Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • 802.11ax or 802.11ac: Which is Right for Your Business?
    802.11ax or 802.11ac: Which is Right for Your Business?
    Cherie Martin, Sr. Solutions Marketing Manager - Aruba Recorded: Nov 15 2018 48 mins
    The industry is buzzing about the soon-to-be released 802.11ax Wi-Fi standard that will greatly increase wireless speed and optimize client battery life. Are you ready to take your network to the next level? Join us as Aruba’s Cherie Martin, Sr. Solutions Marketing Manager, shares the top three things you need to consider in deciding which technology to choose to give your business, employees, and guests, simple, business-class networking without sacrifice
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Mike Cooper, Sr. Security Engineer Recorded: Nov 14 2018 24 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • Trust and responsibility throughout your software distribution chain
    Trust and responsibility throughout your software distribution chain
    Juan Asenjo, Senior Manager for Solutions Marketing, Thales eSecurity & Tomas Gustavsson CTO, PrimeKey Recorded: Nov 14 2018 56 mins
    Harmful code is today a real threat to users and organizations alike. Criminal groups and even governments increasingly use malicious software to steal, manipulate, and monitor data, to export money, or empty bank accounts. An efficient way to prevent this, to protect your intellectual property, and brand equity is through code signing. That is why the solution today has the attention of the business owner and developer community worldwide. However, code signing requires not only signing keys to be robust, but also to be stored securely. With the use of a hardware security module (HSM), you can manage the risk of having critical code signing keys stolen and your security compromised. In this webinar, PrimeKey a leading provider of PKI and signing solutions, together with Thales eSecurity, a leader in HSM technology, will take you through the world of safe code through proper code signing.

    Join this webinar to learn how to:

    • Achieve trusted and secure software distribution using PKI and HSMs
    • Take advantages of server-side signing with central key management
    • Support multiple code signing needs, drivers, firmware, and formats
    (Microsoft, JAR, P#1, P#7, CMS etc.), in one single installation
    • Integrate with existing build and distribution processes for automation
    • Deploy best practices for code signing solutions and improve security
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Recorded: Nov 14 2018 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Ecommerce, ML and Recommendation Engines: Why The Database Matters
    Ecommerce, ML and Recommendation Engines: Why The Database Matters
    Sucharita Kodali, Vice President & Principal Analyst, Forrester and Bharath Yadla, VP Product Strategy, Aerospike Recorded: Nov 13 2018 60 mins
    Online shoppers expect the right product at the right price at the right time. While this is a simple concept, the applications supporting these goals are extremely complex. An online retailer’s inventory, pricing and marketing management system must deliver real-time updates and associated recalculations within milliseconds in order to serve millions of dynamically-generated pages per second.

    The problem is exacerbated as an e-commerce business scales. Most databases cannot handle the inventory updates, price adjustments and personalized recommendations in real-time as early successes deliver a significant increase in demand. This degrades the customer experience just as word of mouth starts to take hold.

    In this webinar, Matt Bushell, Director of Product Marketing - Aerospike, and guest speaker, Sucharita Kodali, Vice President and Principal Analyst - Forrester Research, will cover:
    > The latest technology trends affecting the Retail/Ecommerce space
    > Where and how Machine Learning can be deployed
    > How one larger retailer is managing its dynamic growth and needs with a real-time database
  • How to turn customer experience into customer trust
    How to turn customer experience into customer trust
    Louise Thorpe, Chief Privacy Officer, American Express Recorded: Nov 13 2018 62 mins
    Forrester found that only 11 percent of companies are able to deliver a customer experience (CX) that sets them apart from their competition. Without a CX that elevates the brand, companies are at risk of being left behind while customers choose to spend their purchase dollars or business investments elsewhere.

    There are four key ways to ensure that your CX is flawless and your market share keeps growing. It starts from the inside out, with a unified vision of CX; a strategy to solve problems fast while offering self-help; continuous, ongoing iteration and improvement of best practices, and a consistent, personalized experience in every way.

    To learn more about why CX has to be the core of your company and how to launch the strategy that ensures your company maintains competitive advantage, don’t miss this VB Live event!

