Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Architecting Your Mobile Storage Solution With a NoSQL Data Platform
    Architecting Your Mobile Storage Solution With a NoSQL Data Platform
    Priya Rajagopal, Principal Product Manager, Mobile, Couchbase Recorded: Jan 23 2019 59 mins
    Architecting a mobile storage solution may feel like a daunting task, but it doesn’t have to be. In this webinar, we’ll guide you through the toughest challenges and demonstrate how NoSQL can deliver a seamless mobile experience anywhere by extending your data center to the edge.

    We’ll walk you through:

    -Critical requirements of an offline or offline-first storage solution
    -Why NoSQL is uniquely suited for data storage on the edge
    -Key architectural elements of the Couchbase Mobile NoSQL data platform

    You’ll see how Couchbase Mobile makes it easy to ensure your local data is always available. We’ll show you how to achieve auto sync from edge to cloud and direct peer-to-peer sync for exceptional online and offline experiences. And you’ll learn how Couchbase provides enterprise-grade security with end-to-end and over-the-wire encryption.
  • Mobile App Security Predictions 2019
    Mobile App Security Predictions 2019
    Brian Reed, CMO, NowSecure // Alan Snyder, CEO, NowSecure // David Weinstein, CTO, NowSecure Recorded: Jan 23 2019 63 mins
    2019 is already shaping up to be a standout year for mobile appsec and secure DevOps. If we can say anything with certainty, it’s that cybersecurity is unpredictable and the wave of DevSecOps is unstoppable. But we foresee intensifying concerns about digital privacy amidst high-profile breaches.

    Attend this webinar to hear our predictions about what’s in store for our customers and the community in the year ahead. Our veteran industry leaders will prognosticate about developments in these areas:
    + Mobile ecosystem: OSes, devices, apps and app stores
    + Evolving mobile security threats
    + The rise of DevSecOps and the automation of everything
    + The disruptive economics of automating manual pen testing
    and more.
  • Mobile Service Outlook 2019
    Mobile Service Outlook 2019
    Quah Mei Lee & Sofea Zukarnain, Frost & Sullivan Recorded: Jan 23 2019 17 mins
    Title: Mobile Service Outlook 2019

    Subtitle: A Shift in Business Models and Cost Reduction Strategy Present New Revenue Streams and Growth Opportunities


    Digital transformation and new disruptive technologies make it necessary for mobile operators to innovate their products, services and customer channels. A key growth strategy for mobile operators is to form strategic partnerships to maintain a competitive edge, particularly to enter the enterprise and vertical industry. Mobile operators within the region have already invested in Fourth Industrial Revolution (Industry 4.0) technologies such as cloud, IoT, artificial intelligence, and virtual and augmented reality, and are preparing their network for the opportunities that will open up for 5G.

    Key Takeaways:

    • Understand current trends in the industry
    • Learn how mobile operators are adapting to trends and what they are developing
    • Identify the best way to position themselves in the current mobile industry
    • Explore potential collaboration and partnerships with industry players
    • Discover methods to maintain revenue and new monetization opportunities
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Recorded: Jan 22 2019 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • How AI-Based, Zero-Effort Authentication is Changing the Customer Experience
    How AI-Based, Zero-Effort Authentication is Changing the Customer Experience
    Ravin Sanjith, Intelligent Authentication, Opus Research; Alexey Khitrov, IDRnD Recorded: Jan 17 2019 49 mins
    With access to mountains of data — scoured, analyzed, and made actionable thanks to Artificial Intelligence, machine learning, and neural networking — enterprise organizations are staking their claim on seamless, context-aware customer interactions as a business differentiator. Altogether these technologies help deliver on the promise of secure, personalized digital self-service and can have a demonstrable impact on an enterprise’s bottom line.

    Indeed “zero-effort authentication” enables intelligent automation, reduced customer effort (no more PINs and passwords), reduced call handling time, and improved confidence in security. Enterprises are building zero-effort authentication strategies for maximum return on investment and increased customer loyalty.

