Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
Aaron Cockerill, Chief Strategy OfficerRecorded: Dec 7 201829 mins
What is currently happening the world of security?
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*
The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.
During this webinar Aaron Cockrill, CSO at Lookout will talk about:
- What does a post-perimeter world mean to enterprise security?
- Why mobility changes the enterprise security paradigm?
- How to protect data when accessed from outside the corporate perimeter?
- What are the current and emerging threats?
* Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
Jeff Aaron, VP of Marketing, Mist Systems; Kevin Fenn, Global Head of Networks, ThoughtWorksRecorded: Dec 6 201857 mins
Join this webinar where Kevin Fenn, Global Head of Networks at ThoughtWorks, and Jeff Aaron, Vice President of Marketing at Mist, will discuss the emerging role of Artificial Intelligence (AI) in IT and how you can benefit from this trend. AI is critical to the emerging digital workplace, reshaping the way IT organizations deploy and manage infrastructure and how users consume those services.
The IT department at ThoughtWorks is on the leading edge of the “AI for IT” movement, bringing unprecedented automation and insight into daily operations with a state of the art AI-driven Wireless LAN from Mist. Their new digital workplace, which enables new initiatives such as open seating and video collaboration, is boosting employee efficiency and experience.
We will explore:
· AI technology and the impact it has on wireless networking
· Best practices for deploying an AI-driven WLAN
· How to support wireless video conferencing, open seating, and other strategic initiatives
· Quantifying the benefits of a new AI-driven network infrastructure
Jeff Fairman, Senior Vice President of Engineering & Brian Reed, Chief Mobility OfficerRecorded: Dec 6 201849 mins
As DevOps teams seek to accelerate the mobile app dev pipeline, they rely on tools and best practices to gain speed. Because our engineering leader Jeff Fairman previously ran software development for a top online brokerage, he understands the challenges of scaling security testing to meet current demands.
After discovering the NowSecure automated testing platform, Jeff Fairman was so impressed with the tech that he joined the company to help DevOps and security teams build and release safe mobile apps. Attend this webinar to learn:
+ Why you need dynamic application security (DAST) testing to flag vulnerabilities in the post-build phase
+ The unique requirements, toolchain options and best practices for secure mobile DevOps
+ How to combine continuous daily testing with outsourced pen testing.
Mitch Davis, Dartmouth; Rahul Vir, Juniper Networks; Felix Windt, Dartmouth; Jeff Aaron, Mist SystemsRecorded: Dec 5 201861 mins
When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.
In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.
Watch now, and learn how to:
- Gain visibility into the Wi-Fi user experience
- Quickly troubleshoot network problems with an AI-driven virtual assistant
- Predict network problems before they arise
- Implement personalized location services, such as wayfinding and proximity notifications
Mitch Davis, CIO, Dartmouth College
Rahul Vir, Sr. Director, Product Management, Juniper Networks
Felix Windt, Network Engineer, Dartmouth College
Jeff Aaron, VP Marketing, Mist Systems
Employee expectations to technology are changing rapidly. In their personal lives they often use the very latest technology, but often that can be difficult for firms to replicate. So, BYOD is becoming increasingly attractive for many employees who would like to use the technology they know and love for business as well as pleasure.
Join our panel of experts who will explore how BYOD strategies are evolving and how Re:Call from TeleWare could be the secret weapon you didn’t know you needed.
Jacqueline Touma, Sandy Mathis, Amy Protexter, Razia RichterRecorded: Dec 4 201860 mins
The customer expects fast, personal and engaging experiences, integrated and aligned across touch points in real time.
The Cloud brings along a paradigm shift in the way customers interact with the businesses and what businesses must be prepared for. Understand what the Modern Customer Experience is and how content and customer analytics are keys to success.
Organizations need to have the right tools to capture feedback and provide needed content at each point in the life cycle.
Learn more from our Panel of experts as they share their experiences, best practices, and lessons from leading Companies.