    Register here for free.

    Webinar attendees will learn:
    * How to build trust with increasingly savvy consumers
    * Why brand reputation is your most important calling card -- and how to protect it
    * The key qualities customers look for in a trusted brand
    * The secrets of the modern customer-focused organization

    Speakers:
    * Louise Thorpe, Chief Privacy Officer, American Express
    * Andrew Leede, Product Owner, Blinker
    * Ting Ting Luo, Senior Product Marketing Manager, Docusign
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Docusign
  • Re:Call from TeleWare at Microsoft Future Decoded 2018
    Re:Call from TeleWare at Microsoft Future Decoded 2018
    Mark Elwood - Marketing Director, TeleWare Recorded: Nov 12 2018 2 mins
    Check out our highlights video from Future Decoded 2018 to see what we got up to (you might have even made the final cut!).
  • Data Protector zum Wochenstart: Neuigkeiten zu DP und Backup Navigator
    Data Protector zum Wochenstart: Neuigkeiten zu DP und Backup Navigator
    Sprecher ist ein Technical Consultant mit Spezialisierung auf Data Protection Recorded: Nov 12 2018 70 mins
    In den Webinaren „Data Protector zum Wochenstart“ wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
  • Cybersecurity for the Modern Era - join us on the 20th November
    Cybersecurity for the Modern Era - join us on the 20th November
    Proofpoint Recorded: Nov 9 2018 1 min
    In today's ever evolving threat landscape, the attackers are increasingly targeting people rather than technology.

    For CISOs and security professionals, the top priority is to strike the perfect balance between technology and employee empowerment. You need to build defences that start with and work for your organisation's most important asset - your people!

    Join us on the 20th November, live from the studio with our line up of industry experts, part of our Hacking Human Nature Summit to hear how they are building people centric strategies. Links in the attachments.
  • Hacking Human Nature - Proofpoint Summit 20th-21st November 2018
    Hacking Human Nature - Proofpoint Summit 20th-21st November 2018
    Proofpoint Recorded: Nov 9 2018 1 min
    Who's being attacked, how they're attacked and how to protect them. Join our summit on the 20th - 21st November to find out more. Links in the attachments.

    The threat landscape has fundamentally changed. Cyber criminals now target humans, not infrastructure. 90% of targeted cyber-attacks start with email. Proofpoint provides solutions to protect, defend and respond to malware, phishing and email fraud- helping you safeguard your greatest asset - your people.
  • Webroot Formazione sulla Sicurezza Demo Webinar (in Italiano)
    Webroot Formazione sulla Sicurezza Demo Webinar (in Italiano)
    Claudio Tosi, Sales Engineer, Webroot Recorded: Nov 8 2018 43 mins
    Webroot Formazione sulla Sicurezza Demo Webinar (in Italiano)
  • Webroot Protezione DNS Demo Webinar (in Italiano)
    Webroot Protezione DNS Demo Webinar (in Italiano)
    Claudio Tosi, Sales Engineer, Webroot Recorded: Nov 8 2018 45 mins
    Webroot Protezione DNS Demo Webinar (in Italiano)
  • Embracing the Data Revolution - What to Expect at Big Data LDN 2018
    Embracing the Data Revolution - What to Expect at Big Data LDN 2018
    Richard Corderoy, Oakland Data & Analytics | Andy Mott, Arcadia Data Recorded: Nov 8 2018 60 mins
    With just a few weeks to the UK's largest data & analytics event, we've gathered some of the elite speakers who will be taking the stage to debate the latest trends, hottest solutions and the biggest opportunities (and challenges) for businesses in a data-driven world.

    * Fast Data & DataOps
    * Self-Service Analytics
    * Artificial Intelligence
    * Customer Experience
    * Data Governance

    What will they be talking about at The Olympia, London, on the 13-14 November 2018, what do they want to hear about, what are they looking forward to?

    Join this panel discussion and arm yourself for excellence in this brave new data-driven world.