    In an upcoming webinar, Ravin Sanjith (Intelligent Authentication, Opus Research) and Alexey Khritov (CEO, IDRnD) will discuss how voice biometrics, combined with AI techniques, sensors and increased processing power, can provide a virtuous cycle for greater convenience and less effort to validate a consumer’s identity in mobile apps, on messaging platforms, and beyond.
  • Implementing Micro Focus Service Virtualization at Global Pharmacy Retail Chain
    Implementing Micro Focus Service Virtualization at Global Pharmacy Retail Chain
    Ameet Patil Recorded: Jan 17 2019 57 mins
    Brought to you by the Vivit Performance Engineering Special Interest Group (SIG).

    Most of you may have heard about or experienced Micro Focus Service Virtualization (SV) by now. This webinar is not about explaining what it is or what value it brings to an IT organization. Instead, it is about sharing one team's collective experience with implementing Service Virtualization Center of Excellence (CoE) practices at a major pharmacy retail chain company located in Chicago, Illinois.

    For insight into this webinar, you may view this three minute video to get a preview of what's coming. Some key take-aways from this webinar include:

    • Making the SV business case to leadership
    • PoC Guidelines
    • Choosing a SV Tool
    • SV Beyond the Tools
    • SV methodology for Waterfall / Agile models
    • SV impact on Microservices, multi-tiered architectures
    • SV in Dev Ops
    • SV Housekeeping. What's involved?
    • ROI samples
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure
    Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Recorded: Jan 17 2019 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • The World Quality Report 2018-19: Focus on the Financial Services Sector
    The World Quality Report 2018-19: Focus on the Financial Services Sector
    Jonathon Wright, Vivit Advocacy Board Director and Malcolm Isaacs, Solutions Marketing, Micro Focus Recorded: Jan 16 2019 60 mins
    The 2018-19 edition of the World Quality Report (WQR) discusses the trends shaping QA and testing today, and offers recommendations for addressing tomorrow’s challenges. In this webinar, we’ll present an overview of the WQR’s key findings, with a deep dive into the analysis of the responses from the Financial Services sector, which is going through a radical change in its approach to application development and quality.

    Attend this webinar to learn:
    • How end-user satisfaction is top priority for QA and testing
    • Why an increase in digitalization is driving disruption in the Financial Services sector’s approach to application development and delivery
    • How the emergence of new technologies in Financial Services such as blockchain, Internet of Things and Artificial Intelligence are reshaping how QA and testing is done
    • Trends over the next two to three years that will combine automation, AI, and analytics to become a key differentiator for Financial Services organizations
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Doug Landoll, CEO, Lantego Recorded: Jan 16 2019 35 mins
    Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.

    In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:

    - How to define cybersecurity success
    - Common approaches that fall short
    - Risk-based cybersecurity strategy planning

    Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
  • Transform Leadership Skills into LUG Leader & Maximize Micro Focus Relationship
    Transform Leadership Skills into LUG Leader & Maximize Micro Focus Relationship
    Bob Crews, Rocky Pisto, Mark Herbert, Carsten Neise Recorded: Jan 16 2019 56 mins
    Join our panel of experienced Vivit Local User Group (LUG) leaders discussing real world use cases of how to bring Micro Focus customers, partners and field marketing teams together to network, work through software issues, share best practices, and advance your career opportunities.

    Why you should attend:

    • Hear from four seasoned LUG leaders about their Vivit experience
    • Learn how to gain access to Micro Focus software, business leaders, product engineers and developers - all while leading valuable presentations to help your LUG members exchange information about new products and services
    • Tips and Tricks on how to expand your visibility into Micro Focus and your network base to further advance your career
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Jan 16 2019 82 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Top 5 Ways Your Network Can Give Your Business a Competitive Edge
    Top 5 Ways Your Network Can Give Your Business a Competitive Edge
    Guido Kragten, Sales Enablement Cloud Platforms, EMEA Recorded: Jan 16 2019 52 mins
    Seventy percent of today's Midsize businesses are investing in technology to customize the user experience, improve customer satisfaction, build loyalty, and gain a competitive advantage. But the ability to deliver amazing user experiences is dependent on high-performance, reliable connectivity. It requires a business-class network.