Dean Takahashi, Lead Writer, GamesBeatRecorded: Dec 4 201860 mins
Money is pouring into esports. There are more players, more games, more viewers, and bigger prize pools — and companies are taking note. Investment is coming from all angles, and everyone is looking for a piece of the pie. But many of the existing monetization models of esports only seek to follow the tried and true formats from traditional sports.
There is a lot for the video game industry to learn from the legacy sports broadcast model; but there’s a catch: The video games industry uses some of the world’s most advanced interactive technology to create some of the world’s most compelling entertainment experiences.
So why would we just do it the same way as before? The answer? We probably won’t. Not for long at least.
In this special session, our panel of experts will unpack the old and the new of esports, and explore where genuine innovation may come from in the future. We’ll discuss how to get the most out of traditional methods, and how some companies are experimenting with new approaches to engaging with audiences and driving revenue.
Register now to join us for free.
Attend this webinar and learn:
* How the current esports model stacks up against traditional sports, and where the money is coming from now
* The new technologies that will change the existing business model
* The difference between formal esports and personalized broadcasting — and what those differences mean for your bottom line
* Jonathan Singer, Industry Strategist, Akamai
* Robb Chiarini, Director esports, NCSA at Ubisoft
* Dean Takahashi, Lead Writer, Gamesbeat
* Kent Wakeford, Co-founder and COO, Gen.G
Kelvin Murray, Sr. Threat Research Analyst, WebrootRecorded: Dec 4 201836 mins
Small and medium-sized businesses are major targets for cybercriminals. To stay safe, today’s businesses must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.
Register for this 30-minute webinar on the key threats businesses faced this year and what's upcoming in 2019 to get details and tips that will help you keep your business and clients safe. Our Threat expert will be discussing ransomware, banking Trojans, phishing and all the crypto-crime that’s wreaking havoc on IT pros.
Jon Howell, Aruba Smart Office and Location Based Solutions, EMEARecorded: Dec 4 201846 mins
The Digital Workplace is quickly becoming a critical initiative for today’s modern enterprise. To keep pace IT and business leaders must not only stay ahead of the competition but must now reassess how their greatest assets - their employees, work and collaborate.
Watch our OnDemand webinar and discover how smart, modern workspaces can bridge the physical and digital environment with actionable intelligence to further improve team productivity and effectiveness while boosting resource efficiency, productivity and reducing costs.
- Overview of current trends in the workspace
- Challenges faced by employers and employees
- Aruba Intelligent Edge solutions
- Analytics and how to improve workspace utilisation
Pagalavan Karunanidhi, Aruba TAC TeamRecorded: Nov 30 2018168 mins
During this webinar, we will cover AppRF - a suite of application visibility and control features that are part of Aruba's Policy Enforcement Firewall. AppRF is a PEF feature that is designed to give network administrators insight into the applications that are running on their network, and who is using them.
Rob Arnold, Industry Principal, Connected Work, Frost & SullivanRecorded: Nov 29 201843 mins
Is your workforce built for disruption and a rapidly ever-changing future of work?
Policies, demographics, technologies, economics, environmental sustainability, and social movements are shifting how people work and how employers are managing their workers. As many jobs face the prospect of automation, workers and employers need to collaborate to create a modern workplace that supports the growing knowledge economy.
• Learn which office technologies are supplanting the massive installed base of legacy equipment in the workplace.
• Discover the devices and applications that will support the workplace of the future.
• Understand the role that collaboration and wearable technologies play in making workers happier and more satisfied.
Patrick LaPorte - Aruba NetworksRecorded: Nov 29 201848 mins
86% of midsize companies agree that digital technologies are disrupting their industry. Your network has never been more critical. It is the onramp to your cloud applications. It is the way your mobile users connect, work and collaborate. And it is what enables amazing, memorable customer experiences. Choosing the right network solution has never been more important.
Join us November 29th, 10am PST to learn about the latest trends and the Top 5 things your business network can’t live without.
