllisa Patterson, Senior Director, Event Cloud Marketing, Cvent
    * Shannon Ryan, Head of Marketing, CI&T
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Cvent
  • Agile Portfolio Management: Three best practices
    Agile Portfolio Management: Three best practices
    Alan Wendt, Micro Focus Dec 12 2018 6:00 pm UTC 60 mins
    DevOps and Enterprise Agile frameworks are key enablers of Digital Transformations at the operating level of organizations, but to achieve true agility across the enterprise, these principles must become the norm in all business areas. Some of the most critical connection functions in the organization are Portfolio Management, Program Management, and Project Delivery. This presentation will offer three best practices for Agile Project and Portfolio management to help your organization succeed in this transformational era.

    Join us to hear more about:
    • How lean thinking helps to meet changing business demands and speed up the decision-making
    • The limitations of annual-only portfolio planning cycles
    • The incredible power of aligning the work to the organization’s intended outcomes
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis?
    Mark Elwood, Marketing Director, TeleWare Dec 13 2018 10:00 am UTC 50 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • Using Risk Analysis to Enhance Compliance
    Using Risk Analysis to Enhance Compliance
    Andras Cser, Vice President and Principal Analyst, Forrester Dec 13 2018 5:00 pm UTC 20 mins
    For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.

    In this session, Forrester Vice President and Principal Analyst Andras Cser will share how to prioritize security and compliance efforts. Specific topics include:

    - How your auditors are behaving
    - Why risk-based prioritization is the only way to find threats
    - The importance of context
    - Forrester’s recommendations and best practices

    Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Doug Landoll, CEO, Lantego Dec 13 2018 5:30 pm UTC 35 mins
    Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.

    In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:

    - How to define cybersecurity success
    - Common approaches that fall short
    - Risk-based cybersecurity strategy planning

    Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
  • 9 Steps to Building a Smarter Network
    9 Steps to Building a Smarter Network
    Cherie Martin, Network Solutions Manager - Aruba Dec 13 2018 6:00 pm UTC 60 mins
    Did you know that over 50% of issues with network experience can be attributed to lack of pre-installation planning? There is a lot to consider, but the effort you put in up front saves time, money, and frustration over the life of your network. Join us as Cherie Martin, Network Solutions Manager, reviews the 9critical steps you should take to ensure your network is smart and reliable.

    Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
  • The State of the CASB Market
    The State of the CASB Market
    Mike Osterman, CEO, Osterman Research Dec 13 2018 6:15 pm UTC 38 mins
    CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.

    In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:

    -Key cloud adoption concerns
    -Most valued CASB features
    -Levels of confidence in controlling data and maintaining compliance

    Attend this session to learn more about the need for and use of CASBs in today’s organizations.
  • Comparing CASB Solutions from Microsoft and Forcepoint
    Comparing CASB Solutions from Microsoft and Forcepoint
    Mike Osterman, CEO, Osterman Research Dec 13 2018 7:00 pm UTC 46 mins
    CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.

    In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:

    - Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
    - Provide a detailed analysis of how both products compare over 13 key feature areas
    - Consider coverage of third-party apps beyond Office 365

    Attend this session to explore the best route to full Office 365 security.
  • Transforming Cloud Connectivity & Security in Distributed Networks 
    Transforming Cloud Connectivity & Security in Distributed Networks 
    Jim Fulton, Director Product Marketing, Forcepoint Dec 13 2018 8:00 pm UTC 60 mins
    Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps.
     
    In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security solution enables highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
  • Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Uli Wallscheid, DP Solutions Product Manager, Micro Focus Dec 17 2018 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor.

    Im Webinar am 17. Dezember dreht sich alles um das Thema Data Protector 10.20: Das interne Reporting wurde in Data Protector 10.20 weiter ausgebaut. Desweiteren erhalten Sie einen Einblick in alle neuen Features der Version 10.20 von Data Protector.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Dec 19 2018 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:

    Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • ABCs of AI
    ABCs of AI
    Sudheer Matta, VP of Product, Mist Dec 19 2018 5:00 pm UTC 56 mins
    There's a lot of buzz around Artificial Intelligence and how it can help IT operations. There's also a lot of confusion.

