Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.
With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.
Some of Citrix Workspace key advantages include:
• Higher user productivity and a better experience
• Stronger security which extends to the cloud
• joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario
Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
Leverage Threat Intelligence where it matters most.
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.
This month's theme: Insider and Privilege Misuse
Our Verizon Threat Research Advisory Center presenters will be:
• John Rudolph, Principal Consultant, Identity and Access Management
• Steve Atnip, Senior Analyst, Threat Intelligence
• David Kennedy, Managing Principal, Open Source Intelligence
• Laurance Dine, Managing Principal, Investigative Response – EMEA
For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:
In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?
The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?
Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.
Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.
Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
Moderator: Tony Vizza, CISSP Director, Cybersecurity Advocacy for APAC, (ISC)²
edgeSuite is a fully secure, system control plane that integrates your applications and data into SPoG (Single Pane of Glass) in a 4D solution. edgeSuite is unique in the marketplace because it incorporates the data within your environment, and the methods used to manage your business to create a single tool for both back-end and front-end solutions. When you are dealing with multiple data sets and multiple data sources, you are faced with the problem of complex navigation of different software solutions, and the inability to access them simultaneously in an efficient and effective way. Come to our webinar and learn how you can optimize your current Micro Focus investments. Seeing is believing!
What you will learn:
•How our ETV technology collects data for visualization and actionable response
•How our Click-to-Write-Back and Click-to-Navigate technologies streamline operations over your digital transformation suite
•How to create Role-Based views
•How a Single Pane of Glass solution is built
Your users are like fine wine or good cheese: They get better over time. Which is why user retention is essential. With a steady retention rate your revenue just compounds over time. And increasing retention by just 10 percent will boost your business value by more than 30 percent.
That’s where artificial intelligence comes in. AI marketing tools let you anticipate customer needs, create personalized campaigns that make them feel seen and heard, lock on to essential customer purchasing patterns, deliver highly relevant messaging, marketing, and offers when and where they want to see them, and more. And with the volume of customer data you have at your fingertips, you can identify what characteristics make up high-value customers, so you know exactly where to put your focus.
Learn how tapping into your oil well of data and harnessing it via marketing automation platforms powered by AI and machine learning can strengthen your bottom line when you join this VB Live event!
In this webinar you'll learn:
* Key engagement strategies using AI
* How to use AI to strengthen campaigns (including creative, messaging, segmentation and personalization)
* The role of time-based triggering in automation and monetization
* The evolving trends in marketing automation and omnichannel marketing
* Kara Dake, VP Growth & Partnerships, Clevertap
* Aditi Mohanty, Digital Marketing Manager, Vodafone
* Rachael Brownell, Moderator, VentureBeat
* Stewart Rogers, Analyst-at-Large, VentureBeat
Financial services customers want to interact with you securely, in multiple ways - whether through a mobile or enterprise app or on your customer portal. This short video briefly describes how to integrate secure message features and bring everything together for your customer.
Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.
Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.
This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:
• UEM and how it fits into a Digital Workspace
• Managing endpoints through Citrix UEM
• The future of Citrix UEM
Traditionally, apps, desktops, devices and data are all managed through different systems, which is complex and time-consuming. Unifying management as cloud services with a single control plane improves the delivery and management of the apps and data employees need. Citrix delivers a complete, secure digital workspace.
Join this webinar to learn more about how managing apps, desktops, devices and data with Citrix Workspace is:
• Fast: Deploy apps and desktops, or complete secure digital workspaces in hours, not weeks.
• Simple: Implement a fully-integrated portfolio via a single-management plane to simplify administration.
• Adaptable: Choose to deploy on any cloud or virtual infrastructure — or a hybrid of both.
• Secure: Keep all proprietary information for your apps, desktops and data under your control.
Innovative banking applications and comprehensive, instant insight into customer interactions are critical to competing in today’s disruptive competitive landscape. Not only do customer expectations continue to grow, but payment infrastructure evolution and compliance requirements mean access to highly contextual, real-time data is no longer a nice to have - it’s a must have.