    Richard Corderoy, Chief Data Officer, Oakland Data and Analytics
    Andy Mott, Senior Consultant, Arcadia Data
  • Webroot Protezione Endpoint Demo Webinar (in Italiano)
    Webroot Protezione Endpoint Demo Webinar (in Italiano)
    Claudio Tosi, Sales Engineer, Webroot Recorded: Nov 8 2018 51 mins
    Webroot Protezione Endpoint Demo Webinar (in Italiano)
  • Why Security, Development, and Quality need to be part of the same conversation
    Why Security, Development, and Quality need to be part of the same conversation
    Bryan Cole, Micro Focus Recorded: Nov 7 2018 46 mins
    Driving greater velocity and agility in the delivery process is critical today. As you move code from Dev into Ops, you need to ensure that the code is not only functionally complete, but also is secure and performs as expected. With the automation of delivery, you also need to understand how the current state of Ops is relevant for the work done in Dev. Rapid and error-free delivery of features that are secure is now an expectation. Attend this webinar and learn how you can ensure security while delivering quality applications with greater velocity.

    Join us and hear about:
    • Best practices for continuous quality in the delivery pipeline
    • Why security must be part of the conversation from the start
    • The importance of collaboration across all teams
    • How Micro Focus can help you ensure security and quality across the disparate components of the delivery pipeline
  • Stop the Nightmare IT War Room
    Stop the Nightmare IT War Room
    Nancy Gohring, Senior Analyst, at 451 Research, Ryan Perkowski, Sr. Director Product Management, Virtual Instruments Recorded: Nov 7 2018 60 mins
    Today's demand for high-speed everything brings potential unforeseen challenges to your infrastructure environments. A single rogue failure or a noisy neighbor can result in a loss in customer satisfaction or confidence. Plus, when your virtualized applications delivery infrastructure are siloed, small problems can turn into big situations. This all quickly leads to the all too familiar IT war room scenarios.

    Does your enterprise experience application outages and/or application slowdowns? For those who have experienced these problems, you also have experienced the IT war room, which conjures memories of extreme inefficiencies - from tedious conference calls, to blame storms, with each person ready to be the first to prove their innocence, rather than contribute to solving the problem at hand. How did we get here?

    Join 451 Research and Virtual Instruments as we discuss:

    - Technology trends that led to the nightmare war room scenario
    - Siloed monitoring tools and organizational models that exacerbate the problem
    - Options for improving – or even eliminating – the war room
    - Benefits you can expect to realize by solving inefficient war rooms
  • ALM JIRA & Beyond:  Reporting Across Teams and Tools through Synchronization
    ALM JIRA & Beyond: Reporting Across Teams and Tools through Synchronization
    Tina Dankwart Recorded: Nov 7 2018 29 mins
    This webinar is brought to you by the Vivit Software Lifecycle Integration Special Interest Group (SIG).

    Anyone who has ever attempted to enforce alignment across many domains/projects/teams in order to allow for global reporting will be well aware of its drawbacks and problems.

    The list of issues includes:

    •Changing processes and tools
    •Having to retrain a large number of people
    •Delays and disruption
    •Resistance from the users and leads who are busy trying to get on with their day-to-day work

    In this webinar, we will explore another way of achieving global reporting across different domains by well thought through synchronization.

    •Real time reporting with virtually no lead-times
    •Teams can keep their own customizations, definitions and processes with no need for change
    •No input and hence no time required from team leads/end users
    •No disruption, no delays
    •No expensive re-training, restructuring, systems changes
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Recorded: Nov 7 2018 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • Can you deliver the personalization your customers demand?
    Can you deliver the personalization your customers demand?
    David Hardtke, Director of Advertising Science, Pandora Recorded: Nov 6 2018 61 mins
    More and more, savvy customers are willing to share info about themselves and their browsing behavior — but in return, you have to use those powers for good. Or in other words, start serving them up completely personalized web and mobile ads that reflects their tastes, values, and preferences in every (not-creepy) way. It’s the key to delivering the kind of goods and services that keep your customers clicking — and more than happy to keep handing over their personal information.

    It’s also hard to pull off. To learn how companies like Pandora flawlessly serve up the customized advertising that clicks, don’t miss this VB Live event!