    Watch this on-demand AI:rchitect series webinar where we'll cut through the AI noise. In this interactive session, we'll cover:

    - The need for AI-driven IT
    - The difference between AI, machine learning, deep learning, data science, and other common techniques
    - Ways to implement data science in your Wi-Fi network
    - How to prepare yourself (and your IT team) for the transition to AI-driven IT
  • Webroot 2019 Threat predictions
    Webroot 2019 Threat predictions
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Jan 15 2019 10:00 am UTC 60 mins
    The Threat landscape has seen a rise of Cryptojacking, evolution of scams and malware such as Emotet and other cybersecurity issues such as Trickbot and Ransomware that have affected businesses in 2018.

    Join this 30-minute webinar where our Threat Expert will walk you through Webroot's Threat predictions for 2019, so MSPs and SMBs can stay ahead of attacks and keep your clients and businesses safe.

    Some of the topics that will be covered:
    - AI Disruption
    - US adoption of similar GDPR legislation
    - Cryptojacking will keep rising while ransomware will decline


    Register today!
  • Top 5 Ways Your Network Can Give Your Business a Competitive Edge
    Top 5 Ways Your Network Can Give Your Business a Competitive Edge
    Guido Kragten, Sales Enablement Cloud Platforms, EMEA Jan 16 2019 10:30 am UTC 60 mins
    Seventy percent of today's Midsize businesses are investing in technology to customize the user experience, improve customer satisfaction, build loyalty, and gain a competitive advantage. But the ability to deliver amazing user experiences is dependent on high-performance, reliable connectivity. It requires a business-class network.

    Join us on 16th January, as we showcase the Top 5 business-class features your network must have for you to automate and optimize the delivery of network services to drive your business success.

    A high-level discussion will be followed by a demo of Aruba Central, network management in the Cloud.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Jan 16 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • How AI-Based, Zero-Effort Authentication is Changing the Customer Experience
    How AI-Based, Zero-Effort Authentication is Changing the Customer Experience
    Ravin Sanjith, Intelligent Authentication, Opus Research; Alexey Khitrov, IDRnD Jan 17 2019 6:00 pm UTC 45 mins
    With access to mountains of data — scoured, analyzed, and made actionable thanks to Artificial Intelligence, machine learning, and neural networking — enterprise organizations are staking their claim on seamless, context-aware customer interactions as a business differentiator. Altogether these technologies help deliver on the promise of secure, personalized digital self-service and can have a demonstrable impact on an enterprise’s bottom line.

    Indeed “zero-effort authentication” enables intelligent automation, reduced customer effort (no more PINs and passwords), reduced call handling time, and improved confidence in security. Enterprises are building zero-effort authentication strategies for maximum return on investment and increased customer loyalty.

    In an upcoming webinar, Ravin Sanjith (Intelligent Authentication, Opus Research) and Alexey Khritov (CEO, IDRnD) will discuss how voice biometrics, combined with AI techniques, sensors and increased processing power, can provide a virtuous cycle for greater convenience and less effort to validate a consumer’s identity in mobile apps, on messaging platforms, and beyond.
  • Implement / Declare Your APIs (Part 1)
    Implement / Declare Your APIs (Part 1)
    Val Huber, Consulting Software Engineer, Security and API Management Jan 23 2019 5:00 pm UTC 75 mins
    Part 1 of a series. Is it true that API implementation can be declarative? Is it real that this declarative implementation looks like executable business requirements? Come, find for yourself – in this session on - CA Live API Creator’s Declarative Rules which are spreadsheet-like expressions that react to changes in referenced data to enfore business policy. The simplicity of declaring these expressions for data integrity and data integration, underlies the speed and agility rendered by CA Live API Creator (LAC) in any API definition/implementation process. Touch and feel LAC’s declarative rules via plenty of practical examples and use cases implemented in this session.
  • Implement / Declare Your APIs (part 2)
    Implement / Declare Your APIs (part 2)
    Val Huber, Consulting Software Engineer, Security and API Management Jan 30 2019 5:00 pm UTC 75 mins
    Part 2 of a series. Is it true that API implementation can be declarative? Is it real that this declarative implementation looks like executable business requirements? Come, find for yourself – in this session on - CA Live API Creator’s Declarative Rules which are spreadsheet-like expressions that react to changes in referenced data to enfore business policy. The simplicity of declaring these expressions for data integrity and data integration, underlies the speed and agility rendered by CA Live API Creator (LAC) in any API definition/implementation process. Touch and feel LAC’s declarative rules via plenty of practical examples and use cases implemented in this session.
  • Is Your Wi-Fi Network Putting Your Business At Risk?
    Is Your Wi-Fi Network Putting Your Business At Risk?
    Richard Leadbetter, Security Technical Specialist, EMEA Feb 6 2019 10:30 am UTC 60 mins
    86% of midsize companies agree that digital technologies are disrupting their industry. Your network has never been more critical. It is the on-ramp to your cloud applications. It is the way your mobile users connect, work and collaborate. And it is what enables amazing, memorable customer experiences.
    Choosing the right network solution has never been more important.

