In this session, our panel will discuss:
-Current trends in lending
- Risk & Cross border lending
- Bank appetite for innovation
- Startups making inroads
- Emerging trends in factoring and AR trading
- Blockchain and distributed ledgers
-How SMEs can benefit from this new trend
Whilst it is no longer a new idea, P2P lending still has a lot of hype around it and the opportunities within it for the future. Investment in this sector is increasing and SMEs are benefiting greatly from it.
In this panel session we will discuss:
-the alternative lending sector and how it can help SMEs obtain the capital they need for growth
-benefits for SMEs to sustain a healthy cashflow
-what role do government agencies play in AltFin?
-recent developments when it comes to AltFi in the real estate market
One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work. Burdened with this overload of vulnerability disclosures, Infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough staff and resources to promptly patch every single vulnerability within their environment.
Join Qualys and (ISC)² on Sept 14 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to prioritize remediation.
Presenter: Deb J, SME & Solution Architect – APAC & Middle east, Qualys
Deb J (DJ) works with Qualys as a Subject Matter Expert for all products and platforms at Qualys. He is also a Field Solution architect responsible for customer success in the region. Deb has over 12 years of experience of which a large amount of time was spent on security. Started his career as a Code Quality Governance Specialist, so attention to details comes naturally. In the past he has worked with Compuware, NetIQ, LogLogic & ArcSight that adds a lot of experience for him to understand customer problems and identify solutions that work for them.
Join our webinar on Tuesday, 24 May where we’ll be looking at key challenges for hundreds and thousands of SMEs facing auto-enrolment (AE) in 2016 – and how to solve them.
From the basic requirements to the obvious pitfalls and issues to watch out for, our auto-enrolment specialists, Adam Bexson and Steve Elliott, will take you step-by-step through the process.
We’ll help you to understand what you should be doing in the run up to your staging date, as well as what you can expect during and post staging date, covering topics such as:
•The difference between eligible and non-eligible jobholders;
•How long you can postpone for and how often; and
•The cheapest way to satisfy the requirements in terms of contributions;
•Navigating your way through AE legislation efficiently;
•Ensuring your auto-enrolment scheme meets the legislation; and
•How to be certain that your approach to AE is correct.
In this session, SAP Banking Global Solution team will provide a technical briefing on designing solutions for Financial Services on HANA Cloud Platform. This webinar will provide a deep-dive into HANA Cloud Platform capabilities, approach to building extensions and HANA cloud integration services. The use case for this session is on “Cloud For Customer”, a cloud CRM capability that is revolutionising customer engagement on Hana cloud platform.
Overview of HANA Cloud Architecture layers
Cloud for Customer: Overview of Services
Review of approach for building extensions on HCP
Building Integration based on HANA Cloud Integration
Demonstration of the use case on HCP
Geaorge Asgari, Architecture & Technology Strategy, SAP IBU Banking
Helmut Grimm, Sales Manager SME Banking - Line of Business Financal Services
Note: You can only view this event logged into Cybrary's website.
Learn how to develop a defensive arsenal against some of today's most powerful cyber threats in Cybrary's first live classroom event. Post-Exploitation Hacking SME Joseph Perry will be presenting on the tools, process and practice strategies to mitigate cyber threats LIVE, and you're invited to have a front-row seat! Gain valuable knowledge on the defensive measures that matter most when protecting sensitive data.
With a rapidly-changing threat landscape, IT security is important for companies, large and small, to protect information and IT assets while growing the business. However, smaller companies are faced with limited resources and budgets.
In this webcast, learn about the latest security threats facing SMEs and effective security strategies to protect your business.
This webcast will cover:
Setting the scene; hear about the top 5 ways in which SMEs are being breached online
The mobile front – drill down into how SMEs should deal with employees accessing their networks via mobiles
Securing social media – understand the risks that SMEs face here and what can be done about them
Prioritising your response – hear how SMEs issues differ from larger corporations and where they should focus their efforts
Philippe Courtot, Chairman and CEO for Qualys
Andrew Kellett, Analyst, Ovum
Tom Ray, Cloudreach will talk about using the public cloud service providers as part of the SME IT business solution. Ranging from adding Infrastructure to adoption of Applications for the office.Read more >
Learn how to:
- Reduce SMB Storage Costs
- Eliminate the complexity and risk of storage sprawl
- Incrementally grow capacity to any size required using simple, low cost storage blocks
- Deploy enterprise-class storage without the cost or complexity
The first server that the small to medium sized business (SMB) purchases is often one that allows for file sharing and collaboration called network attached storage (NAS). As the business grows and becomes a small to medium sized enterprise (SME) the first point of storage trouble is often that standalone NAS. It runs out of capacity, it can't provide enough performance or both. As a result the SME is forced to add standalone NAS after NAS to keep up with these demands which leads to storage sprawl. Storage sprawl places pressure on every aspect of the SME as the storage line item becomes a larger and larger part of the storage budget, while the ability to provide 24/7 uptime decreases.