    Join us on 16th January, as we showcase the Top 5 business-class features your network must have for you to automate and optimize the delivery of network services to drive your business success.

    A high-level discussion will be followed by a demo of Aruba Central, network management in the Cloud.
  • Webroot 2019 Threat predictions
    Webroot 2019 Threat predictions
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Jan 15 2019 46 mins
    The Threat landscape has seen a rise of Cryptojacking, evolution of scams and malware such as Emotet and other cybersecurity issues such as Trickbot and Ransomware that have affected businesses in 2018.

    Join this 30-minute webinar where our Threat Expert will walk you through Webroot's Threat predictions for 2019, so MSPs and SMBs can stay ahead of attacks and keep your clients and businesses safe.

    Some of the topics that will be covered:
    - AI Disruption
    - US adoption of similar GDPR legislation
    - Cryptojacking will keep rising while ransomware will decline


    Register today!
  • 802.11ax or 802.11ac: Which is Right for Your Business?
    802.11ax or 802.11ac: Which is Right for Your Business?
    Cherie Martin, Sr. Solutions Marketing Manager - Aruba Recorded: Jan 10 2019 48 mins
    The industry is buzzing about the 802.11ax Wi-Fi standard that will greatly increase wireless speed and optimize client battery life. Are you ready to take your network to the next level? Join us as Aruba’s Cherie Martin, Sr. Solutions Marketing Manager, shares the top three things you need to consider in deciding which technology to choose to give your business, employees, and guests, simple, business-class networking without sacrifice
  • Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Chris Marsh of 451 Research & Matt Crawford of Citrix Recorded: Jan 10 2019 55 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • Customer Briefing: Aerospike 4.5 for Intel Optane DC Persistent Memory
    Customer Briefing: Aerospike 4.5 for Intel Optane DC Persistent Memory
    Brian Bulkowski, CTO & Co-founder, Aerospike and Alper Ilkbahar, Vice President & General Manager Memory and Storage, Intel Recorded: Jan 9 2019 59 mins
    Intel’s Optane DC persistent memory with 3D Xpoint technology will fundamentally change the database market. Machine Learning-based applications such as fraud prevention, digital payments, real-time bidding and recommendation engines ingest hundreds of terabytes or more of data continuously.

    Effectively storing and accessing this data to allow the applications to make the right decisions in real-time is critical. Intel Optane DC persistent memory is a ground breaking innovation that will enable databases to scale and meet the demands of modern machine learning based applications.

    Intel and Aerospike have been working for years to test and tune how Optane DC persistent memory works for production level environments.

    Aerospike Enterprise Edition 4.5 is the first commercially available open database that takes full advantage of Intel Optane DC persistent memory (PM) technology. The combination of Aerospike 4.5 and Optane DC promise to deliver massive scale improvements – orders of magnitude - at low cost, with unsurpassed persistence and reliability.

    Join this Special Customer Briefing featuring Brian Bulkowski, CTO & Co-founder of Aerospike, along with Alper Ilkbahar, Vice President & General Manager Memory and Storage Solutions Group of Intel. Each will share perspective on the significance of these advancements.

    You’ll hear details on Intel Optane DC Persistent Memory directly from one of Intel’s most influential executives and Brian’s expectations for what 4.5 will mean for Aerospike customers.
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Recorded: Dec 20 2018 53 mins
    Windows 10 and the proliferation of BYOD introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • ABCs of AI
    ABCs of AI
    Sudheer Matta, VP of Product, Mist Recorded: Dec 19 2018 56 mins
    There's a lot of buzz around Artificial Intelligence and how it can help IT operations. There's also a lot of confusion.