Don’t miss this chance to hear from Richard Henderson at DataStax around how an operational data layer can meet the distributed, real-time, always available demands of the enterprise. Join live to hear real case examples of customers using DataStax Enterprise, the data management platform trusted by 9 out of the top 15 global banks.
Hyper-competition and digital-first initiatives are forcing organizations to reconsider how they do business. ‘Digital transformation’ has emerged to engage customers, improve efficiencies, and fend off threats from rivals. It’s driving the need to rethink application design that delivers information in context and automates tasks that must behave consistently across diverse mobile devices and all digital touchpoints. Common approaches include cloud-first and mobile-first strategies that accelerate the use of cloud services but also often forces an unwieldy redistribution of workloads across hybrid IT infrastructure.
APIs have emerged as integration enablers, and API management is now integral to IT and development discipline. But APIs are only part of a broader toolchain needed to deliver web and mobile apps. Emerging cloud-native app platforms for hybrid infrastructure represent the next-generation enabling technology needed by enterprises that seek transformative means to engage customers and craft new competitive advantages.
In this webinar Carl Lehmann, principal analyst at 451 Research and Sumit Sarkar, chief researcher at Progress will discuss the business and technical considerations for API management within a broader context of application strategies and hybrid IT integration by:
• Describing digital transformation and how it is used to create competitive advantage
• Identifying the critical technology enablers needed for execution
• Defining the role of APIs as accelerants to new ways of doing business
* Planning for rapid delivery of new application experiences in response to digital transformation
* Understanding backend requirements for web and mobile app delivery beyond API Management
AppDev, DevOps, integration and API development professionals alike will learn how to reconsider their development strategies and integration toolchains to become core enabling assets for digital transformation.
A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.
Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.
Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)² on Jun 27, 2018 (Wed) at 12:00 noon (Singapore Time) to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
During this presentation, you'll learn about deep learning, the history of artificial intelligence, the history of malware management, and the current approach to eliminating malware threats to the enterprise using AI.
Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.
Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:
--Threats: credential phishing, email fraud, targeted attacks etc
-- Enabling secure digital transformation: people centric security at the heart of the transformation
-- Solutions: regulatory compliance and tools to implement
E-Mail-Betrug, auch CEO-Fraud oder BEC (Business Email Compromise) ist weit verbreitet und kostet Unternehmen Milliarden. Dabei ist ein Großteil dieser E-Mail-Angriffe vermeidbar. Diese Bedrohungen beginnen meist mit einer E-Mail, die von einer hochrangigen Führungskraft, aber auch von Partnern oder Lieferanten zu stammen scheint. Diese E-Mail weist Mitarbeiter an Gelder zu überweisen oder sensible Daten zur Verfügung zu stellen. Die Empfänger erfüllen pflichtbewusst die übertragenen Aufgaben, überweisen zb das angeforderte Geld – und lernen erst später, dass sie betrogen worden sind.
Erleben Sie in unserem Webinar anhand eines CEO Fraud Live Hack, wie leicht Ihre Mitarbeiter dazu gebracht werden, die betrügerischen Anfragen auszuführen. Anschließend zeigen wir Ihnen auf, wie Proofpoint Ihre Mitarbeiter und Ihr Unternehmen anhand eines mehrstufigen Schutzkonzeptes vor derartigen Angriffen schützen kann.
How do you accelerate the move to efficient digital workflows containing ePHI and maintain compliance? In this informative webinar we'll discuss enabling healthcare delivery transformation when it requires sharing information. Topics covered include:
- Digital transformation of legacy workflows across care settings
- Communicating with patients, providing access and control
- Maintaining security, privacy and regulatory compliance
Integrate IBM mainframe & iSeries (AS/400) into Micro Focus Universal Discovery
IBM Mainframe and IBM i (iSeries-AS/400) environments continue to play a very critical part in today’s corporate IT infrastructures, processing some of the most valued and important data. Learn how one of the world’s largest insurance companies brought their IBM environments into the modern era by extending their Micro Focus Universal Discovery (UD) platform to include the key IBM systems.