Attend and you may qualify for a free Instant Access Point
The aging architecture of wireless controllers can no longer meet the pace of technology innovation. With the growing number of smart phones and connected devices, your organization needs a network built on an elastic, cloud-based microservices architecture that leverages AI to automate operations and eliminate manual troubleshooting.
Join this webinar to learn how to set your wireless free from monolithic controllers, saving you time and money as you shift your network operations to the cloud and leverage machine learning. We'll explore:
- Trends driving the need for change
- Challenges faced by the 15-year-old controller architecture
- Benefits of a modern cloud architecture using microservices
- What to look for when evaluating cloud solutions
Raffael Marty, VP Research & Intelligence, and Carl Leonard, Principal Security AnalystRecorded: Nov 29 201849 mins
Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your enterprise and the primary source of security breaches driving cyber risk to all-time highs.
In 2019, attackers will stop at nothing to steal our identities, evade detection through new techniques, and bring disruption to our doorsteps. The stakes are high, the world more connected than we could have ever imagined.
Join our webcast now, where we’ll examine topics such as:
- How attacks on industrial IoT could lead to widespread power outages
- When credential theft moves to cloning your face to bypass biometric authentication
- What happens in a world incentivized to commit intellectual property theft at scale
Join Forcepoint's Raffael Marty, VP Research & Intelligence, and Carl Leonard, Principal Security Analyst, for a webcast discussing the most pressing cybersecurity issues – and what you can do to protect against them.
Dan Slattery, Sr. Information Security Analyst, WebrootRecorded: Nov 29 201821 mins
Small and medium-sized businesses and the MSPs who serve them are major targets for cybercriminals. To stay safe, today’s businesses and MSPs must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.
Register for this 30-minute webinar on the key threats businesses will face this year to get details and tips that will help you keep your business and clients safe.
Some of the topics Dan Slattery, Sr. Information Security Analyst, Webroot will cover:
• Ransomware, banking Trojans, and phishing
• Cryptomining, cryptojacking, and other crypto-crime
• Best practices for keeping businesses safe.
Gerri Hinkel, Sr. Marketing Manager for Primary EducationRecorded: Nov 28 201861 mins
With so many users and devices on the network at any given time, universities and colleges struggle to keep up with the demand for always-on connectivity. What can you do to optimize your network infrastructure to tackle these challenges?
Join our networking experts for a webinar that will discuss how Aruba solutions:
* Provide always-on connectivity with features including RF optimization and controller hitless failover
* Secure the network and identify risk with IoT devices pre-authentication and user and entity behaviour analytics (UEBA)
* Provide deeper and predictive network insights
* Address campus wired pain points with a unified wired AND wireless solution
Michael Dickman, VP of Global PLM Campus Networking
Peter Lane, Aruba WLAN PLM
Danny Jump, Aruba ClearPass PLM
Dan Comfort, Aruba Cloud PLM
Chris Marsh of 451 Research & Matt Crawford of CitrixRecorded: Nov 28 201855 mins
The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.
Topics discussed will include:
* Current sources of friction that hamper productivity
* Barriers to collaboration and execution
* The importance of context and automation in enabling workers
* Tips for selecting technologies that map to the new workforce
Steve Brumer- Partner at 151 Advisors and Steve Wimsatt - Senior Director, Alliances and Business Development Ruckus NetworkRecorded: Nov 26 201860 mins
Problems faced by IoT and smart city opportunities are knowing how all the moving pieces work together to obtain a real ROI! Join Steve Brumer, Partner at 151 Advisors and Steve Wimsatt, Senior Director, Alliances and Business Development Ruckus Networks, a unit of ARRIS for a 45-minute open discussion on IoT in Smart Cities, the real-world applications and uses cases across the globe and how to make money!
Topics will include:
- Real World Applications & Uses Cases
-Where is the money in supplying products and services and the commercialization aspects of them!
- What is the true meaning of ROI in the Smart Cities and Smart Buildings space?
Key takeaways will focus on where should you focus your time, energy and efforts within this space and how to drive revenue.
