Hi [[ session.user.profile.firstName ]]
Sort by:
    • Transform Big Data Management into a Big Advantage Transform Big Data Management into a Big Advantage Mark Beyer, VP & Distinguished Analyst, Gartner & Awez Syed, VP Product Management, Informatica Recorded: Mar 17 2016 7:55 pm UTC 27 mins
    • Watch Gartner VP and Distinguished Analyst, Mark Beyer, along with Informatica VP of Product Marketing, Awez Syed, as they discuss big data management.

      Big data offers new opportunities and new challenges. Gartner has stated, “Through 2018, 70% of Hadoop deployments will fail to meet cost savings and revenue generation objectives due to skills and integration challenges.” But a new class of big data management solutions is enabling organizations to consistently and reliably meet business demands and deliver business value. Capabilities like self-service data preparation combined with common sense approaches to data security, data governance, and metadata management can enable organizations to turn big data into big value.

      Join this webinar to learn some of the opportunities of big data management with Gartner’s Mark Beyer and learn how Informatica’s Big Data Management solution can help your organizations turn more data into business value without more risk from Informatica's Awez Syed.

      Read more >
    • How to Use the Gartner Magic Quadrant for WCM to Your Advantage How to Use the Gartner Magic Quadrant for WCM to Your Advantage Robert Rose, Digital Clarity Group Recorded: Feb 23 2016 9:45 am UTC 63 mins
    • To stay afloat in today's digital world, the enterprise needs a Content Management System that is more than a simple publishing tool. According to Gartner, “IT application leaders, marketers, digital experience specialists and merchandizers all now view WCM as mission-critical.”

      Truly delivering on the promise of the online customer experience is about more than a feature or functionality -- it’s about agility, collaboration and an understanding of customer needs across the entire buyer’s journey. The right software can serve as a strategic partner helping enterprises stay ahead of the curve, but selecting the right tool can be an overwhelming task if you don't know how to parse through all the buzzwords and detail-dense descriptions.

      The Gartner Magic Quadrant is the go-to resource for an objective perspective on technology and gaining useful insights on WCM solutions. Discover how to read between the lines of this report with Robert Rose, Senior Analyst of the Digital Clarity Group, so you don't have to select your WCM solution in the dark.

      Hippo announced its entry into Gartner’s “Magic Quadrant for Web Content Management” as the only open source Java WCM technology included in the Magic Quadrant in 2015. A complimentary copy of the Gartner, Inc. 2015 “Magic Quadrant for Web Content Management” research report is available for download on onehippo.com

      To learn even more about selecting a future-proof enterprise WCMS, read our Whitepaper: http://www.onehippo.com/en/resources/whitepapers/selecting-today%E2%80%99s-enterprise-web-content-management-system.html

      Read more >
    • STRONG ON THE INSIDE: The Growing Need for Internal Segmentation Firewalls STRONG ON THE INSIDE: The Growing Need for Internal Segmentation Firewalls Fortinet and Gartner Recorded: Mar 21 2016 8:40 pm UTC 220 mins
    • Cloud applications and BYOD have brought new functionality to enterprise networks—and unfortunately, also new security weaknesses and opportunities for cyber espionage. Theft of intellectual property and proprietary data now amounts to billions of dollars in losses each year.

      Register now for this webcast with lead analyst firm Gartner that explores how Internal Segmentation Firewalls (ISFW) close a major security gap for businesses of all sizes.

      Learn about the growing pervasiveness of targeted attacks worldwide, with current data that shows how a single malicious breach can cripple a company

      Understand how ISFWs differ from traditional firewalls—and why they can uniquely reduce the attack surface, contain internal threats, and minimize damages after a breach occurs

      Find out why multi-gigabit performance is critical to an ISFW’s ability to provide deep visibility without slowing down the network

      Don’t miss the “Strong on the Inside: The Growing Need for Internal Segmentation Firewalls” webcast, featuring leading experts from Gartner and Fortinet as they discuss the latest in internal network security for today’s threat landscape.


      Read more >
    • The State of Enterprise Endpoint Backup: Gartner's 2015 Capabilities Report The State of Enterprise Endpoint Backup: Gartner's 2015 Capabilities Report Seyi Verma, Product Marketing, Druva; Michael Shisko, Director, Information Technology, Hitachi Consulting Recorded: Dec 17 2015 6:00 pm UTC 50 mins
    • Gartner just released their 2015 Critical Capabilities for Enterprise Endpoint Backup report. In this must-read for IT professionals, Gartner notes that endpoint backup has gone beyond simple backup to address broader end-user data protection and governance use cases.

      Join us for an overview of the 11 critical capabilities that help you as an IT leaders evaluate enterprise endpoint backup solutions for your organization.

      Michael Shisko, Director, Information Technology, at Hitachi Consulting, will provide a practitioner's view at how these capabilities support his organization’s ability to manage and govern sensitive data.

      During this webinar, the speakers will discuss:

      * Key report findings and recommendations
      * New features that go beyond endpoint backup, such as Security, Data Governance, Public Cloud Integration, and Mobile Device Support
      * Real-world advice for evaluating solutions for your organization

      Find out why Gartner has rated Druva highest overall for Enterprise Endpoint Backup, for the third consecutive time.

      Registrants will receive a free copy of the Gartner report.

      Read more >
    • Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember Recorded: Dec 3 2015 6:00 pm UTC 62 mins
    • According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.

      Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.

      Join this webinar to learn:
      • The key stages in the evolution of a post-infrastructure approach to security
      • Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
      • Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps

      Read more >