Hi [[ session.user.profile.firstName ]]
Sort by:
    • An IoT Analytics Framework to transform Customer Experience
      An IoT Analytics Framework to transform Customer Experience Hyoun Park, Blue Hill Research Recorded: Dec 2 2016 6:00 pm UTC 57 mins
    • The Internet of Things is a generational opportunity to create a new world where data, technology, and people are integrated to transform customer experience. This connected customer experience, powered by sensors, data, and processes, is driven at the individual level and needs to be relevant, real time, and convenient. It also needs to support an entire customer journey.

      In this webinar, Blue Hill Research will explore the IoT Analytics Framework necessary to support the connected customer slated to arise in verticals such as retail, hospitality, healthcare, utilities, and transportation. By looking at experience across multiple verticals and exploring the commonalities in data types, data access, and data-driven responses that define the connected customer, this presentation will provide best practices that enterprises should consider to maximize the value of the Internet of Things.

      Read more >
    • Embedded Analytics to Bridge the Last Mile to Business Value
      Embedded Analytics to Bridge the Last Mile to Business Value Hyoun Park, Blue Hill Research and Haarthi Sadasivam, Looker Recorded: Oct 4 2016 5:00 pm UTC 48 mins
    • For analytics to make a meaningful organizational impact, organizations have to effectively embed analytics into key business tasks and decisions such as sales operations, ecommerce, workforce management, product and service workflows, revenue recognition, and financial performance. Blue Hill's research, including interviews, case studies, surveys, and vendor briefings, consistently show that effective analytic usage requires embedding analytics into a variety of workflows in a repeatable, scalable, and consistent fashion that leads to real-time visibility. Although this may seem to be a straightforward task, Blue Hill finds that a majority of companies fail to meet this standard of flexible and value-driven embedded analytics for a variety of reasons, including the following:

      Internal analytics cannot be easily scaled to serve organization-wide data or users
      Analytics cannot be easily configured or customized to meet specific user needs
      Companies lack a repeatable process for embedding analytics for similar data processes
      End users can't get the right data sources connected to the right analytic tasks
      Key analytic views are not directly connected to the current version of the truth

      In this webinar, Blue Hill Research will provide guidance on the key reasons that traditional BI deployments, even those created based on historical "best practices" for analytics, fail to achieve these goals and the benefits associated with supporting embedded analytics as an ongoing Sixth Sense to improve business performance rather than a never-ending series of one-off requests.

      Read more >
    • Defending the Cloud
      Defending the Cloud Alex Hilton (CIF) | Chris Hill (Barracuda Networks) | Patrick Grillo (Fortinet) | Paul Dignan (F5 Networks) Recorded: Jun 5 2018 10:30 am UTC 51 mins
    • This panel of cloud and security experts will discuss the different ways enterprises are securing their cloud environments.

      Join top cloud and security experts for this interactive Q&A discussion on:
      - The top cloud trends in 2018
      - Encryption, key management and beyond
      - Biggest threats to the cloud
      - How to better safeguard data and privacy

      Speakers:
      - Alex Hilton, Chief Executive, Cloud Industry Forum
      - Chris Hill, RVP Cloud EMEA, Barracuda Networks
      - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
      - Paul Dignan, Global Technical Account Manager, F5 Networks

      The session will be streamed LIVE from London from the Infosecurity Europe conference.

      By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy).

      Read more >
    • [Panel] Defending the Cloud
      [Panel] Defending the Cloud Alex Hilton, Cloud Industry Forum; Chris Hill, Barracuda Networks; Patrick Grillo, Fortinet; Paul Dignan, F5 Networks Upcoming: Jun 27 2018 9:00 am UTC 60 mins
    • This panel of cloud and security experts will discuss the different ways enterprises are securing their cloud environments.

