Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Business Insight: How to Interpret the Gartner Market Guide for PAM
    Business Insight: How to Interpret the Gartner Market Guide for PAM Suresh Sridharan, Director Privileged Access Management, CA Technologies Recorded: Oct 19 2017 36 mins
    The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.

    Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
  • 451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security
    451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security Eric Hanselman, Chief Analyst at 451 Research and Michael Gardiner, Security Lead for CTO office, Gemalto Recorded: Oct 19 2017 57 mins
    The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.

    In this joint webinar with 451 Research, we will cover topics including:

    -Building a multi-cloud security strategy for encryption and key management
    -Best practices, benefits and pitfalls of managing your own security
    -Impact of regulations on data protection in the next few years
    -Understanding the different CSP requirements for key management:
    oCustomer-Supplied Encryption Key (CSEK)
    oBring Your Own Key (BYOK)
    oHold Your own Key (HYOK)
    oGeneral cloud service provider key management services overview
  • Customer Due Diligence after the Money Laundering Regulations 2017
    Customer Due Diligence after the Money Laundering Regulations 2017 Jane Jee, CEO, Kompli-Global Recorded: Oct 19 2017 41 mins
    Do you really know your customer? Customer Due Diligence after the Money Laundering Regulations 2017 and the Criminal Finances Act 2017

    * How do you ensure you conduct a thorough search for, and provide ongoing monitoring of, adverse information on existing and potential clients?
    * How do you prove you are conducting compliant CDD?
  • PSD2 and 3-D Secure 2.0: Setting New Standards - Hosted by PYMNTS.com
    PSD2 and 3-D Secure 2.0: Setting New Standards - Hosted by PYMNTS.com Michael Sass, Mastercard; James Rendell, CA Technologies Recorded: Oct 18 2017 60 mins
    The Payment Industry has seen its fair share of innovation, but there’s never been a more exciting time for Payments than now. New technology is everywhere – Selfie Pay, Tokenization, Biometric Authentication. And with new technology, there is the inescapable need for advanced security.

    In fact, several global initiatives have surfaced to make electronic payments safer – including PSD2 and 3-D Secure 2.0. This means big changes for banks, merchants, PSPs, and consumers. Are you prepared?
    Join industry leaders from Mastercard and CA Technologies for a straightforward look at how to take advantage of these innovations. You’ll be briefed on:
    • Regulatory technical standards on strong customer authentication
    • Best practices to reduce abandonment rates and fraud
    • Key dates, choices, and planning considerations to implement the new protocols

    Host: Karen Webster, CEO, PYMNTS
    Guests:
    • Michael Sass, Vice President, Market Product Management, Security Solutions, Europe, Mastercard
    • James Rendell, Vice President, Product Management, Payment Security, CA Technologies
  • Manage your Secure Access with one view via Pulse One
    Manage your Secure Access with one view via Pulse One Jim Hebler, Partner Velocity Director & Greg Bassett, Senior Director - Solutions Architecture Recorded: Oct 17 2017 32 mins
    How much visibility do you have via Secure Access end-points – from the Data Center, to the Cloud, to Devices and Applications hitting your network?

    Join Pulse Secure for a compelling Webinar Centered on Pulse One – its’ leading edge Monitoring-Visibility Solution. Configured correctly, Pulse One also enhances compliance alliance, segmentation and pro-active management and consolidation for Secure Access at the front-edge of your network.
  • Are you going to access that data, FROM THERE?
    Are you going to access that data, FROM THERE? Benjamin Massin, CEO at The SCE Group & Gleb EvfaresTov, Solutions Engineer at Bitglass Recorded: Oct 17 2017 29 mins
    The modern science of securing applications to a broad range of devices.

    Do you want people accessing your data from that device? Do you know where that device has been? Would you trust that device to protect your personal data? While cloud applications offer tremendous benefits over traditional on-premise, IT Executives face many challenges involving data security and compliance. Unmanaged devices, unauthorized access, and unsanctioned apps are all significant threats, increasing the risk of data leakage and being the next organization in the headlines. Cloud access security brokers, or “CASBs” are the tools technology leaders have turned to, protecting data across applications, and mitigating other malicious threats.

    In this webinar, Benjamin Massin, CEO of The SCE Group, and Gleb EvfaresTov, Solutions Engineer at Bitglass, will discuss how to balance the benefits of moving to the cloud, while implementing a security solution, protecting identities and data end-to-end.
  • Connected devices and the rise of invisible payments
    Connected devices and the rise of invisible payments Kevin Gordon, Lead Innovation Architect, Worldpay Recorded: Oct 17 2017 31 mins
    By 2020, five billion people will be online, with 25 billion devices and machines using the Internet. Many devices will share data and services, and the way we engage with them will fundamentally change. In a connected world, consumer expectations of executing transactions on a phone, tablet, VR device – or even a refrigerator – will be higher than ever.