    Join us on 6th February to learn about the latest trends and the Top 5 things your business network can't live without.
  • How to Get the Most of Your (ISC)² Membership - Local Benefits and Global Reach
    How to Get the Most of Your (ISC)² Membership - Local Benefits and Global Reach
    Tony Vizza, CISSP , Director of Cyber Security Advocacy, APAC and Hazel Hung, Customer Services Manager, APAC Feb 12 2019 6:00 am UTC 60 mins
    As an (ISC)² Member, you now have access to a wide range of global resources, educational tools, peer networking opportunities, as well as exclusive discounts to industry events. discounts. There is so much more to discover to what your (ISC)² membership brings!

    In this webinar, you will learn about:
    - The latest news and developments across APAC and (ISC)² from around the world.
    - Exciting and upcoming CPE opportunities to help you stay sharp
    - Member benefits and perks including fantastic discounts on a range day to day items
    - New, upcoming and FREE professionally developed education courses just for members.
    - An update on (ISC)² certifications to help you take your career to the next level.
    - Networking opportunity with like-minded professionals locally and globally via ((ISC)² chapters
    - An opportunity to ask questions in our Q&A session

    Join us on Feb 12, 2019 (Tue) at 14:00 (GMT +8) to get the most of your (ISC)² membership globally and locally.
  • The ROI for VR/AR in the Enterprise
    The ROI for VR/AR in the Enterprise
    Intel, Atheer, Accenture, Nielsen Feb 14 2019 5:00 pm UTC 75 mins
    The VR/AR Association Enterprise industry committee will present the latest case studies, best practices, and ROI
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Feb 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Bring Your Business Up-to-Speed with Smarter, Better Wi-Fi
    Bring Your Business Up-to-Speed with Smarter, Better Wi-Fi
    Kevin Crehan, Aruba - Lead Technologist, EMEA Feb 27 2019 10:30 am UTC 60 mins
    Workplaces are transforming - from cubes and square footage, to any location, any time, with mobile devices running a mass array of applications. That's why it's crucial to choose access points and network management tools that deliver the best-connected guest and employee experience and can be deployed and managed with minimal IT resources.

    Join us on 27 February, for our "Bring Your Business Up-to-Speed with Smarter, Better Wi-Fi" webinar and get a chance to experience intelligent cloud networking for yourself.

    Learn how to:

    •Scale your network to grow with your users and location needs
    •Flexibly manage your network the way you want to (Demo)
    •Detect user-level activity to better prioritize applications and optimize your network.
  • Reducing Operational Costs with Better Network Management in the Cloud
    Reducing Operational Costs with Better Network Management in the Cloud
    tba Mar 20 2019 10:30 am UTC 60 mins
    Whether you’re expanding a network to support new initiatives, navigating through growing security challenges, or planning a refresh of older technology; keeping costs down and saving time for your IT Team is key.

    Join our webinar and learn how Aruba delivers the industry’s most robust and reliable networking solutions for small and midsize businesses - help reduce planning, deployment and operational costs with features such as:

    •Zero-Touch Provisioning
    •Comprehensive Alerting
    •Integrated User Analytics
    •Scheduled and On-Demand Reporting
    •Automated Firmware Updates
    •All from a single interface