The company’s former process of conducting manual audits was a time consuming, resource intensive, and outdated way of doing things at best. Attendees will:
•Learn how the combination of Micro Focus Software and EView Technology provided a cost-effective, comprehensive, automated, and real-time view of their business services across their multi-IBM system enterprise
•Hear a brief overview of the architecture of the solution and the business benefits
•View a short demo of the seamless integration
Every day big data becomes bigger, and each day enterprises are coming up with new use cases for the data they have at their disposal. Finding systems that have the capabilities and the horsepower to deliver on the use case is a challenge. Greenlight Group will review one such use case, and how Operations Bridge System Collectors and Operations Bridge Analytics were leveraged to harness the power of big data to process millions per day and provide near live dashboards of critical IBM DataPower statistics for one of its customers.
We will show real world Perl scripting examples for you to try in your environment.
The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:
In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.
Implementing a digital identity strategy can be complicated. Let CA help.
IT Operations SIG Talk Series: Mainframe to UD, Data Analysis with OpsBridge, Vertica into BVD (complete edition)
This Vivit SIG Talk session will feature speakers who will share their vast knowledge and experience on Mainframe to Universal Discovery (UD), Data Analysis with Operations Bridge and Vertica into BVD.
Shown below is an outline of the agenda and topics:
•Speaker: Chip Sutton
Integrate IBM mainframe & iSeries (AS/400) into Micro Focus Universal Discovery
•Speaker: Brian Bowden
Advanced Data Analysis with Operations Bridge
•Speaker: Jay Batson
How to Integrate Vertica and other 3rd party data sources into BVD
Office 365 est en France et en Europe une solution collaborative de plus en plus adoptée par les organisations.
La messagerie fait partie des services déployés en priorité.
Les clients Office365 sont confrontés à deux soucis majeurs :
1 Obtenir la meilleure sécurité possible contre les attaques sur les courriels, qui représentent encore aujourd’hui 93% des vecteurs de menaces sur vos données et vos postes de travail,
2 Conserver une continuité de service lorsqu’Office 365 est indisponible.
Lors de ce webinaire, nous présenterons entre autre comment Proofpoint, fournisseur de solutions de cybersécurité « people-centric » adresse les défis suivants :
-Protection des identifiants utilisateurs ciblés par du phishing O365 de plus en plus sophistiqué
-Contrer la fraude email (attaques au président, FOVI) qui n’est pas traitée par O365, quel que soit l’offre souscrite
-Donner une visibilité en temps réel des attaques
-Pouvoir faire des corrélations d’attaques qui deviennent de plus en plus multi-vectorielles (liens vers du partage de fichiers dans le Cloud : Box, OneDrive, SalesForce, Sharepoint, GSuite, etc…)
Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:
How automation solutions enable you to proactively identify service issues
Why cloud sprawl is a major threat to IT security – and how you can stop it
What businesses can do to automate their IT services lifecycle
Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.
Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
You're charged with building a bulletproof, tier one secure network. If your Domain Name System (DNS) goes down, nothing else matters. And, DNS is the leading attack vector for cyber villains. Say “Hack no! ” to DNS threats.
Join guest speaker Tony Scott, former CIO of the United States, Microsoft, and the Walt Disney Company, alongside leading practitioners from Aflac and McAfee in this live panel discussion. This unique gathering of industry experts will discuss their perspectives on building a safe, secure network and actionable best practices in this era of cloud and mobile. Moderated by Infoblox Chief DNS Architect Cricket Liu, this discussion will give you an opportunity to hear from the experts and ask questions about.
