Hi [[ session.user.profile.firstName ]]
Sort by:
    • Digitize Outdated Financial Services Processes with Box Platform
      Digitize Outdated Financial Services Processes with Box Platform Paul O'Leary Senior Director of Product, Freedom Financial, Kausik Rajgopal Managing Partner, McKinsey & Co Recorded: Apr 30 2018 3:20 pm UTC 52 mins
    • Digital transformation is pressuring every financial services company.

      Industry leaders agree that improving customer experience through digital innovation is needed to retain and attract the next generation of customers, however overcoming legacy process inertia and the regulatory compliance standards associated with delivering new digital experiences and solutions has been a challenge.

      Join the on-demand webinar to learn how Box Platform can play a critical role in digitizing outdated processes such as Loan Origination and Wealth Management. In this webinar you'll learn:

      - Major trends and drivers pushing the financial services industry toward digital transformation
      - How Box Platform makes it easy to securely share confidential information your customers demand — within your own custom web portals and mobile apps
      - Key examples of wealth management and loan origination apps built with Box Platform
      - How our guest speakers are seeing technology impact their businesses and industries in financial services

      Whether your primary interest is to create new and innovative customer experiences, or simply reduce costs in your existing processes, this session will give you a different perspective on how you can get there.

      About Box Platform
      Box Platform is a cloud content management platform that enables businesses of all sizes to build digital experiences with content for employees, partners and customers. You can learn more at box.com/platform

      Read more >
    • Freedom To Choose The Right Storage Destination
      Freedom To Choose The Right Storage Destination Peter McCallum Recorded: Nov 22 2016 4:00 pm UTC 58 mins
    • How do IT organizations manage data and control costs across paradigms in a way that does not restrict or prohibit portability? How do IT organizations provide consistent core-to-edge insight, capabilities and data services regardless of the location, vendor or platform?
      When users put content into the cloud, they lose insight and control. Sure they can see capacity consumed, but what about the data services and performance? Working across clouds or moving from cloud to cloud further perpetuates the existing problems - lack of common tools and potential vendor lock-in.
      FreeStor gives customers total choice to build the right destination, on the right storage paradigm for the right price and service level.

      Read more >
    • How to accelerate FTO searches on sequences by 70%
      How to accelerate FTO searches on sequences by 70% Jessie Parker @ PatSnap Recorded: Nov 21 2018 4:00 pm UTC 35 mins
    • Scientists in the biotech and pharma industries spend a large amount of time and resources on researching sequences. However, often as researches progress to the later stages of R&D, they become blocked by competitors and products that are already on the market.

      Using a sequence searching tool which links to patent data can help you identify obstacles and freedom to operate much earlier on. Having access to a full data set sooner, can help you save time, money and enhance your R&D.

      Join this webinar to find out how you can accelerate FTO searches on your sequences.

      Read more >
    • Your Big Data Approach to Self-Service Analytics
      Your Big Data Approach to Self-Service Analytics Jake Freivald, Vice President Corporate Marketing, Information Builders, Boris Evelson, Vice President, Forrester Research Recorded: Feb 23 2016 2:00 pm UTC 58 mins
    • Although many companies use Hadoop to help a few high-powered data scientists gain valuable insight, turning insights into action remains a challenge.

      In this webcast hosted by Information Builders, featuring Boris Evelson, Vice President, Forrester Research, you’ll learn how to channel the power and freedom of Hadoop into operational actions that will provide better outcomes for your company.

      - Enable flexible Hadoop data discovery while getting consistent results across different users
      - Take the insights found by data scientists and harness them for a larger, non-technical audience
      - Flow Hadoop-derived insights directly into operational processes

      Boris Evelson, Vice President, Forrester Research
      Boris Evelson serves business process professionals. A leading expert in BI with Forrester Research, Boris delivers strategic guidance that helps enterprises define BI strategies, governance, and architectures, and identify vendors and technologies that help them put information to use in business processes and end-user experiences.

      Jake Freivald, Vice President of Product Marketing, Information Builders
      Mr. Freivald is responsible for messaging strategy, content creation, and thought leadership for the WebFOCUS BI and analytics, iWay data integrity, and iWay integration product lines. He joined Information Builders in 1999 as a product manager for the Data Warehouse division, where he supported cross-platform product development and deployment.

      Read more >
    • Stop Phishing Attacks: What You Need To Know
      Stop Phishing Attacks: What You Need To Know Jordan Wright, Senior R&D Engineer - Duo Security Recorded: May 1 2018 10:00 am UTC 47 mins
    • We’ve all seen the emails: someone shared a Google doc with us, our bank wants to verify our password, we’ve received an “important” attachment, you name it.

      Phishing is common. It’s common because it’s easy. Not only is phishing common, but it’s getting worse. There’s no “magic bullet” to eliminate phishing as a threat, so what can you do to mitigate your risk?

      Join Jordan Wright for a hands-on, method-focused deep dive into how you can reduce the threat posed by phishing. This will cover mitigation tactics at each stage of a phishing attempt, from before an email reaches the inbox to what you can do after a user clicks the phishing link.