    Register here for free.

    Attend this webinar and learn about:
    * How to offer your customers content that connects to their lifestyle and tastes
    * The intersection between art and science in the new world of hyper-personalized advertising
    * How to create customized content that connects without creeping out customers
    * Best practices companies like Pandora and Trulia use to create authenticity and bring in more revenue.

    Speakers:
    * David Hardtke, Director of Advertising Science, Pandora
    * Deep Varma, VP of Engineering Trulia
    * Moira Dorsey, Founder, Dorsey Experience
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Cvent
  • [Ep.23] Founders Spotlight: Bob Crews, Checkpoint Technologies
    [Ep.23] Founders Spotlight: Bob Crews, Checkpoint Technologies
    Bob Crews, Checkpoint Technologies and Kelly Harris, BrightTALK Recorded: Nov 6 2018 44 mins
    This webinar is part of BrightTALK's Founders Spotlight Series.

    Join Kelly Harris, Senior Content Manager at BrightTALK and Bob Crews, Co-Founder and CEO of Checkpoint Technologies, as they discuss the ins and outs of founding a tech company.

    Topics include:

    - Juggling the challenges of being a practitioner, sales rep, marketer and CEO simultaneously
    - What to look for in a great vendor partnership
    - Application security validation, its trends, and what to look out for
  • Secure Data Gathering and Analytics: PKI Solutions with Hardware Root of Trust
    Secure Data Gathering and Analytics: PKI Solutions with Hardware Root of Trust
    Juan Asenjo, Sr. Mgr. for Solutions Mktg, Thales eSecurity & Julie Lassabliere, Digital Mktg and Communication PM, Safelayer Recorded: Nov 6 2018 59 mins
    Organizations today gather unprecedented amounts of data from their operations to create new opportunities and to customized marketing, business, and services for their users and customers. Every transactions and exchange within the enterprise is creating more data that when analyzed, can produce valuable insight. Whether the data comes from a person or from a connected device such as a sensor, data collected is becoming essential for decision-making. Therefore, protecting the integrity of connected devices collecting this data is critical to ensure the trustworthiness of the system. Public key infrastructures (PKIs) provide the framework to secure the identity of devices to ensure integrity and confidentiality of data collected and exchanged. Using asymmetric cryptography, PKIs sign all certificates used to identify devices collecting data. Protecting the signing keys used for this purpose is essential to ensure a root of trust. In this webinar, we will examine how PKI-based solution provide a mechanism for secure identification, so you can trust your devices and the data they collect. The session will explain how hardware security modules (HSMs) help establish a root of trust, and provide examples and use cases.

    Join the webinar to learn how you can use connected devices with a PKI and an HSM to:

    • Improve your data gathering capabilities
    • Protect the integrity of your critical data
    • Defend organization from data breaches
    • Secure all analytics and decision making
  • Real World IoT Podcast | Ep. 23 | ft. WaterBit | Precision Agriculture & Water M
    Real World IoT Podcast | Ep. 23 | ft. WaterBit | Precision Agriculture & Water M
    151 Advisors | Manu Pillai | Ken Briodagh Recorded: Nov 2 2018 41 mins
    On this week’s episode of Real World IoT, host Ken Briodagh discusses water conservation through IoT with Co-Founder and President of Waterbit, Manu Pillai.
  • Web Apps vs Native Apps - Will Progressive Web Apps Dominate in 2019?
    Web Apps vs Native Apps - Will Progressive Web Apps Dominate in 2019?
    Michael Facemire, Alex Cobb, & Ed Gross Recorded: Nov 1 2018 64 mins
    Don’t miss this webinar with guest speakers Michael Facemire, VP, and Principal Analyst from Forrester and Alex Cobb, CTO from Vestis, as they join the Kony team to discuss a hotly debated topic in the industry - Web Apps vs Native Apps.

    Up until recently, the pros and cons behind building native mobile apps versus mobile web apps were well understood. But the rapid evolution and adoption of Progressive Web Apps (PWAs) is leading many to believe the need for building native mobile apps is diminishing. The state of digital technology is at an inflection point, with wide implications for the future of your next app development project.