    As time goes on, devices will become smarter and make more and more decisions for us. We’ll be able to create rules as users to tell our devices what we’re comfortable with them paying for automatically. The use cases for rule-based payment are endless!

    As such, the onus of creating frictionless download and shopping experiences while overcoming barriers between devices lies with each business. When it comes to recurring and subscription payments, the technology underpinning these user experiences across devices is critical. Seamless, simple, and secure are the watchwords of an IoT world.

    Don’t wait until 2020 to address consumer pain points and overcome technological barriers to IoT adoption. Tune in to the latest VB Live event and hone in on the fastest, best ways to prepare for the IoT world. After all, it’s already here. Attend this webinar and find out:

    •How companies are already dealing with device connectivity
    •How the challenges posed by IoT are being solved for today
    •Global consumer attitudes around payments made by devices
    •How payments will become ‘invisible’ or ‘translucent’ for users
    •Payment technology that will enable devices to make decisions

    SPEAKERS:
    * Kevin Gordon, Lead Innovation Architect, Worldpay
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by: Worldpay
  • Instant Payments - Is Your Business Ready for the Real-time Challenge?
    Instant Payments - Is Your Business Ready for the Real-time Challenge? Jean-Noel Georges, Global Program Director, Frost & Sullivan, Tristan Blampied, Pelican and Petra Plompen, EBA Clearing Recorded: Oct 12 2017 50 mins
    In today’s digital marketplace, consumers and businesses increasingly expect to be able to make instant payments, wherever they are, and at any time of day. The adoption of real-time payments capabilities is very much an essential for banks who wish to retain market share and capture new customers.
  • Case Study: Transform Threat Investigation With a Stretched Security Team
    Case Study: Transform Threat Investigation With a Stretched Security Team Arabella Hallawell, Sr. Director Advanced Threat Product Marketing + Deb Briggs, CSO, NETSCOUT Recorded: Oct 12 2017 43 mins
    Chief Information Security Officer Reveals How With Arbor Spectrum.

    Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.

    Join us to hear:
    - NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
    - In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
  • Forrester Total Economic Impact Study of CA APM
    Forrester Total Economic Impact Study of CA APM Dean Davison, Principal Consultant, Forrester Research and Pete Waterhouse, Advisor, CA Technologies Recorded: Oct 12 2017 64 mins
    In this golden age of software applications, delivering a great customer experience at scale is a business differentiator. Microservices platforms, containers and cloud-native applications promise faster time-to-market but introduce unparalleled complexity. Added value can quickly be eroded by failing to understand and manage your application performance across environments that are in a constant state of change.

    Join us for this special webcast, where guest speaker Dean Davison, Principal Consultant, Forrester Research will discuss findings from the recent Total Economic ImpactTM (TEI) of CA Application Performance Management (APM) that can assist businesses evaluating this solution – including the potential to realize: $5.4 Million NPV, 316% ROI and payback in 3 months.

    Joining Dean, Pete Waterhouse, Advisor, CA Technologies will outline the essential elements of a modern APM solution needed to deliver these outcomes.
  • AI facts vs fiction: AI business decisions that really work
    AI facts vs fiction: AI business decisions that really work Avinash Gangadharan, Sr Director of Engineering, Walmart Recorded: Oct 10 2017 61 mins
    Artificial intelligence was Gartner’s top 2017 strategic technology trend, and the year isn’t over yet. But for too many companies, AI myths are persistent, use cases and strategies are still on the “shiny new thing” level, and expectations continue to hover in the spirit of Skynet/HAL, making it hard to determine whether it’s really right for your company.

    As AI technologies multiply, how do you sort fact from fiction? Should you stop daydreaming about replacing your entire staff with chatbots — or can you start augmenting agent abilities? Most importantly, while AI undoubtedly has shown real-live ROI in case study after case study, where is the particular value in chasing the AI buzz for your own company?

    Register now for our our latest VB Live event and find out. We’ll be tackling the AI legends and the AI realities, breaking down the potential AI has for your bottom line, and giving you a glimpse of the future of AI for business.