    Watch this on-demand AI:rchitect series webinar where we'll cut through the AI noise. In this interactive session, we'll cover:

    - The need for AI-driven IT
    - The difference between AI, machine learning, deep learning, data science, and other common techniques
    - Ways to implement data science in your Wi-Fi network
    - How to prepare yourself (and your IT team) for the transition to AI-driven IT
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Bryan Sartin, Chris Novak, Bruce Benedict, Jimmy Nilsson, Rodolphe Simonetti, Dave Kennedy, John Grim, Farzad Seihoun Recorded: Dec 19 2018 85 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:

    Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • 5 Steps to Get Ready for 802.11ax
    5 Steps to Get Ready for 802.11ax
    Newsha Sharifzadeh - Aruba Networks Recorded: Dec 18 2018 59 mins
    Wi-Fi is becoming the connectivity method of choice, even for mission critical applications, such as voice, collaboration and patient monitoring devices. With an increasing number of diverse applications, along with mobile and IoT devices reliant on wireless access, networks must deliver high performance, reliability and security. The sixth-generation wireless standard, 802.11ax (Wi-Fi 6), promises to address issues related to the growing density and diversity of devices by increasing network capacity and improving user experiences.

    Join us to learn about 802.11ax advantages and the 5 things to consider before making your next Wi-Fi purchase:

    - How does 802.11ax differ from 802.11ac?
    - What use cases and applications is 802.11ax optimal for?
    - When will I start seeing advantages with 802.11ax?
    - Do I need to replace access switches to support 802.11ax APs?
    - If considering 802.11ax, do I need to replace all of my existing Wi-Fi infrastructure?
  • Happy Holidays from DataMotion
    Happy Holidays from DataMotion
    The DataMotion team Recorded: Dec 17 2018 1 min
    Greetings from DataMotion for a happy holiday!
  • Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Uli Wallscheid, DP Solutions Product Manager, Micro Focus Recorded: Dec 17 2018 81 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor.

    Im Webinar am 17. Dezember dreht sich alles um das Thema Data Protector 10.20: Das interne Reporting wurde in Data Protector 10.20 weiter ausgebaut. Desweiteren erhalten Sie einen Einblick in alle neuen Features der Version 10.20 von Data Protector.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
  • How Process Owners Can Build Their Own ‘Apps’ in 15 Minutes Using SMAX Studio
    How Process Owners Can Build Their Own ‘Apps’ in 15 Minutes Using SMAX Studio
    Neville Ward, Senior Solutions Architect & Noel Hopkinson, Senior Solutions Architect Recorded: Dec 14 2018 28 mins
    Codeless configuration is commonly accepted as the only way to ensure that process modifications can be seamlessly incorporated into software upgrades without requiring teams of programmers to make the changes.

    Join this webinar to discover how Micro Focus Service Management Automation X (SMAX) Studio takes codeless configuration to the next level by enabling new process-based applications to be created in minutes. Designed for IT and line of business personnel, SMAX offers fast and risk-free configuration and extension of service management applications.

    With SMAX, Enterprise Service Management is delivered out of the box and is based on content such as HR workflow management, ideation and proposal management, and portfolio optimization—all of which can be easily extended or complemented with brand new content using SMAX Studio.

    In this webinar, you’ll learn:

    How SMAX Studio offers faster Time to Value and Lower TCO
    How our modern user interface enables the instant creation of new applications
    How the required data model, business rules, forms, notifications, reports, and user-defined actions can be created without coding
  • How to Choose Your Big Data Analytics Solution
    How to Choose Your Big Data Analytics Solution
    Dominic Colson, ITOM Solutions Architect Recorded: Dec 14 2018 21 mins
    In the past, IT operations teams tended to focus on using either big data analytics or machine learning to grow business intelligence. But the big data landscape has evolved, and emerging platforms now combine both types of solutions. The question is, how do you choose the one that’s right for you?

