Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?
In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.
Watch this 30-minute webinar to learn:
*The benefits and challenges associated with Tableau’s mixed device environment
*How Tableau performs data migrations for users who are switching platforms
*Recommendations and considerations for offering Macs to your users
Matt Peterson,Technical Support Specialist,Tableau
Aimee Simpson, Product Marketing Manager, Code42
Tad Johnson, Solutions Architect, Jamf
Digital transformation is reinventing businesses of every size and industry. But each of them needs the tools to help build, iterate, and deliver apps that make each employee more productive.
Join us on this webinar to hear from guest speaker, Forrester’s John Rymer, on how low-code platforms are accelerating the journey to digital business and creating a new class of app builders and developers.
Low-code platforms have become a critical factor in helping AD&D organizations rapidly deliver applications to win, serve and retain customers.
With these platforms, enterprises are routinely delivering apps much faster than conventional methods. But can these platforms truly scale across the full modern app lifecycle? What are the top use cases for deploying a low-code platform?
Join John Rymer of Forrester Research for an engaging discussion about the innovative ways organizations are utilizing low-code platforms across the app lifecycle. Hear from IT executives with Autoliv, Estafeta and NES Financial as they talk candidly about how low-code platforms have driven growth and competitive advantage in their organizations.
Are you struggling to access vital business data locked in your company's on-premises systems like ERP?
In this webinar, you'll discover how business professionals can easily and automatically connect to data stored in any system, on premises or in the cloud, via CSV files in the cloud to drive seamless processes and better decisions.
Hear Michael Wacht and Scott Lasenby from Helm explain how a leading distribution company transformed a key business process, saving their accounting department 300 hours a year.
Watch now to learn how you can:
-Access critical data stored in hard-to-reach systems with no code
-Leverage data to drive seamless processes and better decisions
-Eliminate copy/paste and manual imports between systems
-Use a top application development platform designed for business professionals and its built-in no-code integration feature to automatically pull critical business data and instantly put it to use
Code Signing and How it Helps Prevent Malware AttacksRead more >
Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:
*The facts on enterprise adoption of Windows 10
*Planning considerations for your Windows 10 migration project
*Three distinct approaches to performing device replacements—and the pros and cons associated with each
About the speaker:
Aimee Simpson, Product Marketing Manager – Code42
Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk. Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Join Code42 and (ISC)2 on March 16, 2017 at 1:00PM Eastern for a discussion on how to construct an effective insider threat program.Read more >
Discussion on the new code and implications during 2015 - come along and ask a question !Read more >
Sponsored by Code42 - More than 45% of businesses were hit with ransomware attacks in the past year. Cybercriminals are rapidly evolving attack methodologies and issuing increasingly higher demands. With no end in sight, organizations are at significant risk for data loss. At the same time, IT security policies, anti-malware protection and end users that lack the ability to recognize sophisticated scams make ransomware inevitable.
Join this live webcast and learn about the prevalence of ransomware in the enterprise and best practices for safeguarding your data against attackers.
Viewers will learn:
- Why ransomware is a burgeoning business and who is being targeted
- Best practices & recommendations to reduce risk and assure continuous data protection and recovery
- How modern endpoint backup protects your end-user data and enables rapid recovery without paying the ransom
Wie Sie sicher wissen, untersagt das deutsche Bundesdatenschutzgesetz in seiner Zweckbindungsklausel das Verwenden von sensitiven Echtdaten in Test-, Entwicklungs- und Schulungssystemen. Dennoch sehen wir, dass eine Vielzahl von Unternehmen dieses Risiko immer noch eingeht und sich davor scheut, die nötigen Anpassungen durchzuführen.
Die deutsche Versicherungswirtschaft begegnet diesem Thema mit dem Code of Conduct über den GDV als Vorreiter nun offensiv.
Der GDV (Gesamtverband der deutschen Versicherer) ist der erste Verband in Deutschland, der für eine freiwillige Selbstverpflichtung zum Schutz von personenbezogenen Versichertendaten die Zustimmung der Datenschutzbehörden erhalten hat.
Sämtliche deutschen Versicherungsunternehmen die dem Code of Conduct (CoC) bis Ende 2014 beigetreten sind haben sich damit verpflichtet, dem Datenschutzkodex des GDV innerhalb von 3 Jahren gerecht zu werden.
Mit den neuen Verhaltensregeln wird transparent, was von der Antragstellung bis zur Schadenregulierung mit personenbezogenen Daten geschieht.
Lernen Sie wie Informatica die Anforderungen aus dem CoC (Anonymisierung für sensitive Daten in Produktion sowie Test & Entwicklung) umsetzt und gleichzeitig Ihr Testdatenmanagement modernisieren kann.