    In this webinar, you’ll explore:
    * Myths and realities of AI replacing vs. augmenting staff functions
    * How to bake AI into your business strategy
    * On- and offline use cases for AI
    * The future of AI for business

    Speakers:
    * Avinash Gangadharan, Sr Director of Engineering, Walmart
    * Allen Sebrell, Senior Manager E-Commerce Team, Amtrak
    * Deep Varma, VP of Engineering, Trulia
    * Stewart Rogers, Analyst-at-Large, Venturebeat
    * Rachael Brownell, Moderator, VentureBeat
  • Retail Survival in the Age of Digital Disruption
    Retail Survival in the Age of Digital Disruption Sheryl Kingstone 451 Research, Sudesh Girdhari CenturyLink Recorded: Oct 10 2017 57 mins
    Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.

    The retail industry is bursting with digital innovation driving change. This session will review:
    •How differentiation demands digital maturity
    •Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
    •The role of cloud services and its impact on customer experience, agility, efficiency and risk
  • Security Briefings Part 2: Compliance Checkup - GLBA & the Cloud
    Security Briefings Part 2: Compliance Checkup - GLBA & the Cloud Jacob Serpa, Product Marketing Manager, Bitglass; Brandon Dunlap (Moderator) Recorded: Oct 5 2017 60 mins
    Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they also face heavier regulations than many other verticals. In particular, these organizations must reach compliance with regulations like the Gramm-Leach-Bliley Act (GLBA). As cloud adoption continues to spread within the industry, financial firms must be particularly focused on achieving cybersecurity in ways that ensures compliance. Join Bitglass and (ISC)2 on October 5, 2017 at 1:00PM Eastern as we discuss the different aspects of GLBA that financial services organizations need to know and how different tools that can help with compliance.
  • Take Action: Improving Cybersecurity in the Health Care Industry
    Take Action: Improving Cybersecurity in the Health Care Industry Chris Apgar, CISSP; CEO & President, Apgar & Associates; Bud Walder, Vice President Sales & Marketing DataMotion Recorded: Oct 4 2017 59 mins
    In this webinar, security and privacy expert Chris Apgar will review highlights from a recently published Health Care Industry Cybersecurity (HCIC) Task Force report, including findings and recommendations for the industry and some practical implications for implementing these recommendations. The HCIC Task Force was formed by the 2015 Cybersecurity Act passed by Congress and charged with addressing challenges the health care industry faces in securing and protecting against cybersecurity threats. In June of 2017 the Task Force released a comprehensive 96-page report called “Improving Cybersecurity in the Health Care Industry”. During the webinar, Apgar will net out pertinent and actionable report content including:
    •State of Cybersecurity in the Health Care Industry
    •Risks across the Health Care Industry
    •Imperatives, recommendations and action needed
  • Forging our Future with ARKit: Balancing Tech Investments in Augmented Reality
    Forging our Future with ARKit: Balancing Tech Investments in Augmented Reality John Buzzell, Ricardo Olivo Recorded: Oct 3 2017 64 mins
    Apple and Google have joined the call for an Augmented Reality future, bringing hundreds of millions of users with them. Given multiple visions for the massive opportunity ahead, how should we divide our efforts? In this webcast, you’ll hear expert opinions from a group living this challenge. VR/AR Association Marketing Committee Chair John Buzzell and YOU ARE HERE technology lead Ricardo Olivo will reveal their journey – from Vuforia and HoloLens to ARKit and beyond – covering use cases, technology insights, hardware challenges and more. You’ll learn where to place your bets, and how to make the most of this transition. This session will also include 30 minutes of Q&A to help you make sense of your VR/AR options.
  • AI for Autonomous Response: The Machine Fights Back
    AI for Autonomous Response: The Machine Fights Back Andrew Tsonchev, Director of Cyber Analysis & Dan Fein, Senior Cyber Technology Lead Recorded: Sep 29 2017 41 mins
    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.

    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats?

    Darktrace recently ran tests across enterprises of all sizes in a variety of industries and has subsequently deployed AI-autonomous response in over one hundred organizations. In this presentation, we will discuss our lessons learned and explore several use-cases in which AI-based ‘Autonomous Response’ technology augmented human security teams.

    This session will cover:
    AI approaches and algorithms for detecting and responding to threats
    How human teams adopt (or resist) automated defenses
    The concepts of ‘human confirmation’ mode and ‘active defense’
    Real-world examples of autonomous response in action
  • Defending Against Cyber Crime
    Defending Against Cyber Crime Lisa Forte, Cyber Protection Officer, South West Police Cyber Crime Unit Recorded: Sep 29 2017 46 mins
    The South West Regional Cyber Crime Unit are involved in fighting cyber crime along with other national and international law enforcement agencies.