      Read more >
    • How to automate secure content and records management, from creation to disposal
      How to automate secure content and records management, from creation to disposal Andrew Clake, Technical Presales Consultant, Micro Focus Recorded: Sep 27 2018 3:00 pm UTC 30 mins
    • Many organisations are realising the benefits of integrating electronic records management into their enterprise content management practises. This is because of its proven mechanisms for proactively capturing and organising the documentary evidence that makes up the regular course of business.

      Join us to discover how you can significantly improve business efficiency and productivity, information security, and operational cost savings, whilst proactively managing both business content and records throughout the content lifecycle, from the point of creation through to disposal.

      Learn how you can:

      -Reduce errors and manual tasks - Improve the efficiency of staff and systems with automatic classification, folder creation, policy application and advanced disposal processing.

      -Have transparent and compliant management of critical content and records - Integration with Microsoft Office 365, OneDrive, and SharePoint without negatively impacting the collaborative or cloud experience.

      -Gain extensive security and access controls - improve privacy for managed content while simplifying the defensible disposal of content that has expired or has no residual value.

      -Lower retention management cost and complexity - Policy automation across multiple jurisdictions simplifies compliance with regulatory mandates such as privacy, freedom of information, FRCP, or DoD5015.2.

      Read more >
    • Key considerations of an effective cloud strategy
      Key considerations of an effective cloud strategy Matt Nolan, senior cloud architect, Red Hat & Stephane Lefrere, director, cloud infrastructure practice, Red Hat Recorded: Oct 31 2017 6:00 pm UTC 40 mins
    • One of the most pressing questions enterprises have to answer is: “Should we move to the cloud or stay on-premise?” For many, the answer is a blend of both. Determining your organization’s cloud strategy can be complex. Important considerations must be made around security and compliance requirements, balancing the needs of developers, as well as the existing infrastructure implementations.

      In this webinar, we’ll identify multiple considerations you’ll face when starting to think about your cloud strategy and walk through how to manage those critical choices. We’ll cover how to:
      - Evaluate the mix of private and public cloud options are best for your business
      - Prioritize services for your developers and end users
      - Identify new approaches to enable freedom of choice, mobility, and accelerate service delivery
      - Define a cloud strategy that accelerates your ability to deliver new applications and innovative solutions

      Read more >
    • Les aspects méconnus du RGPD
      Les aspects méconnus du RGPD Laurent Petroque - Senior Manager, Systems Engineering, F5 Networks Recorded: Jan 16 2018 1:00 pm UTC 61 mins
    • Le RGPD (règlement général sur la protection des données) de l’Union européenne entre en vigueur en mai 2018. Les lourdes amendes prévues en cas de non-conformité ont fait couler beaucoup d’encre. Mais quels sont les aspects moins connus du RGPD dont vous devez tenir compte pour respecter les normes imposées ?

      Rejoignez-nous pour un webinaire instructif où nous aborderons les thèmes suivants :
      • L’importance d’évaluer l’impact des risques et de la protection des données, et les critères à prendre en compte
      • Pourquoi la disponibilité durable des informations est primordiale pour assurer la conformité au RGPD
      • Comment la hausse des niveaux de chiffrement peut nuire à la visibilité en cas de violation de données
      • Comment assurer un accès sécurisé à vos applications et données

      En regardant ce webinar, vos données personnelles seront partagées avec F5 et traitées conformément à la politique de confidentialité F5 (https://f5.com/about-us/policies/privacy-policy). Vous recevrez également des communications liés aux produits et services F5, vous pourrez vous désabonner à tout moment.

      Read more >
    • Addressing the Overlooked Aspects of GDPR
      Addressing the Overlooked Aspects of GDPR David Warburton, Senior Systems Engineer, F5 Networks Recorded: Feb 28 2018 10:00 am UTC 67 mins
    • From May 2018 the EU General Data Protection Regulation (GDPR) will come into effect. Much has been written about the large fines that will be imposed for non-compliance, but what are the less well known aspects of GDPR that you need to address to meet the required standards?

      Join us for this informative webinar to learn more about:
      • The importance of performing risk and data protection impact assessments and what you need to consider
      • Why availability and resilience of information is critical to GDPR compliance
      • How increasing levels of encryption may prevent visibility of data breaches
      • How to ensure secure access to your applications and data
      • With only three months to go, this webinar will help your organisation prepare better for successful GDPR compliance.

      By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.

      Read more >
    • Lightboard Lessons: Explaining the GitHub DDoS Attack
      Lightboard Lessons: Explaining the GitHub DDoS Attack John Wagnon - Senior Solution Developer, DevCentral Recorded: Sep 25 2018 8:30 am UTC 15 mins
    • On Feb 28, 2018 the popular website GitHub was the victim of the largest Distributed Denial of Service (DDoS) attack in recorded history. The attackers used open memcached servers to launch an amplification attack that pushed traffic at the rate of 1.35 Tbps. Fortunately, GitHub was prepared with a DDoS scrubbing service and was able to mitigate the attack, and the attackers stopped after about 20 minutes. The unfortunate part, though, is that many thousands of open memcached servers are still out there on the Internet and could be used for a similar attack at any time. Watch the video below to learn about the details of the attack and the mitigation steps.

      By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.

      Read more >