- What leading organizations are doing to secure their DNS
- When to best utilize DNS data, network context, and threat intelligence in your security operations
- How to integrate DNS data with your security ecosystem to accelerate threat mitigation and remediation
- How Aflac blocked nearly 37 million threat connections with < 100 false positives
Le phishing reste l’une des plus grandes menaces pour les entreprises. Ce type d’attaque ciblée exploite le facteur humain plutôt que la technologie, ce qui la rend plus difficile à détecter par les solutions de sécurité traditionnelles. Nous vous ferons découvrir comment réduire le risque d’hameçonnage en permettant la simulation de phishing et la formation pour aider vos utilisateurs finaux à détecter, signaler et se prémunir de cette menace.
Durant cette session, nous couvrirons les sujets suivants :
• Comment évaluer la vulnérabilité de vos utilisateurs aux attaques de phishing et de spear phishing
• Sensibiliser et former vos utilisateurs pour qu’ils reconnaissent et évitent les attaques de phishing et autres escroqueries d'ingénierie sociale
• Comment permettre à vos employés de signaler les messages suspects en un seul clic.
For John Muir Health (JMH) and other leading healthcare firms, Office 365 is often IT's first foray into the public cloud and the start of a broader initiative to migrate from premises-based applications to cloud. Most are now looking to deploy cloud messaging, file sharing, collaboration apps, and more. Deploying this "long-tail" of SaaS applications shares a great deal with platforms like Office 365, but some considerations are different.
In this webinar, learn how John Muir Health journeys to secure these lesser known cloud applications and gain actionable advice that you can bring to your organization to protect data in Office 365 and beyond.
Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.
With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.
For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:
•Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
•Windows 10 application incompatibilities
•Mobile security risks with running Exchange on-prem
•Network latency from running O365 in the cloud
•Managing multiple file hosting services including OneDrive
Brands in every industry and geography feel an urgency to meet the conversational needs of their customers. Executives walk the fiscal tightrope between exceptional customer experiences and operational efficiency. Today’s contact center, as the communications hub for customers, is caught in the middle of the battle. Customers value fast, frictionless convenience; executives must invest accordingly.
Join Opus Research Lead Analyst Dan Miller and Program Director Mitch Lieberman, with Abinash Tripathy, Chief Strategy Officer and Co-Founder from Helpshift, as they address the urgent topics that help brands and enterprises supercharge customer service experiences, including:
* How digital messaging promotes operational excellence while meeting — and exceeding — customer needs
* Strategic steps necessary to support top-line growth and in-depth customer engagement
* How brands infuse intelligence, accuracy, and precision into company/customer conversations
* How to leverage investments and resources to build the next generation of customer service and support
In today's digital enterprise, it's technology that drives business success. And with the strategic pairing of AppDynamics and Cisco, organizations can now drive their digital transformation forward in ways never before possible. But how?
In this webinar, you’ll learn how AppDynamics real-time data platform is being correlated with Cisco’s data platforms to give you the richest end-to-end view across the stack, allowing for faster remediation and automation
You’ll gain insights into:
- New challenges of cross-domain failures in the enterprise
- The future of IT intelligence across the software and infrastructure industries
- How Cisco solutions like ACI, CloudCenter and Workload Optimization Manager (CWOM) will be integrated with AppDynamics and Cisco
Are you AI-ready? You need to be. Artificial intelligence marketing applications are delivering on their promise to source new insights to grow your business fast, AI technology is becoming available to any company looking for a competitive edge, and now’s the time to move, if you want to stay ahead of the curve.
But the challenge is not just in defining an AI strategy; it requires developing the infrastructure to support it.
Should you be developing in-house, or look to available technology and collaborate with outside experts? Keep deployment on-premise, or reach for the cloud? Can your current infrastructure, from server performance to processing power, stand up to the demands of increasingly complex AI applications?
Get ready to level up your marketing strategy with AI, advance your technological capabilities in smart, strategic ways, learn how to make sure your next infrastructure move helps you exploit the AI advantage and more when you join this VB Live event!
Register for free!
Attend this webinar and learn:
* How to tell if your marketing and IT departments are AI-ready
* The fundamentals of an AI-driven infrastructure
* The role of clean, definable data goals in successful AI implementation
* How to scale the AI workload