    Join us to learn:
    •Is the debate around mobile still mobile web app vs. native app, or are there new options that change this dynamic?
    •If you already have a native mobile app, should you get rid of it to build something new?
    •What is a Progressive Web App, what makes it different than existing web assets, and different than the apps we’ve currently built, and what tools do we need to build them?
    •Key considerations for selecting the right app development strategy based on specific needs
    •How do hybrid app technologies like Cordova / PhoneGap fit in the picture in the future?
  • Making the shift to unified endpoint management for workforce agility
    Making the shift to unified endpoint management for workforce agility
    Suzanne Dickson, Senior Director, Product Marketing, Citrix and Frank Srp, Senior Manager, Technical Marketing, Citrix Recorded: Nov 1 2018 63 mins
    Increasingly, more companies have recognized that unified endpoint management (UEM) is a critical component of their overall digital transformation as UEM allows for greater workforce agility.

    By managing all your users, devices, apps, and data from a single platform, Citrix helps you maximize user and IT productivity while helping to secure your information and reduce costs.

    In this webinar, you will learn how to:
    - Modernize Windows 10 management
    - Manage Windows 7, Windows 10, iOS, Android, ChromeOS, macOS and iOT endpoints from a single platform
    - Simplify and improve users’ onboarding experience
    - Provide users a consistent, secure approach to access all their apps (virtual, mobile, web, SaaS, native Windows) and data regardless of the device, network or location
    Leverage user-centric analytics that correlates device, application, network and data access information to proactively prevent security threats


    Suzanne Dickson, Senior Director, Product Marketing, Citrix
    Frank Srp, Senior Manager, Technical Marketing, Citrix
  • LIVE PANEL: Cybersecurity for the Modern Era
    LIVE PANEL: Cybersecurity for the Modern Era
    Tom Berry, Adenike Cosgrove, Swati Lay, Naveen Vasudeva, Graham Edwards and Clive Room Nov 20 2018 10:00 am UTC 60 mins
    In today's ever evolving threat landscape, the attackers are increasingly targeting people rather than technology.

    For CISOs and security professionals, the top priority is to strike the perfect balance between technology and employee empowerment. You need to build defences that start with and work for your organisation's most important asset - your people!

    Join us and our line up of industry experts at this live panel discussion, part of our Hacking Human Nature Summit to hear how they are building people centric strategies.

    Line up:
    •Swati Lay, CISO, Funding Circle
    •Graham Edwards, Former Head of Group Security, Nationwide
    •Naveen Vasudeva, MD & Co-founder, CyberCorre
    •Clive Room, Chairman, White Hat Ball
    •Adenike Cosgrove, International Cybersecurity Strategist, Proofpoint

    Moderated by: Tom Berry, Advisory Board Member, ClubCISO
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure
    Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Nov 20 2018 11:00 am UTC 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • Back to Basics: Solving the Email Fraud Problem
    Back to Basics: Solving the Email Fraud Problem
    Robert Holmes, VP Email Security Products Nov 20 2018 11:30 am UTC 43 mins
    In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.

    Join this webinar to learn:
    - Findings from our latest Email Fraud study
    - Email Fraud trends from 2017 and threats to look out for in 2018
    - Helpful tips to protect your people, data and brand against Email Fraud
    - Live Q&A with the speakers
  • Live Demo: 360 Degrees of Email Fraud Defense
    Live Demo: 360 Degrees of Email Fraud Defense
    Neil Hammet Nov 20 2018 12:30 pm UTC 45 mins
    Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • Driving Behavioural Change Through Phishing Simulation and Security Training
    Driving Behavioural Change Through Phishing Simulation and Security Training
    Paul Down, Wombat Specialist Nov 20 2018 1:30 pm UTC 45 mins
    Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.

    Join us for this webinar where you will learn:

    * About the latest trends and tactics used by threat actors that target your organization
    * How to assess your users’ susceptibility to phishing attacks
    * To respond to threats through end-user training and reporting
  • Live Demo: Phishing Simulation and Security Awareness Training
    Live Demo: Phishing Simulation and Security Awareness Training
    Jen Gough, Sales Engineer, Proofpoint Nov 20 2018 3:00 pm UTC 45 mins
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!