Join Storage Switzerland's Lead Analyst, George Crump and Kelly Murphy CEO of Gridstore for a discussion of the issues with Storage Sprawl and how you can stop it by taking a technology created for the large enterprise, Scale Out NAS, and applying it to the mid-sized market.
Small- to medium–sized enterprises (SMEs) often dismiss their potential as targets of cybersecurity attacks. Despite this, a Ponemon study of some 2,000 SMEs last year found that they lost on average more than $1.6 million due to such attacks.
Due to small budgets, few or no dedicated security staff and overly complex security solutions, SMEs continue to face challenges in their efforts to proactively protect their networks, data and systems. This webcast investigates the barriers these organizations face in protecting their digital assets and what attackers hope to gain through a compromise. It also uses a case study of a breach initiated by the compromise of a forgotten asset to examine what SMEs can do to protect themselves using a comprehensive solution in a cost-effective, uncomplicated manner.
At SMEs, where security personnel are in short supply, there’s nowhere for blame to shift when the inevitable compromise hits. In this webcast, you’ll learn essential tips from the trenches that will help keep your organization secure. Learn from the author’s experience working with companies of all sizes and budgets, ensuring that even those with meager resources aren’t left behind when it comes to actionable and practical advice.
Although Test Automation is not a new concept anymore, many retailers are struggling to test POS systems successfully. Testing a POS software package manually can lead to many challenges like:
•Increased Time to Market since the complete test cycle of integrated POS may take months
•Poor Quality of builds due to high chances of defect leakages in manually tested builds
•Complexity as the POS systems come with multiple integration points and complex business scenarios
•Increased cost due to the huge efforts involved in manual testing
Our speakers, having worked with several retailers understand deeply the challenges in POS testing and the factors that need to be considered while automating the test process.
•Challenges faced in testing POS systems
•How Test automation is beneficial for retailers
•The know-how – Test automation framework suitable for testing a POS
•How Test Automation looks like in reality while testing a POS– A case scenario
Register now to join the industry leaders!
In spite of IT’s stepped up efforts, firms continue to face increased risk exposure from gaps in compliance, security and illegal behavior. Unfortunately much of this risk stems from what a company doesn’t know about their information.
In this webinar, information governance experts will discuss:
•The importance of gaining insight across your enterprise information
•How this insight directly impacts your ability to achieve compliance, mitigate risk, and avoid costly penalties
•Perspectives on the right strategies, processes, and tools that can help you proactively take action with data to reduce risk
Open Source is growing like wildfire, and with it the popularity of Linux, the OS that increasingly drives how business interacts with the world. Linux’s popularity spans every industry, fueling increasing demand to exploit Linux in the enterprise for business-critical applications and for service providers anxious to offer enterprise-grade Linux to their cloud clients.
This means new requirements that must be addressed to ensure Linux deployments are enterprise ready- -- that means capable of massive transaction volumes at unprecedented scale, and built not to fail or crack - ever. Getting it right means growth and opportunity. Getting it wrong means running hundreds or thousands of servers, adding cost, complexity, latency and vulnerability—and lost business. How to get it right? Attend this complimentary webinar presented by Slashdot Media to hear IBM Linux experts Donna Dillenberger, Angel Diaz and Steven Dickens discuss how to get from open source project to enterprise-grade Linux with IBM LinuxONE.
Attendees will learn:
•What’s driving the demand for Enterprise-grade Linux
•How Ecosystem communities have come together to ensure open solutions
•How to leverage the latest technology platform to turbocharge Linux and open source apps
•New ROI models that enable seamless migration to LinuxONE platforms
•What enterprises and service providers can do now to begin the journey to enterprise Linux
Don’t hesitate – view this webinar now to see a live demo and learn how enterprise Linux can help your business today.
Resilience, Security, Accessibility and Productivity
Many small and medium businesses think disasters won’t happen to them, or they can’t be hacked. Worse still, they think IT can be turned on and off as they see fit.
Closing the gaps in security controls, systems, people and processes is not an easy feat, particularly for IT practitioners in smaller organizations with limited budgets and few (if any) dedicated security staff. So, what are the essential security capabilities needed to establish a security operations center and start closing those gaps?
Join Javvad Malik of 451 Research and Patrick Bedwell, VP of Product Marketing at AlienVault for this session covering:
Developments in the threat landscape driving a shift from preventative to detective controls
Essential security controls needed to defend against modern threats
Fundamentals for evaluating a security approach that will work for you, not against you
How a unified approach to security visibility can help you get from install to insight more quickly
Cyber criminals are targeting your network with a new generation of advanced malware. Many think they are ready to defend against today’s advanced threats. Are you?
Don’t miss this LIVE webinar on the state of advanced malware featuring Corey Nachreiner, CISSP and Director of Security Strategy and Research for WatchGuard. Find out what to do NOW to protect your business.
In this webinar you will:
-- Learn how APTs differ from other malware.
-- Discover how malware has evolved in recent years.
-- Learn how hackers breach networks.
-- Explore what you can do to defend yours.
Learn that with a little knowledge and foresight, you can implement the proper security technologies and strategies necessary to help keep you from becoming the next data breach headline.