    This 35-minute webinar tells you how. You’ll learn:

    What big data is and where it fits in your IT operation.
    How to ensure comprehensive insight into past, present, and future states of IT systems. (Hint: Employ AIOps platforms that can ingest and access log data, text data, wire data, metrics, and API data.)
    How multivendor solutions can be deployed and supported across both new and existing applications.
    How the Micro Focus solution works (you’ll see a demo) and why it’s worth your consideration.
  • Four steps to enabling real-time insight in a data-driven world
    Four steps to enabling real-time insight in a data-driven world
    Sachin Smotra | Director of Product Management at Couchbase & Matt Aslett | 451 Research Vice President Jan 24 2019 10:00 am UTC 60 mins
    Today’s businesses must operate in the moment in order to maintain a competitive advantage. To do this, they need rapid time to insight, but how ready are businesses to deliver on the promise of real-time operational analytics?

    -Provisioning data in legacy data architectures can take weeks, or even months.
    -The skills required to modernize don’t exist within a traditional IT department.
    -Building business cases for modernization can be challenging without a fast and direct return on investment.
    -A lack of operational dashboarding limits insight due to the complexity of custom reporting.

    To combat these hurdles, you are invited to hear from two experts in the field of operational analytics. Referencing firsthand research and reports, Matt Aslett from 451 Research will discuss the current trends in operational analytics and how they relate to the emergence of hybrid operational and analytic processing (HOAP) databases.

    Matt will also present the four steps organizations must take in order to prepare for real-time insight, and take a peek into the future of what this means for the companies that will succeed, and for those that won’t. Sachin Smotra, Director of Product Management at Couchbase, will then explain how operational analytics can be achieved without the heavy lifting of data lakes, data warehouses, and complex ETL processes.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Jan 24 2019 11:00 am UTC 38 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Build for the future with voice search
    Build for the future with voice search
    Dustin Coates, Voice Search go-to-market lead at Algolia Jan 24 2019 5:00 pm UTC 30 mins
    Speaking commands into actions isn’t a futuristic fantasy anymore - it’s the present. Voice as a user interface has arrived and it can elevate the search and discovery experience.

    Join Dustin Coates, Voice Search Go-to-Market Lead, to learn how voice search and its capacity to transform everyday, conversational speech into functional, relevant responses can redefine the way you interact with the world.

    In this session we will cover:

    Why your business should implement voice search
    - Where voice search is useful
    - What good voice search UX looks like
    - How relevancy differs between voice search and typed search
  • Airheads Tech Talks: Advanced Clustering in AOS 8.x
    Airheads Tech Talks: Advanced Clustering in AOS 8.x
    Arun S, Aruba TAC Team Jan 29 2019 10:00 am UTC 60 mins
    Clustering is a new feature introduced in AOS 8.0 that enables seamless roaming of clients between APs, hitless client failover and load balancing of users across Mobility Controllers in the cluster. This solution provides the configuration required to create a cluster of Mobility Controllers that are managed by the same Mobility Master.

    Join this webinar to learn about:

    · Cluster load balancing (AP and client)
    · AP termination in cluster
    · AP move
    · Authorization
    · Cluster troubleshooting
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Jan 30 2019 11:00 am UTC 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Visibility and Governance into the Release process
    Visibility and Governance into the Release process
    Erika Leifker, Micro Focus Jan 30 2019 4:00 pm UTC 60 mins
    Release Management, much like Waterfall Development, is no longer drawn out over months or sometimes years. With the advent of Agile, the goal is to release more often and as a result, be more efficient. How do we achieve these expectations when we must adhere to regulations, policies, security requirements and complex technology? DevOps is commonly the answer, but what does that mean?

    This session will provide an overview of some of the DevOps best practices that customers are implementing to ensure their frequent release cycles are shorter and more successful.

    Attend this webinar and you will:
    • Understand how to define and coordinate Release Management activities with other DevOps activities, such as Continuous Integration/Delivery/Testing
    • Learn best practices for release process governance
    • Discover how to gain visibility into your release process
  • Using Risk Analysis to Enhance Compliance
    Using Risk Analysis to Enhance Compliance
    Andras Cser, Vice President and Principal Analyst, Forrester Jan 30 2019 4:00 pm UTC 20 mins
    For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.

