Hi [[ session.user.profile.firstName ]]
Sort by:
    • Disrupting the Speed and Cost of Taking Your Business Mobile Disrupting the Speed and Cost of Taking Your Business Mobile Elaine Zelby, Product Marketing Manager, Capriza Recorded: Sep 25 2014 5:00 pm UTC 32 mins
    • Enterprise mobility empowers and liberates your workforce by accelerating critical business processes and boosting overall productivity. Early adopters of mobile development have already experienced these benefits as well as improved operational efficiencies, however most organizations struggle with the barriers imposed by skill set requirements (mobile developers), complicated architecture, and lengthy mobile app development cycles.

      During our session, Capriza will examine the benefits and challenges associated with mobilizing your enterprise and will introduce and explore Capriza's disruptive end-to-end mobility platform delivering rapid design and deployment of cross-platform mobile apps for even the most customized enterprise applications. We will discuss a few case studies of how DirecTV, Brocade, and Robert Half International are taking their businesses mobile and will conclude the session by designing and deploying a mobile app in 10 minutes without writing a single line of code or requiring complex APIs.

      Read more >
    • Get a grip! Taking control of today’s identity and access management realities Get a grip! Taking control of today’s identity and access management realities Scott Crawford 451 Research and Brandon Whichard IBM Recorded: Mar 30 2016 6:00 pm UTC 49 mins
    • Remember the IT of just a few short years ago? We may not have thought so then, but what a much simpler time it was…applications under enterprise control, unified access and a limited number of systems to manage corporate identities. How much has changed! Today, cloud and mobile have stretched IT to reach new people in new ways – from third party suppliers and partners to the pocket of the retail customer. But this new reach also puts the enterprise at greater risk of losing control over access to sensitive information resources.

      It doesn’t have to be that way. In this webinar, Scott Crawford, research director of information security at 451 Research, and Brandon Whichard with IBM will illustrate how today’s risks go beyond simply stretching demands on user identities and access – and how, with visibility and control across a wide spectrum of IT, enterprises can take back control, if they know where and how to act.

      Read more >
    • IT Governance Vs Compliance - Taking Back the Strategy High Ground IT Governance Vs Compliance - Taking Back the Strategy High Ground Peter Hubbard, Principal ITSM Consultant @ Pink Elephant EMEA Recorded: Mar 9 2016 10:00 am UTC 49 mins
    • One of the most critical challenges IT departments have is ensuring their IT strategy underpins the business strategy, and more importantly, is seen and understood by the business to underpin its strategy while adding value.

      Establishing an IT governance model is the tool and method which allows senior managers to choose key focus areas from multiple best practice frameworks, such as ITIL, PRINCE2, ISO27001 and ISO38500. They do this to ensure the structure of the IT department, and the capabilities of those departments deliver value and align as closely as possible to the business needs. Join Peter Hubbard, Pink Elephant EMEA, as he takes the mystery out of ensuring your IT strategy not only underpins the business strategy, but is seen to underpin it with concrete defined processes, activities, controls, metrics and deliverables all mapped back to defined business needs.

      Read more >
    • Taking The Pain Out Of User Provisioning Taking The Pain Out Of User Provisioning Donna Horton and Russell Smith Recorded: Dec 9 2015 6:00 pm UTC 45 mins
    • User provisioning is one of those tasks that many administrators detest. Not only does it take a significant amount of time to setup a new user, but it also takes time to assign all the permissions a user needs, especially when multiple applications need to be configured as well. Once that’s all setup, then you have to email out confirmations, deal with exceptions, and hope that you’ve crossed every t and dotted all of your i’s.

      In this webinar, you will learn:

      *How to avoid the common pitfalls of user provisioning.
      *How to optimize your user provisioning process.
      *How to work with error and exception handling.
      *How to automate common tasks and reduce number of emails sent.

      Read more >
    • 5 Integration Tools You're Probably Not Taking Advantage Of 5 Integration Tools You're Probably Not Taking Advantage Of Tom Martin, Business Development Manager - Salesforce Recorded: Nov 18 2015 4:00 pm UTC 43 mins
    • Today’s customers expect fast, personalized service. But how do you meet customer expectations when you’re clicking through multiple screens to find the correct information, manually combining reports and managing a distributed workforce? Cloud integration can help. Register for our webinar to learn which integration tools you should be leveraging to take your customer experience to new heights and give your business a competitive edge.

      In this webinar you’ll learn:
      - The difference between patchwork and seamless integrations
      - Tips to wow customers and streamline your customer service processes
      - Ways to gain a holistic view of your daily operations
      - How to create consistency between your different locations and departments

      Read more >
    • Taking a Structured Security Approach to your Structured & Unstructured Data Taking a Structured Security Approach to your Structured & Unstructured Data Vormetric, 451 Research and Intel Security Recorded: Nov 10 2015 6:00 pm UTC 57 mins
    • With all of the high profile and often successful hacks, we know what cyber criminals are after, IT’S THE DATA
      With the significant security risks posed by both unstructured and structured data on physical, hybrid and virtual environments
      THERE IS NO SILVER BULLET TO PROTECT IT ALL
      There however is a structured and methodical way to approach these threats by coordinating comprehensive database and file security with proactive threat analytics and complete end-to-end forensics which can significantly mitigate data breach risks without breaking the bank.

      Join 451 Research, Intel Security, & Vormetric for an enlightening webinar where you will be briefed on the current state of the data threat and the right methodology to secure your data and your organization.

      Read more >