    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.


    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Everything SMBs and MSPs Need to Know about Machine Learning
    Everything SMBs and MSPs Need to Know about Machine Learning
    George Anderson, Director of Product Marketing at Webroot Nov 20 2018 3:00 pm UTC 60 mins
    Recently, new and established security vendors have upped their use of the fancy-sounding term "machine learning". While the technology isn't new (Webroot won an innovation Edison Award for work in the field over 6 years ago in 2012), it has resurfaced as a marketing buzzword and created some confusion in the industry.

    We’d like to invite you to join Webroot director of product marketing George Anderson for a 30-minute webinar to learn how Machine Learning is used in cybersecurity and how Webroot has been applying it for more than 10 years to create actionable threat intelligence for stopping a wide range of threats.

    Topics include:

    • Understanding Machine Learning (ML)
    • How ML can stop zero-day and never-before-seen threats
    • The importance of contextual analysis and predictive analytics
    • Real-world results from the “new” ML technology
    • How ML Directly Benefits your Customers
  • Live Demo: Email Protection and Targeted Attack Protection
    Live Demo: Email Protection and Targeted Attack Protection
    Kiran Khokhar, Product Marketing Manager Nov 20 2018 4:00 pm UTC 45 mins
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information.This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Women In Cloud: The Shared Experience of Female Tech Entrepreneurship
    Women In Cloud: The Shared Experience of Female Tech Entrepreneurship
    Jacquie Touma, Chaitra Vedullapalli, Terri Stephan Nov 20 2018 8:00 pm UTC 60 mins
    We live in a truly amazing time. Technology is changing almost every aspect of our lives at breathtaking speed. Advances in medicine, education, communication, and productivity have increased life expectancy around the globe and lifted hundreds of millions of people out of poverty.

    The ability to connect to people and information instantly is so commonplace that many take it for granted and now, we’ve arrived at the beginning of an era of even more profound transformation, all centered on the cloud. We’re excited to bring more opportunities through cloud computing to address issues in healthcare, the environment, cybersecurity, and underserved communities. And we’ve seen the incredible good that can come from the cloud, but with it also come challenges. For women in technology, there are increased challenges in a cloud-based world.

    Women in Cloud initiative is designed to empower female tech entrepreneurs by providing Access, Acceleration, and Actions so women entrepreneurs can take Actions every day to achieve their business goals!

    In this webinar, we will share experiences and tips for female tech entrepreneurs in building their cloud B2B with enterprise companies in a simple and predictable way. This is going to be a panel discussion with great conversation with female tech entrepreneurs in driving customer traction.

    Also, learn how you can participate in the next cohort of women in cloud accelerator to build your business with enterprise brands!
  • Can 802.11ax help with density issues today?
    Can 802.11ax help with density issues today?
    Peter Thornycroft, Distinguished engineer in Aruba CTO group Nov 21 2018 10:00 am UTC 61 mins
    As more mobile and IoT devices, and bandwidth hungry apps, are increasingly straining Wi-Fi networks, it’s difficult to predict how your network responds.
    The new IEEE 802.11ax standard is designed to enhance throughput by 4X in dense environments and provide a more predictable experience.
    Join us for a deep dive session on technical ingredients of 802.11ax technology where we cover features such as OFDMA, MU-MIMO and Target Weight Time (TWT).
  • Cybersecurity Now: A Guide to Building a People-Centric Strategy
    Cybersecurity Now: A Guide to Building a People-Centric Strategy
    Ryan Kalemeber, SVP, Cybersecurity Strategy, Proofpoint Nov 21 2018 10:00 am UTC 62 mins
    Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

    You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

    Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

    o Prevent cyberattacks by stopping them before they start

    o Defend against email and cloud threats

    o Respond quickly to threats and limit the damage they could cause

    About the presenter:

    With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Nov 21 2018 11:00 am UTC 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks
    Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks
    Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst Nov 21 2018 11:30 am UTC 44 mins
    ‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    During the webinar, we’ll cover:
    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services to their benefit
    -- Live Q&A with the speakers
  • Four Months Into GDPR: Balancing Data Protection and Digital Transformation
    Four Months Into GDPR: Balancing Data Protection and Digital Transformation
    Markus Grueneberg, GDPR Evangelist, Proofpoint and Jonathan Lee, Product Manager, Digital Risk, Proofpoint Nov 21 2018 2:00 pm UTC 45 mins
    The internet has grown to more than 330 million unique domain names and three billion users. Digital transformation means that email, web, social and mobile have become essential channels of engagement for your business but they also increase your exposure to cyber threats, and escalate the level of digital risk.

    Your marketing team is connecting with your customers in so many ways—but do you have full visibility of these interactions? How should you safeguard your online brand and maintain GDPR compliance across this digital landscape?

    Join our webinar to hear Markus Grueneberg and Jonathan Lee share recommendations and best practices to defend your customers and your business within the digital channels that you operate in.
  • Demystify the cloud: Stay secure in Microsoft Office 365
    Demystify the cloud: Stay secure in Microsoft Office 365
    Edward Rowley, Sales Engineering Manager and Tim Ricketts, Principal Sales Engineer Nov 21 2018 3:00 pm UTC 38 mins
    Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
    While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

    Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

    --Threats: credential phishing, email fraud, targeted attacks etc
    -- Enabling secure digital transformation: people centric security at the heart of the transformation
    -- Solutions: regulatory compliance and tools to implement
  • Identifying and Protecting the Very Attacked Persons in Your Organisation
    Identifying and Protecting the Very Attacked Persons in Your Organisation
    Itir Clarke, Product Marketing Manager Nov 21 2018 4:00 pm UTC 30 mins
    The right credentials in the wrong hands is a dangerous, and very real, threat. Compromised accounts are becoming more problematic for organizations of all sizes as bad actors who use these tactics usually aim to fraud the company, its customers or partners.

    Join us for a discussion on the clever methods used to compromise accounts and the headaches that come from it, whether it be phishing or data theft, and the steps your organization can take to help mitigate the threat.

    Join this webinar to learn:

    • The damage compromised accounts cause, from stolen customer data, to wire fraud
    • Why bad actors choose to target people rather than infrastructure
    • What you can do to keep your accounts secure
  • Live Demo: Cloud Account Defense by Proofpoint
    Live Demo: Cloud Account Defense by Proofpoint
    Itir Clarke, Product Marketing Manager Nov 21 2018 5:00 pm UTC 45 mins
    Proofpoint Cloud Account Defense (PCAD), allows you to detect, investigate and defend against cybercriminals accessing your sensitive data and trusted accounts via Office 365.

    PCAD is fast and easy to deploy, and it secures Office 365 users on any network or device. This allows you to confidently drive your business forward and make the most of Office 365.

    Attackers use a variety of methods to compromise Office 365 accounts. And once they do, they can launch attacks inside and outside of your organization. This impacts your reputation and your finance. Our multi-faceted approach helps you detect account compromise and the activities that leverage stolen credentials.

    Join this webinar to see this powerful product, live in action!
  • Getting the Right Network Security for Your Business
    Getting the Right Network Security for Your Business
    Richard Leadbetter, Security Technical Specialist, EMEA Nov 22 2018 10:30 am UTC 60 mins
    With the arrival of digital workplaces comes added security threats.

    Your business will need integrated and automated security controls to help protect your data from malware and unauthorized users. Including wireless intrusion detection and prevention, your network can be safeguarded from wireless threats, rogue access points and clients.

    Join our webinar, ‘Getting the Right Network Security for Your Business’ to learn how Aruba, a trusted brand that provides next generation network solutions, helps keep your business applications and data safe.

    You'll also learn about:

    • The network security landscape
    • Aruba SMB solutions and their security benefits
    • Available additional resources
  • How To Create A Mobile-First People Strategy To Modernise Employment
    How To Create A Mobile-First People Strategy To Modernise Employment
    Mark Elwood Nov 22 2018 11:00 am UTC 45 mins
    Just 29% of UK employees work for firms that operate flexible working policies for all employees according to recent research commissioned by TeleWare.