    As such they see certain traits, methodologies and vulnerabilities over and over again. Lisa Forte, the Cyber Protect Officer for the Unit, will be explaining how businesses should adapt their thinking to "see what the hackers see" to better defend themselves against the threat she sees every day.

    Lisa will also be talking about the importance of planning and war gaming out cyber attack scenarios. The businesses that have a plan are the businesses that survive to tell the tale. Lisa will be using real life cases that the Cyber Crime Unit have dealt with to highlight how quickly things can go wrong as well as providing some simple steps businesses can apply to reduce their vulnerability.

    Speaker bio:

    Lisa Forte is the Cyber Protection Officer for the South West Police Cyber Crime Unit. Her role involves helping businesses of all shapes and sizes defend against the ever growing cyber threat. Prior to working in the Cyber Crime Unit Lisa worked in intelligence for Counter Terrorism agencies in the UK.
  • The Increasing Risk of DDoS Attacks – Are You Adequately Prepared?
    The Increasing Risk of DDoS Attacks – Are You Adequately Prepared? Tom Bienkowski Director of DDoS Product Marketing Arbor Networks + John Pearson Founder and Chief Strategist IP Networks Inc. Recorded: Sep 28 2017 45 mins
    The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:

    -The latest trends in DDoS attacks
    -The importance of proper network visibility for anomaly & DDoS attack detection.
    -Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
  • How the GDPR Impacts Your Enterprise Mobility Management Practices
    How the GDPR Impacts Your Enterprise Mobility Management Practices Magnus Mjøsund, Apperian Product Manager & Chris Marsh, 451 Research Director, Workforce Productivity & Compliance Recorded: Sep 28 2017 57 mins
    The European Union’s General Data Protection Regulation (GDPR) that goes into effect on 25 May 2018 expands the meaning of personal data, mandates when such data can be collected, and enforces full transparency and consent from the user. Organizations of all types processing data from EU residents must evaluate and likely make changes to their enterprise mobility management practices in order to adhere to the new law or face severe penalties.

    Join this webinar to understand what GDPR means for infrastructure and operations professionals that are responsible for mobile and endpoint strategy to make sure your organization is compliant from day one.

    We will review the most important sections of the law related to enterprise mobility from an administration and end user perspective as well as the implications for BYOD programs. EMM should be leveraged to meet GDPR requirements and you will learn how a mobile application management solution like Apperian supports privacy and mitigates risk by managing corporate data while leaving personal data untouched.
  • Virtual Umbrella: Why We Chose Virtual Reality
    Virtual Umbrella: Why We Chose Virtual Reality Samantha Kingston, Founder, Virtual Umbrella Recorded: Sep 28 2017 34 mins
    Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.

    Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.

    Speaker bio:

    Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
  • What’s New in ALM - Enhancing your team’s efforts to deliver amazing Apps
    What’s New in ALM - Enhancing your team’s efforts to deliver amazing Apps Oren Ziv, Collin Chau, Esther Balestrieri Recorded: Sep 27 2017 57 mins
    ALM QC 12.55 has just been released in August, providing enhanced features and benefits for Application teams, end users and ALM admins working together to deliver high quality applications with confidence.

    Join us as we review the key newly released capabilities of ALM/QC 12.55 and walk through a live demo.

    ALM/QC 12.55 Highlights include:

    •Test board enhancements providing improved user experience for test management and execution
    •Support for Quality of Things (QoT) – ALM client for offline/online Internet of Things (IoT) & device manual testing
    •Improved collaboration through integration of Skype for business
    •Upgraded administration with ability to back up large files
    •Synchronization tools connecting ALM to other management tools such as JIRA, TFS and RTC

    We will also discuss the benefits of ALM Octane – our next-generation ALM product with Agile and DevOps capabilities built in, and how you can get started today!
  • Forget the Buzzwords - It's Time for Virtual Reality to Deliver Real Value
    Forget the Buzzwords - It's Time for Virtual Reality to Deliver Real Value Brian Herrera, CEO and Co-Founder of Vidi VR Recorded: Sep 27 2017 62 mins
    Despite the past two years of hoopla surrounding VR technology, adoption rates are low and retention rates are even worse. Giants such as Facebook, Google, and Samsung have dumped billions into the space, but why isn't it taking off yet? In this webinar, Brian Herrera, CEO of Vidi VR, will give an outsider's look at the inside of this nascent industry and lead a candid discussion about:

    - Hurdles in the way of widespread adoption (spoiler alert: it's NOT technology)
    - The true value proposition of VR for consumers
    - What the big players and "thought leaders" got wrong
    - How Vidi VR is a differentiator in the industry