Da gemäß BSDSG als auch neuester EU-Novelle Datenschutz ein branchenübergreifendes Thema ist, sind alle Interessenten herzlich zu diesem Webinar eingeladen, die direkt (z.B. Datenschützer) oder indirekt (z.B. Test-Manager, Enterprise Architekten) mit dem Thema konfrontiert werden.
Unternehmensweiter Datenschutz vom Marktführer – seien sie dabei !
The CyberEdge 2016 Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a November 2015 survey of 1,000 IT security decision makers and practitioners, the CDR delivers insight IT security teams can use to compare their perceptions, priorities and security postures to that of their peers.
Join Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42 to review the results from the 2016 Cyberthreat Defense Report and:
•Understand why 62 percent of organizations expect to be breached this year.
•Learn which cyber threats are of the utmost concern to the enterprise in 2016.
•Explore how Code42 CrashPlan endpoint backup helps safeguard your most important asset–data!
Join Code42 for an on-demand webinar to learn how protecting endpoint data can give IT the ability to overcome nearly every situation the "dark side" can conjure. Specifically you'll hear how Code42 can help you:
• Protect every version of every file forever, with no limits on file size, type or number of files
• Shorten time to recovery and restore files to any device or iOS at any time
• Rapidly mitigate incidents by quickly identifying the data on compromised devices
Do you know what code is going into your production systems? How can you support something you haven't seen? Whether you currently do code reviews or think it might be a good practice to start doing, this session will help you make the most of the code review process. For DBAs, we'll cover key things to look for such as looking for potential problems. For developers, this will be insight for you into how DBAs think when reviewing your code so you have a better idea what to expect.
•Learn what kind of things to look for when reviewing code
•Gain insight into what to expect from a DBA when they review your code
•Discover how to have an effective communication between DBA and developer
Process-oriented mobile applications have the power to transform the way organizations approach digital business. To get these apps to market fast and adapt them on the fly, low-code development tools and approaches are necessary to take the burden off IT and let the business self-serve via the citizen developer.
Watch this webcast to learn about:
- Why digital business places new demands on process-oriented mobile applications.
- Agile business automation—the intersection of mobile, business process management (BPM), and low code.
- 3 mobile and BPM use cases from the field: Field workforce management, asset management, and self-service applications.
Spark is a dynamic execution engine that can take relatively simple Scala code and create complex and optimized execution plans. In this talk, we will describe how user code translates into Spark drivers, executors, stages, tasks, transformations, and shuffles. We will describe how this is critical to the design of Spark and how this tight interplay allows very efficient execution. Users and operators who are aware of the concepts will become more effective at their interactions with Spark.Read more >
Today's organizations face complex challenges as a result of exponential data growth and rapidly evolving cyberthreats. Furthermore, as companies move to cloud, it's inevitable that technologies will need to be replaced -- and what may have worked five years ago is no longer a viable solution for today's mobile workforce.
In this session, you'll hear IT professionals from two large multinational organizations and a Code42 expert discuss:
- Why all endpoint backup isn't created equally
- How outdated or insufficient backup solutions leave you with gaps that put user data at risk
- What technical capabilities you should look for in your next backup solution
About the speaker:
Aimee Simpson is a Solutions Marketing Manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies.
Jadee Hanson, Director of Security at Code42, provides a behind-the-scenes look at what it's really like to run an insider threat program -- a program in which you can take steps to prevent employees from leaking, exfiltrating, and exposing company information. This webinar will provide cloud security professionals with insider threat examples (and why you should care), recommendations for how to get buy-in from key stakeholders, and lessons learned from someone who has experienced it firsthand.
About the speaker:
Jadee Hanson, CISSP, CISA, is a security professional with more than 13 years of experience. Jadee’s passion for security was born out of a computer science internship and developed into a profession with her first role at Deloitte. After 5 years and a lot of travel, Jadee’s consulting experience led her to Target Corp. where she spent 8 years on its security team, building many of the security programs and functions that exist today. Currently, Jadee is the Director of Security at Code42. In addition to her day job, Jadee is also the founder and CEO of a nonprofit, Building Without Borders.
Third-party website resources and code play an integral role in the online economy. They enable interactive sites that allow people to transact with their banks; shop online, watch movies or television, share photos, videos, documents and much more. Unfortunately, these resources also represent exploitable infrastructure that sits outside the control of an organisation's IT security team. As a result third party web components have become fertile ground for launching attacks and distributing malware. Addressing this challenge requires looking at security from a new perspective.
In this webinar we will explore the different kinds of third party code that organisations host on their sites along with their security implications. We’ll show how an outside-in approach to security can provide the controls organisations require while at the same time protecting their customers and employees.