Vishal Ganeriwala, Senior Director, Product Marketing, Citrix WorkspaceRecorded: Nov 23 201838 mins
Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?
Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.
You’ll learn how to:
• Simplify your systems and ongoing management with a cloud-based approach
• Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
• Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, CitrixRecorded: Nov 23 201846 mins
Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.
Learn the benefits of advanced analytics, including:
• Building a digital fingerprint for individual users that lets you know when they are doing something unusual
• Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
• Creating custom rules with conditions and actions to remediate problems
• Halting ransomware and data loss prevention (DLP)
* Verizon Data Breach Investigations Report (DBIR) 2017
Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, CitrixRecorded: Nov 23 201843 mins
Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.
Learn how Citrix networking solutions for hybrid cloud can deliver:
• Contextual and secure access to applications
• Website and application protection from internal and external threats
• Application and network visibility and intelligent analytics
• Flexibility and performance
Mark Coffey, SVP of Strategic Partnerships, GasBuddyDec 12 20185:00 pmUTC60 mins
While companies have been ditching traditional marketing methods in their race to capture the online-savvy millennials, no one is on their phone 24/7, and delivering brand messages out in the world is still vital to capturing mindshare.
Those first-gen marketing methods, including outdoor, tv, direct mail, and more, are still valuable and essential to building a stronger bottom line, especially when integrated as a vital part of an overarching marketing campaign, firing on all cylinders. That’s easier than ever, because traditional doesn’t mean old-school and analog anymore, and innovations in marketing technology don’t only apply to your online channels. You can apply your martech capabilities not just for tracking, measurement, and attribution, but to keep tabs on omnichannel competitor strategies, design the most effective campaign copy in every arena, create the most impactful rollouts between all your channels and more.
To find out how to integrate offline marketing channels with your online efforts, how marketing technology can bring those traditional methods into the twenty-first century, and more, don’t miss this VB Live event!
Registration is free.
Attend this webinar and learn:
* How to use martech to digitize offline channels
* How to integrate traditional marketing efforts into their newer tech-driven marketing stack
* The importance of combining online and offline marketing
* How to track offline conversions
* Evan Jones, CMO, Fender
* Mark Coffey, SVP of Strategic Partnerships, GasBuddy
* Myllisa Patterson, Senior Director, Event Cloud Marketing, Cvent
* Shannon Ryan, Head of Marketing, CI&T
* Rachael Brownell, Moderator, VentureBeat
Alan Wendt, Micro FocusDec 12 20186:00 pmUTC60 mins
DevOps and Enterprise Agile frameworks are key enablers of Digital Transformations at the operating level of organizations, but to achieve true agility across the enterprise, these principles must become the norm in all business areas. Some of the most critical connection functions in the organization are Portfolio Management, Program Management, and Project Delivery. This presentation will offer three best practices for Agile Project and Portfolio management to help your organization succeed in this transformational era.
Join us to hear more about:
• How lean thinking helps to meet changing business demands and speed up the decision-making
• The limitations of annual-only portfolio planning cycles
• The incredible power of aligning the work to the organization’s intended outcomes
Mark Elwood, Marketing Director, TeleWareDec 13 201810:00 amUTC50 mins
By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.
Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:
• Understanding the needs of the millennial worker
• The key steps to providing the right technology within your digital transformation programme
• Why mobility and flexible working is the key to hiring and retaining a millennial workforce
• Demonstrating the proven link between mobility and productivity
This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
Andras Cser, Vice President and Principal Analyst, ForresterDec 13 20185:00 pmUTC20 mins
For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.
In this session, Forrester Vice President and Principal Analyst Andras Cser will share how to prioritize security and compliance efforts. Specific topics include:
- How your auditors are behaving
- Why risk-based prioritization is the only way to find threats
- The importance of context
- Forrester’s recommendations and best practices
Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
Doug Landoll, CEO, LantegoDec 13 20185:30 pmUTC35 mins
Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.