    This highlights the stark differences in how firms are creating workforces who can work flexibly in an increasingly mobile environment. One thing is certain, tools that enable employees to work wherever and whenever they want to are here to stay, but how firms deploy them could be the difference between success or failure.

    Join us in the latest webinar in our mobility and productivity programme where we will share exclusive insight into mobile and flexible working practices.

    Join our panel of experts to find out:
    •The impact on businesses who fail to deliver changing flexible working expectations
    •The technological advancements that are helping firms operate flexibly
    •The benefits and the pitfalls of a more mobility enabled workforce
    •The barriers to successful adoption and how you can overcome them.

    Panellists:
    Steve Haworth, CEO, TeleWare
    Andrew Fawcett, Product Manager, TeleWare
  • Smart Cities: Real IoT Use Cases
    Smart Cities: Real IoT Use Cases
    Steve Brumer- Partner at 151 Advisors and Steve Wimsatt - Senior Director, Alliances and Business Development Ruckus Network Nov 26 2018 5:00 pm UTC 60 mins
    Problems faced by IoT and smart city opportunities are knowing how all the moving pieces work together to obtain a real ROI! Join Steve Brumer, Partner at 151 Advisors and Steve Wimsatt, Senior Director, Alliances and Business Development Ruckus Networks, a unit of ARRIS for a 45-minute open discussion on IoT in Smart Cities, the real-world applications and uses cases across the globe and how to make money!

    Topics will include:
    - Real World Applications & Uses Cases
    -Where is the money in supplying products and services and the commercialization aspects of them!
    - What is the true meaning of ROI in the Smart Cities and Smart Buildings space?

    Key takeaways will focus on where should you focus your time, energy and efforts within this space and how to drive revenue.
  • Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Chris Marsh of 451 Research & Matt Crawford of Citrix Nov 28 2018 1:00 pm UTC 55 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • Secure and Always-On Connectivity Changes the Game
    Secure and Always-On Connectivity Changes the Game
    Gerri Hinkel, Sr. Marketing Manager for Primary Education Nov 28 2018 2:00 pm UTC 61 mins
    With so many users and devices on the network at any given time, universities and colleges struggle to keep up with the demand for always-on connectivity. What can you do to optimize your network infrastructure to tackle these challenges?

    Join our networking experts for a webinar that will discuss how Aruba solutions:

    * Provide always-on connectivity with features including RF optimization and controller hitless failover
    * Secure the network and identify risk with IoT devices pre-authentication and user and entity behaviour analytics (UEBA)
    * Provide deeper and predictive network insights
    * Address campus wired pain points with a unified wired AND wireless solution

    Speakers
    Michael Dickman, VP of Global PLM Campus Networking
    Peter Lane, Aruba WLAN PLM
    Danny Jump, Aruba ClearPass PLM
    Dan Comfort, Aruba Cloud PLM
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Mike Cooper, Sr. Security Engineer Nov 28 2018 6:00 pm UTC 30 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • Modern Cyberattacks and How to Keep Businesses Safe
    Modern Cyberattacks and How to Keep Businesses Safe
    Dan Slattery, Sr. Information Security Analyst, Webroot Nov 29 2018 12:00 am UTC 45 mins
    Small and medium-sized businesses and the MSPs who serve them are major targets for cybercriminals. To stay safe, today’s businesses and MSPs must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses will face this year to get details and tips that will help you keep your business and clients safe.

    Some of the topics Dan Slattery, Sr. Information Security Analyst, Webroot will cover:

    • Ransomware, banking Trojans, and phishing
    • Cryptomining, cryptojacking, and other crypto-crime
    • Best practices for keeping businesses safe.
  • DigiCert Monthly Threat Briefing - November 2018
    DigiCert Monthly Threat Briefing - November 2018
    Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Nov 29 2018 4:00 pm UTC 60 mins
    Stay updated on November's threats within the SSL, TLS, PKI, IoT, encryption, identity and digital certificate space. From DigiCert.