    In this session, Forrester Vice President and Principal Analyst Andras Cser will share how to prioritize security and compliance efforts. Specific topics include:

    - How your auditors are behaving
    - Why risk-based prioritization is the only way to find threats
    - The importance of context
    - Forrester’s recommendations and best practices

    Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
  • Couchbase Server 6.0 : Run Analytical Workloads Alongside Operational Workloads
    Couchbase Server 6.0 : Run Analytical Workloads Alongside Operational Workloads
    Michael Carey, Consulting Architect | Till Westmann, Senior Director Engineering | Sachin Smotra. Director Product Management Jan 31 2019 10:00 am UTC 52 mins
    There’s a lot of JSON in this world. But if deriving value from that data requires ETL, then odds are your technology isn’t agile enough to unlock operational insights when it matters most.

    Couchbase Server 6.0 introduces the new Couchbase Analytics service, enabling you to analyze data in its natural JSON format and get instant insights without having to worry about transforming and processing data. It also includes N1QL for analytics, the first commercial implementation of a query language based on the SQL++ framework.

    Join this webinar to hear Mike Carey, the Consulting Chief Architect at Couchbase and Bren Professor of Computer and Information Science at UC Irvine, talk about:

    -The journey of launching Couchbase Analytics based on Apache AsterixDB, an open-source project
    -The architecture behind the MPP (massively parallel processing) engine for JSON data
    -How Couchbase’s query language (N1QL) for analytics gives you the full power of SQL querying on JSON
  • Top Five Ways Your Network Can Give Your Business a Competitive Edge
    Top Five Ways Your Network Can Give Your Business a Competitive Edge
    Cherie Martin, Network Solutions Manager - Aruba Jan 31 2019 6:00 pm UTC 41 mins
    Seventy percent of today’s midsize businesses are investing in technology to customize the user experience, improve customer satisfaction, build loyalty, and gain a competitive advantage. But the ability to deliver amazing user experiences is dependent on high-performance, reliable connectivity. It requires a business-class network.

    Learn about the Top 5 business-class features your network must have for you to automate and optimize the delivery of network services to drive your business success.

    A high-level discussion will be followed by a demo of Aruba Central, network management in the Cloud.

    Attend and you could qualify to receive a free Aruba Instant access point and a 90-day trial to Aruba Central, our network management solution.
  • Your App Security Stack: How to Defend Against the Evolving Threat
    Your App Security Stack: How to Defend Against the Evolving Threat
    Ken Jochims, Arxan Director of Product Marketing | Amy DeMartine, Forrester Principal Analyst Feb 5 2019 6:00 pm UTC 60 mins
    Web and mobile applications have become the primary customer touchpoint for financial services, payments, hospitality, travel and scores of other businesses. With the increased dependence on applications comes greater opportunity for attacks to expose customer data, sensitive IP, or a roadmap into an organization’s back-end infrastructure.

    In 2018 high-profile attacks hit major hotel chains, international airlines and banks, leaving companies in a tailspin to repair customer trust and brand damage. The top two attack methods for such breaches? Software vulnerabilities and web app attacks.

    Join Arxan Director of Product Marketing Ken Jochims and special guest Forrester Principal Analyst Amy DeMartine to learn how the threat landscape may evolve in 2019, and what you can do to strengthen your app security posture. We’ll cover:

    -What makes applications inherently insecure
    -The anatomy of an application attack (web and mobile)
    -How to build your security stack to defend against app level threats
  • Deciphering 2019 Cyber Threat Landscape
    Deciphering 2019 Cyber Threat Landscape
    Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst Feb 6 2019 10:00 am UTC 60 mins
    In 2019, a shakeout in the cryptocurrency market will change the way threat actors move -- and steal -- money, while email fraud moves from spoofing identities to using stolen identities. These are just some of the tactics bad actors will use in 2019.