In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:
- How to define cybersecurity success
- Common approaches that fall short
- Risk-based cybersecurity strategy planning
Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
Did you know that over 50% of issues with network experience can be attributed to lack of pre-installation planning? There is a lot to consider, but the effort you put in up front saves time, money, and frustration over the life of your network. Join us as Cherie Martin, Network Solutions Manager, reviews the 9critical steps you should take to ensure your network is smart and reliable.
Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
Mike Osterman, CEO, Osterman ResearchDec 13 20186:15 pmUTC38 mins
CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.
In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:
-Key cloud adoption concerns
-Most valued CASB features
-Levels of confidence in controlling data and maintaining compliance
Attend this session to learn more about the need for and use of CASBs in today’s organizations.
Mike Osterman, CEO, Osterman ResearchDec 13 20187:00 pmUTC46 mins
CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.
In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:
- Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
- Provide a detailed analysis of how both products compare over 13 key feature areas
- Consider coverage of third-party apps beyond Office 365
Attend this session to explore the best route to full Office 365 security.
Jim Fulton, Director Product Marketing, ForcepointDec 13 20188:00 pmUTC60 mins
Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps.
In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security solution enables highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor.
Im Webinar am 17. Dezember dreht sich alles um das Thema Data Protector 10.20: Das interne Reporting wurde in Data Protector 10.20 weiter ausgebaut. Desweiteren erhalten Sie einen Einblick in alle neuen Features der Version 10.20 von Data Protector.
Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.
Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
Sudheer Matta, VP of Product, MistDec 19 20185:00 pmUTC56 mins
There's a lot of buzz around Artificial Intelligence and how it can help IT operations. There's also a lot of confusion.
Watch this on-demand AI:rchitect series webinar where we'll cut through the AI noise. In this interactive session, we'll cover:
- The need for AI-driven IT
- The difference between AI, machine learning, deep learning, data science, and other common techniques
- Ways to implement data science in your Wi-Fi network
- How to prepare yourself (and your IT team) for the transition to AI-driven IT
Kelvin Murray, Sr. Threat Research Analyst, WebrootJan 15 201910:00 amUTC60 mins
The Threat landscape has seen a rise of Cryptojacking, evolution of scams and malware such as Emotet and other cybersecurity issues such as Trickbot and Ransomware that have affected businesses in 2018.
Join this 30-minute webinar where our Threat Expert will walk you through Webroot's Threat predictions for 2019, so MSPs and SMBs can stay ahead of attacks and keep your clients and businesses safe.
Some of the topics that will be covered:
- AI Disruption
- US adoption of similar GDPR legislation
- Cryptojacking will keep rising while ransomware will decline
Seventy percent of today's Midsize businesses are investing in technology to customize the user experience, improve customer satisfaction, build loyalty, and gain a competitive advantage. But the ability to deliver amazing user experiences is dependent on high-performance, reliable connectivity. It requires a business-class network.
Join us on 16th January, as we showcase the Top 5 business-class features your network must have for you to automate and optimize the delivery of network services to drive your business success.
A high-level discussion will be followed by a demo of Aruba Central, network management in the Cloud.
Ravin Sanjith, Intelligent Authentication, Opus Research; Alexey Khitrov, IDRnDJan 17 20196:00 pmUTC45 mins
With access to mountains of data — scoured, analyzed, and made actionable thanks to Artificial Intelligence, machine learning, and neural networking — enterprise organizations are staking their claim on seamless, context-aware customer interactions as a business differentiator. Altogether these technologies help deliver on the promise of secure, personalized digital self-service and can have a demonstrable impact on an enterprise’s bottom line.
Indeed “zero-effort authentication” enables intelligent automation, reduced customer effort (no more PINs and passwords), reduced call handling time, and improved confidence in security. Enterprises are building zero-effort authentication strategies for maximum return on investment and increased customer loyalty.
In an upcoming webinar, Ravin Sanjith (Intelligent Authentication, Opus Research) and Alexey Khritov (CEO, IDRnD) will discuss how voice biometrics, combined with AI techniques, sensors and increased processing power, can provide a virtuous cycle for greater convenience and less effort to validate a consumer’s identity in mobile apps, on messaging platforms, and beyond.