      Join top cloud and security experts for this interactive Q&A discussion on:
      - The top cloud trends in 2018
      - Encryption, key management and beyond
      - Biggest threats to the cloud
      - How to better safeguard data and privacy

      Speakers:
      - Alex Hilton, Chief Executive, Cloud Industry Forum
      - Chris Hill, RVP Cloud EMEA, Barracuda Networks
      - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
      - Paul Dignan, Global Technical Account Manager, F5 Networks

      By watching this webinar, you consent to the transfer of your personal information outside your country of residence, where standards of data protection may be different. You understand that the information you provide will be treated in accordance with the F5 Privacy Policy (https://f5.com/about-us/policies/privacy-policy)

      Read more >
    • TIBCO Spotfire User Comparison & Analysis
      TIBCO Spotfire User Comparison & Analysis James Haight, Principal Analyst Blue Hill Research Recorded: Feb 10 2016 6:00 pm UTC 60 mins
    • As organizations continue to recognize the advantages of self-service analytics and data discovery they are evaluating alternatives to legacy Business Intelligence environments. To better understand this process, Blue Hill Research conducted a dedicated study to understand how users evaluate TIBCO Spotfire in comparison to other tools and how TIBCO Spotfire impacts their organization.

      Blue Hill Research analyzed the experiences of 131 current TIBCO Spotfire customers to evaluate how they use TIBCO Spotfire and how they rate their experience. Among a number of areas, Blue Hill Research investigated:

      · TIBCO Spotfire’s ease of use in comparison to other solutions

      · The time-to-value associated with choosing TIBCO Spotfire

      · The most common use cases for TIBCO Spotfire

      Join Principal Analyst James Haight from Blue Hill Research as he discusses the findings of his research initiative into deconstructing how and why organizations are choosing TIBCO Spotfire. For those considering an investment in TIBCO Spotfire this webinar will discuss how TIBCO Spotfire is typically rated and used. For existing TIBCO Spotfire users, this webinar presents an opportunity to see how your experience compares to that of peer organizations.

      Registrants will receive a complimentary copy of Blue Hill Research’s TIBCO Spotfire User Experience Analysis Benchmark Report

      Read more >
    • Simplify and Accelerate your GDPR Compliance Efforts
      Simplify and Accelerate your GDPR Compliance Efforts Tim Hill, Director of Product Management and Strategy Recorded: Feb 20 2018 7:00 pm UTC 30 mins
    • As we’re all aware, GDPR will be enforced starting May 25th, 2018 and organizations should understand which aspects of its preparations will be in place before the deadline.

      Much like other technological shifts of the last decade —GDPR will change the way our organization handles personal data. GDPR will require organizations to implement specific, defined controls over the handling of collected personal data, with the primary objective of streamlining data security regulations and bolstering data protection in the face of a fast-evolving technology landscape.

      Join this webinar with guest speaker Tim Hill, Director of Product Management and Strategy from Centrify, as he discusses best practices around frameworks and architectures needed to ensure better business process and data management.

      Tim will also cover how organizations with a strong IAM strategy in place are more likely to provide better notification and more openness if and when data has been compromised.

      Register for this webinar and learn:

      - Key elements to consider as the deadline for GDPR approaches
      - How a strong IAM strategy enables organizations to quickly identify whose data they are responsible for and where its stored.
      - How Centrify’s Zero Trust approach to IAM can help you prepare for GDPR’s underlying policy goals.

      Read more >
    • Simplify and Accelerate Your GDPR Compliance Efforts
      Simplify and Accelerate Your GDPR Compliance Efforts Tim Hill, Director of Product Management and Strategy Recorded: Mar 13 2018 11:15 am UTC 30 mins
    • As we’re all aware, GDPR will be enforced starting May 25th, 2018 and organisations should understand which aspects of its preparations will be in place before the deadline.

      Much like other technological shifts of the last decade —GDPR will change the way our organisation handles personal data. GDPR will require organisations to implement specific, defined controls over the handling of collected personal data, with the primary objective of streamlining data security regulations and bolstering data protection in the face of a fast-evolving technology landscape.

      Tim Hill, Director of Product Management and Strategy from Centrify, discusses best practices around frameworks and architectures needed to ensure better business process and data management.

      Tim will also cover how organisations with a strong IAM strategy in place are more likely to provide better notification and more openness if and when data has been compromised.