    Every year Proofpoint researchers look ahead at the trends and events likely to shape the threat landscape in the year to come. Join Adenike Cosgrove and Davide Canali live as they discuss:

    - Predictions for the 2019 threat landscape with a focus on EMEA and APJ
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Is Your Wi-Fi Network Putting Your Business At Risk?
    Is Your Wi-Fi Network Putting Your Business At Risk?
    Guido Kragten, Sales Enablement Cloud Platforms, EMEA Feb 6 2019 10:30 am UTC 60 mins
    86% of midsize companies agree that digital technologies are disrupting their industry. Your network has never been more critical. It is the on-ramp to your cloud applications. It is the way your mobile users connect, work and collaborate. And it is what enables amazing, memorable customer experiences.

    Choosing the right network solution has never been more important.

    Join us on 6th February to learn about the latest trends and the Top 5 things your business network can't live without.
  • Outsmarting Contact Centre Fraudsters with Supercharged Voice Biometrics
    Outsmarting Contact Centre Fraudsters with Supercharged Voice Biometrics
    Ravin Sanjith and Dan Miller, Opus Research; Amiram Pinto, Senior Product Manager, RTA, NICE Feb 7 2019 6:00 pm UTC 45 mins
    By incorporating the latest advances in machine learning techniques combined with voice biometrics used for caller authentication, contact centers now have the ability to expose previously unsuspected fraudulent intent. In the ongoing response to sophisticated fraud attacks, the creation of high-quality fraudster watchlists from historical recordings not only provides a highly effective defence, but also an improved ability to prosecute fraudsters. Removing these ‘bad actors’ from the picture is a revolution in the fight against fraud.
  • How to Get the Most of Your (ISC)² Membership - Local Benefits and Global Reach
    How to Get the Most of Your (ISC)² Membership - Local Benefits and Global Reach
    Tony Vizza, CISSP , Director of Cyber Security Advocacy, APAC and Hazel Hung, Customer Services Manager, APAC Feb 12 2019 6:00 am UTC 60 mins
    As an (ISC)² Member, you now have access to a wide range of global resources, educational tools, peer networking opportunities, as well as exclusive discounts to industry events. There is so much more to discover to what your (ISC)² membership brings!

    In this webinar, you will learn about:
    - The latest news and developments across APAC and (ISC)² from around the world.
    - Exciting and upcoming CPE opportunities to help you stay sharp
    - Member benefits and perks including fantastic discounts on a range day to day items
    - New, upcoming and FREE professionally developed education courses just for members.
    - An update on (ISC)² certifications to help you take your career to the next level.
    - Networking opportunity with like-minded professionals locally and globally via ((ISC)² chapters
    - An opportunity to ask questions in our Q&A session

    Join us on Feb 12, 2019 (Tue) at 14:00 (GMT +8) to get the most of your (ISC)² membership globally and locally.
  • Autonomous Threat Hunting
    Autonomous Threat Hunting
    Alexandre Pinto, Product Manager and Distringuished Engineer Security Services Global Products and Solutions Feb 12 2019 4:00 pm UTC 60 mins
    Attendees will learn how Verizon's Autonomous Threat Hunting...

    •Improves automation and efficiency on monitoring and incident response processes by mimicking and applying security analyst experience and intuition at unprecedented scale.


    •Automatically builds context and relationship between indicators of compromise (IOCs), their inferred Tactics, Techniques and Procedures (TTPs), and log or event data generated by their organization.


    •Transforms hundreds of millions of raw data events into tens of high confidence alerts, so analysts can focus on investigating qualified leads.
  • The ROI for VR/AR in the Enterprise
    The ROI for VR/AR in the Enterprise
    Intel, Atheer, Accenture, Nielsen Feb 14 2019 5:00 pm UTC 75 mins
    The VR/AR Association Enterprise industry committee will present the latest case studies, best practices, and ROI
  • (ISC)² Info Session: SSCP -The Premier Security Administrator Certification
    (ISC)² Info Session: SSCP -The Premier Security Administrator Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Feb 19 2019 6:00 am UTC 60 mins
    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue SSCP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    www.isc2.org/sscp

    Are you ready to prove yourself? Register and begin your SSCP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Feb 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Future IoT Growth Opportunities in Colombia
    Future IoT Growth Opportunities in Colombia
    Gina Sánchez, Senior Consultant, Latin America, Digital Transformation, Frost & Sullivan Feb 21 2019 4:00 pm UTC 60 mins
    IoT is at the beginning stages of its growth. Because it offers the ability to capture and leverage data across virtually every aspect of the human experience, its potential is enormous. Organizations that do not yet have IoT on the drawing board must figure out what the IoT looks like, where it fits, and its real-world issues and benefits as they weigh their decisions about deployment.