Val Huber, Consulting Software Engineer, Security and API ManagementJan 23 20195:00 pmUTC75 mins
Part 1 of a series. Is it true that API implementation can be declarative? Is it real that this declarative implementation looks like executable business requirements? Come, find for yourself – in this session on - CA Live API Creator’s Declarative Rules which are spreadsheet-like expressions that react to changes in referenced data to enfore business policy. The simplicity of declaring these expressions for data integrity and data integration, underlies the speed and agility rendered by CA Live API Creator (LAC) in any API definition/implementation process. Touch and feel LAC’s declarative rules via plenty of practical examples and use cases implemented in this session.
Val Huber, Consulting Software Engineer, Security and API ManagementJan 30 20195:00 pmUTC75 mins
Part 2 of a series. Is it true that API implementation can be declarative? Is it real that this declarative implementation looks like executable business requirements? Come, find for yourself – in this session on - CA Live API Creator’s Declarative Rules which are spreadsheet-like expressions that react to changes in referenced data to enfore business policy. The simplicity of declaring these expressions for data integrity and data integration, underlies the speed and agility rendered by CA Live API Creator (LAC) in any API definition/implementation process. Touch and feel LAC’s declarative rules via plenty of practical examples and use cases implemented in this session.
Richard Leadbetter, Security Technical Specialist, EMEAFeb 6 201910:30 amUTC60 mins
86% of midsize companies agree that digital technologies are disrupting their industry. Your network has never been more critical. It is the on-ramp to your cloud applications. It is the way your mobile users connect, work and collaborate. And it is what enables amazing, memorable customer experiences.
Choosing the right network solution has never been more important.
Join us on 6th February to learn about the latest trends and the Top 5 things your business network can't live without.
Tony Vizza, CISSP , Director of Cyber Security Advocacy, APAC and Hazel Hung, Customer Services Manager, APACFeb 12 20196:00 amUTC60 mins
As an (ISC)² Member, you now have access to a wide range of global resources, educational tools, peer networking opportunities, as well as exclusive discounts to industry events. discounts. There is so much more to discover to what your (ISC)² membership brings!
In this webinar, you will learn about:
- The latest news and developments across APAC and (ISC)² from around the world.
- Exciting and upcoming CPE opportunities to help you stay sharp
- Member benefits and perks including fantastic discounts on a range day to day items
- New, upcoming and FREE professionally developed education courses just for members.
- An update on (ISC)² certifications to help you take your career to the next level.
- Networking opportunity with like-minded professionals locally and globally via ((ISC)² chapters
- An opportunity to ask questions in our Q&A session
Join us on Feb 12, 2019 (Tue) at 14:00 (GMT +8) to get the most of your (ISC)² membership globally and locally.
Kevin Crehan, Aruba - Lead Technologist, EMEAFeb 27 201910:30 amUTC60 mins
Workplaces are transforming - from cubes and square footage, to any location, any time, with mobile devices running a mass array of applications. That's why it's crucial to choose access points and network management tools that deliver the best-connected guest and employee experience and can be deployed and managed with minimal IT resources.
Join us on 27 February, for our "Bring Your Business Up-to-Speed with Smarter, Better Wi-Fi" webinar and get a chance to experience intelligent cloud networking for yourself.
Learn how to:
•Scale your network to grow with your users and location needs
•Flexibly manage your network the way you want to (Demo)
•Detect user-level activity to better prioritize applications and optimize your network.
Whether you’re expanding a network to support new initiatives, navigating through growing security challenges, or planning a refresh of older technology; keeping costs down and saving time for your IT Team is key.
Join our webinar and learn how Aruba delivers the industry’s most robust and reliable networking solutions for small and midsize businesses - help reduce planning, deployment and operational costs with features such as:
•Integrated User Analytics
•Scheduled and On-Demand Reporting
•Automated Firmware Updates
•All from a single interface