      Listen to this webinar and learn:

      - Key elements to consider as the deadline for GDPR approaches
      - How a strong IAM strategy enables organisations to quickly identify whose data they are responsible for and where its stored.
      - How Centrify’s Zero Trust approach to IAM can help you prepare for GDPR’s underlying policy goals.

      Read more >
    • Take Advantage of Cloud Backup to Kick-Start Your Disaster Recovery
      Take Advantage of Cloud Backup to Kick-Start Your Disaster Recovery Steven Hill, Senior Analyst - Storage Technologies, 451 Research | Seyi Verma, Sr. Product Marketing Manager, Druva Recorded: Oct 11 2017 10:50 pm UTC 60 mins
    • As organization’s storage needs grow and expand geographies, they find that they do not have a comprehensive plan to rapidly recover from a natural disaster, cyberattack, or equipment failure. To make matters worse, companies that rely on traditional backup and recovery solutions are simply not able to keep up with the increasing data needs of today’s enterprise. These systems are overly complex, costly, and don’t scale well with the business.

      A comprehensive answer to these data growth challenges is merging cloud backup with disaster recovery (DR). A unified solution that is cloud-native provides unlimited scalability, instant availability, long-term retention, and minimizes the impact on the business in case of a disaster. This seamless manageability and visibility of data across a range of locations and applications is crucial for long-term success.

      Join Senior Analyst of Storage Technologies, Steven Hill of 451 Research and Druva’s Senior Product Marketing Manager, Seyi Verma, where they’ll highlight:

      - The growing need for updating and improving disaster recovery and data backup
      - What factors to consider when building a BCDR plan
      - What to beware of when evaluating legacy and hybrid models for backup and DR
      - How cloud‐native backup and DR provides immediate failover to minimize downtime and impact
      - And more!

      Read more >
    • [PANEL] The Evolution of Data & Analytics in Large Scale Financial Institutions
      [PANEL] The Evolution of Data & Analytics in Large Scale Financial Institutions David Daniel, VP, Banc Intranets; Jim Callan, CEO, Econiq; James McHale, GM of Analytics, Baker Hill Recorded: Jul 18 2017 5:00 pm UTC 51 mins
    • As Financial Institutions adapt to the digital world, and the digital consumer, data and analytics are becoming increasingly important in their fight to provide customer support, offerings, accuracy and services and optimize their processes.

      But the challenges of a bank or large financial institution can be very different to the average companies. From restrictive compliance, ever-changing regulations, huge branch networks, massive amounts of employees and mind-boggling amount of customers and financial data - any data and analytics task can be truly intimidating.

      So how are modern financial institutions coping and adapting to the data oriented world, and what are the tools that are helping them?

      Find out in this panel discussion featuring:
      David Daniel, VP, Banc Intranets
      Jim Callan, CEO, Econiq
      James McHale, GM of Analytics, Baker Hill

      And more as they discuss the realities of large financial institutions data difficulties, and how they're overcoming these challenges.

      Read more >
    • Tackling Today’s Threat Landscape by Visualizing Cyber Risk
      Tackling Today’s Threat Landscape by Visualizing Cyber Risk Dr. Alea Fairchild, Blue Hill Research and Torsten George, RiskSense Recorded: Oct 12 2016 4:00 pm UTC 51 mins
    • How can we better visualize cyber risk as to understand our systemic susceptibility and its relevance to the business? Defining the role and extent of cyber risk in business operations in today’s environment is important not only for the Board in terms of compliance and governance, but also for the IT team in understanding the business criticality of IT assets and prioritization for remediation efforts. We will explain how organizations can operationalize cyber risk management and implement a pro-active, rather than reactive, approach to threat prevention, detection and response.


      This webinar will help viewers to

      - Prioritize information assets based on value to the organisation
      - Identify and prioritize risks to these assets
      - Reduce risks by visually identifying priorities and resources
      - Build and deliver a risk and security plan that better aligns business and technology
      - Ensure a means for a continuous business engagement on the topic of cyber risk and security

      Read more >