    Frost & Sullivan invites you to join Gina Sánchez, Senior Consultant, to gain insights on the current status and future growth potential of the Industrial IoT market in Colombia, the factors that drive and restrict the market, success stories, and projected growth rates until 2022.


    Key Takeaways:

    · What are the key verticals in this market?
    · How will the revenue shares of the hardware, software, services, and connectivity segments change?
    · What are the top three drivers for IoT investments?
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Feb 22 2019 6:00 am UTC 60 mins
    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSLP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/csslp

    Are you ready to prove yourself? Register and begin your CSSLP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification
    (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Feb 26 2019 6:00 am UTC 60 mins
    Accelerate your cybersecurity career with the CISSP certification.

    Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!

    During the online info-session, you will:
    - Gain an insight into the CISSP credential-its domains and career benefits for credential holders
    - Hear about the practical application of the CISSP related to real world issues for security professionals
    - Ask questions about the credential, exam and experience requirements
    - Learn everything you need to know about getting certified

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

    https://www.isc2.org/cissp
  • Airheads Tech Talks: Understanding ClearPass OnGuard Agents
    Airheads Tech Talks: Understanding ClearPass OnGuard Agents
    Saravanan Rajagopal, Aruba TAC team Feb 26 2019 10:00 am UTC 60 mins
    ClearPass OnGuard agents perform endpoint posture assessment and ensure that compliance is met before granting access to the network. This session will cover the ClearPass OnGuard Agent components and work-flow in detail.


    Join this webinar to learn about:

    •OnGuard Introduction.
    •ClearPass OnGuard Agent Components.
    •ClearPass OnGuard Agent Work-Flow.
    •Troubleshooting Common Issues.
  • Bring Your Business Up-to-Speed with Smarter, Better Wi-Fi
    Bring Your Business Up-to-Speed with Smarter, Better Wi-Fi
    Kevin Crehan, Aruba - Lead Technologist, EMEA Feb 27 2019 10:30 am UTC 60 mins
    Workplaces are transforming - from cubes and square footage, to any location, any time, with mobile devices running a mass array of applications. That's why it's crucial to choose access points and network management tools that deliver the best-connected guest and employee experience and can be deployed and managed with minimal IT resources.

    Join us on 27 February, for our "Bring Your Business Up-to-Speed with Smarter, Better Wi-Fi" webinar and get a chance to experience intelligent cloud networking for yourself.

    Learn how to:

    •Scale your network to grow with your users and location needs
    •Flexibly manage your network the way you want to (Demo)
    •Detect user-level activity to better prioritize applications and optimize your network.
  • Introduction to Machine Learning and Behavioural Analytics
    Introduction to Machine Learning and Behavioural Analytics
    Richard Leadbetter, Technical Sales Specialist, EMEA & Bruno Hareng, Cyber Security Business development Manager, EMEA Feb 28 2019 10:00 am UTC 45 mins
    The role of a Chief Information Security Officer is fraught with new threats inside the organization from compromised users, negligent employees and malicious insiders. To find these threats, security approaches must now also deal in the world of “gray”—small signals that must be detected, put in context over time and added up to indicate pending harm. This webinar will show how Machine Learning (ML) is best suited for this mission.
  • (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification
    (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Mar 12 2019 6:00 am UTC 60 mins
    Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/ccsp

    Are you ready to prove yourself? Register and begin your CCSP journey today!

    NOTE: Join this info-session and earn 1 CPE.