Hi [[ session.user.profile.firstName ]]
Sort by:
    • Integrating Business Process Management in a Microservices World Integrating Business Process Management in a Microservices World David Bush Senior Consultant, Business Automation Practice, Red Hat Recorded: Dec 29 2016 8:00 pm UTC 61 mins
    • Traditionally, business process management (BPM) programs have focused on standardization and continuous improvement— but programs that require discovery, modeling, and analysis can result in long lead times. And businesses can no longer tolerate long implementations as they need to react quickly to changing customer expectations.

      Red Hat® JBoss® BPM Suite can be integrated into a MSA (Microservice Architecture) to support frequent deployments, multiple concurrent versions, and flexible scaling; enabling IT to respond more quickly to the needs of the business.

      Watch this webcast to learn how to:
      • Embed business processes in microservices
      • Support business transformation with frequent process deployments
      • Choreograph microservices without controlling them
      • Use tracking processes to implement SLA (Service Level Agreement) management
      • Discover processes from events in a microservice architecture

      Read more >
    • Architecture & Process: The Business Architecture Virtual Summit Architecture & Process: The Business Architecture Virtual Summit Nathaniel Palmer, Prof Mark von Rosing, Henrik von Scheel, Lloyd Dugan, Denis Gagne, et al. Recorded: Dec 11 2013 3:00 pm UTC 259 mins
    • Produced jointly by BPM.com and Business Process Incubator, the Business Architecture Virtual Summit is the first event of its kind, designed to specifically to understand and evaluated tools and methods for Enterprise Modeling, Business Architecture, and Process Analysis.

      The Summit combines expert-led sessions with 30-minute capability demonstration from leading participating tool providers.

      Why You Should Attend:
      • Learn the most up-to-date strategies, techniques, and technologies for successful Enterprise Modeling, Business Architecture, and Process Analysis.
      • Gain first-hand knowledge of the transformation success stories and current initiatives underway within Fortune 500 and Global 2000 firms.
      • Find new opportunities and partners for succeeding with business transformation
      • Gain actionable information for enabling continuous process improvement.

      BONUS:
      All participants will receive a copy of the “Enterprise Modeling and Business Architecture Buyer’s Guide” to be released during the Virtual Summit.

      Who Should Attend:

      Architecture & Process is defined foremost for Enterprise Architects and Program Managers, as well as Business Process Architects, Operations Managers, IT Strategists, and Business Analysts. Participants will be involved in managing business operations, defining enterprise architecture, as well as standards definitions, policy making and business process management initiatives. Previous participants were split between government, defense and Fortune 500 companies.

      Read more >
    • 2014 Architecture & Process: The Business Architecture Virtual Summit 2014 Architecture & Process: The Business Architecture Virtual Summit Nathaniel Palmer, Mark von Rosing, Henrik von Scheel, Lloyd Dugan, Denis Wisnosky, et al. Processing: Feb 27 2014 3:00 pm UTC 360 mins
    • Produced jointly by BPM.com and Business Process Incubator, the Business Architecture Virtual Summit is the first event of its kind, designed to specifically to understand and evaluated tools and methods for Enterprise Modeling, Business Architecture, and Process Analysis.

      The Summit combines expert-led sessions with 30-minute capability demonstration from leading participating tool providers.

      Why You Should Attend:
      • Learn the most up-to-date strategies, techniques, and technologies for successful Enterprise Modeling, Business Architecture, and Process Analysis.
      • Gain first-hand knowledge of the transformation success stories and current initiatives underway within Fortune 500 and Global 2000 firms.
      • Find new opportunities and partners for succeeding with business transformation
      • Gain actionable information for enabling continuous process improvement.

      BONUS:
      All participants will receive a copy of the “Enterprise Modeling and Business Architecture Buyer’s Guide” to be released during the Virtual Summit.

      Who Should Attend:

      Architecture & Process is defined foremost for Enterprise Architects and Program Managers, as well as Business Process Architects, Operations Managers, IT Strategists, and Business Analysts. Participants will be involved in managing business operations, defining enterprise architecture, as well as standards definitions, policy making and business process management initiatives. Previous participants were split between government, defense and Fortune 500 companies.

      Read more >
    • Tying cyber attacks to business processes, for faster mitigation Tying cyber attacks to business processes, for faster mitigation Prof. Avishai Wool Recorded: Jan 10 2017 4:00 pm UTC 56 mins
    • Time is not on your side when managing security for a global enterprise and facing down a relentless barrage of cyber attacks. So when confronted with multiple suspect alerts flagged by your SIEM solution, you need a way to easily sift through and identify the attacks that will most likely impact key business processes – and quickly take action.
      Presented by renowned industry expert Prof. Avishai Wool, this new webinar will cover security best practices for introducing business context into your organization’s incident response processes, and prioritizing and automating remediation efforts accordingly. This insight will give you the intelligence you need to reduce the time and cost of mitigating cyber attacks by orders of magnitude.
      In this webinar Professor Wool will cover how to:
      - Augment incident triage with critical business context to assess the severity, risk and potential business impact of an attack
      - Prioritize incident remediation efforts based on business risk
      - Neutralize impacted systems through zero-touch automation
      - Limit the lateral movement of an attacker in, out and across your network
      - Keep all stakeholders involved in the remediation process to reduce disruption to the business

      Read more >