Hi [[ session.user.profile.firstName ]]
Sort by:
    • Targeted ABM Strategies: Increase Conversions and Reduce Sales Cycles
      Targeted ABM Strategies: Increase Conversions and Reduce Sales Cycles Val-Pierre Genton, VP of Audience at BrightTALK Upcoming: Jun 14 2017 9:00 pm UTC 45 mins
    • As marketers are being asked to increase their contribution to bookings and revenue, account-based marketing is being used as a strategy to improve conversions and reduce the sales cycle.

      That said, ABM is only as good as the quality of the underlying data in your database and performance varies substantially depending your approach to execution.

      Tune in to this session and learn how you can:
      - Increase the number of target accounts
      - Increase the number of contacts inside of target accounts
      - Increase appointments with target accounts
      - Improve sales and marketing alignment
      - Grow revenue inside target accounts

      Over the past 17 years, Val has built and sold an Internet business and helped business, sales and marketing executives at Fortune 500, mid market and start-up companies to create value, move markets and accelerate growth. He combines this knowledge with deep insights from millions of data points that are generated as nearly 6M professionals connect with experts and companies on BrightTALK to learn and grow.

      Read more >
    • Reduce Time to Detect and Respond to Cyber Threats—Without Adding Resources
      Reduce Time to Detect and Respond to Cyber Threats—Without Adding Resources Chris Martin, LogRhythm Security Expert Recorded: May 17 2017 12:00 am UTC 49 mins
    • Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organization will be compromised, but when.

      The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

      In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

      You’ll learn:

      •The definition and details of the TLM framework
      •How TLM enables you to sort through the noise to highlight and investigate concerning incidents
      •How TLM works to streamline processes through automated workflow
      •Specific use cases TLM can address to prevent major data breaches

      Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).

      Read more >
    • Reduce time to detect and respond to cyber threats - without adding resources
      Reduce time to detect and respond to cyber threats - without adding resources Chris Martin, LogRhythm Security Expert Recorded: Apr 26 2017 9:00 am UTC 48 mins
    • Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

      The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

      In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

      You’ll learn:

      • The definition and details of the TLM framework
      • How TLM enables you to sort through the noise to highlight and investigate concerning incidents
      • How TLM works to streamline processes through automated workflow
      • Specific use cases TLM can address to prevent major data breaches

      Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).

      Read more >
    • What you can't see will hurt you: Track Cloud App usage & reduce overspend
      What you can't see will hurt you: Track Cloud App usage & reduce overspend Tim Jesser and Forrester Principal Analyst, Charles Betz Recorded: May 4 2017 3:00 pm UTC 51 mins
    • Better agility, faster deployment and lower IT resource demands.  With 87% of enterprises using cloud applications the value is clear.  But along with benefits of infrastructure and maintenance cost savings comes significant financial risks.  SaaS applications such as O365 can drive overspend in the form of over-provisioning of user accounts, excessive account entitlement and duplication of on-premises licenses. 

      The burden on IT leaders becomes even greater as an increasing amount of technology spend decisions are owned by business units.  Snow Software will show how to create complete visibility of application usage and spend across all deployment platforms regardless of technology spend ownership.  Learn the critical yet simple steps you can take to track cloud application usage and reduce financial risks.

      Read more >
    • Simplify File Storage and Reduce Cost with Cloud NAS
      Simplify File Storage and Reduce Cost with Cloud NAS Fred Pinkett, Senior Director Product Marketing at Nasuni Recorded: Aug 12 2015 5:00 pm UTC 49 mins
    • The growth of unstructured data, especially files, continues unabated and strains enterprise infrastructure. The problem isn't just storage of growing data, but backing it up, making it available with high performance for users in distributed offices and for mobile users - all while providing for disaster recovery. These challenges wreak havoc on staff and budgets. It’s time for a new approach to NAS that takes advantage of the cloud, while still providing local access, performance and security.

      Learn about this new generation of bottom-less, backup-less NAS that makes files accessible anywhere. Cloud NAS solves the challenges of file data storage, costs less to own and manage, and ends the cycle of NAS hardware refreshes forever.

      Read more >
    • Reduce Time to Detect and Respond to Cyber Threats—Without Adding Resources
      Reduce Time to Detect and Respond to Cyber Threats—Without Adding Resources Chris Martin, LogRhythm Security Expert Recorded: Feb 23 2017 5:00 pm UTC 48 mins
    • Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organization will be compromised, but when.

      The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

      In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

      You’ll learn:

      •The definition and details of the TLM framework
      •How TLM enables you to sort through the noise to highlight and investigate concerning incidents
      •How TLM works to streamline processes through automated workflow
      •Specific use cases TLM can address to prevent major data breaches

      Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).

      Read more >
    • Use your data to Reduce Service Request Resolution Time
      Use your data to Reduce Service Request Resolution Time Dean Williams, President Block64 Recorded: Dec 7 2016 4:00 pm UTC 41 mins
    • Case study examples of using better asset data to improve service, reduce cost & mitigate risk.

      Smash the silo: make your key asset data available across the organization, at all times. In this section, we’ll talk a bit about how organizations often silo their support/ticketing systems off from other systems containing key asset data, and why this would matter and introduce potential waste and headaches for an organization.

      The hidden costs of a long refresh cycle: Here I discuss the relationship between aged assets and the spike this can cause in support traffic. A look at gaps that can be exposed by having things like asset age, supportability, and current maintenance coverage can help with a refresh strategy.

      Proper maintenance coverage: a shortcut to eased support overhead.
      Here I’ll talk through a handful of real-world examples where a lack of asset oversight led to actual outages or over-payment by customers we’ve worked with.

      Pitfalls of popular maintenance platforms: Discussing some of the ways in which gaps that cause support headaches are systemically introduced by popular maintenance programs such as SmartNET.

      Using data to reduce Service Request Resolution Time: Lastly, talk about how to gauge and meter the soft and hard benefits of introducing better data during the support process

      Read more >
    • Reduce the cost and complexity of retiring legacy PeopleSoft instances
      Reduce the cost and complexity of retiring legacy PeopleSoft instances Gagan Bhatia, HPE Product Marketing Manager and Ali ElKortobi, Director, Data Protection R&D Recorded: Dec 15 2016 6:00 pm UTC 41 mins
    • Attend this webinar to learn how HPE’s application retirement solution can help reduce the overall recurring cost of managing legacy PeopleSoft instances by up to 40%.

      The costs of licensing, operational, and skilled resources in maintaining legacy PeopleSoft environments can reach hundreds of thousands of dollars each year. In addition to these costs, organizations expose themselves to various security and privacy risks associated with the improper management of employee data stored in these inactive systems.

      With HPE’s application retirement and archiving solution, you can retire multiple PeopleSoft instances while retaining seamless access to the historical data for compliance and reporting. Built on HPE’s market leading Structured Data Manager platform that relocates inactive data from expensive tier 1 production systems and legacy databases while preserving data integrity and access, you can be confident that the solution is scalable, flexible and secure.

      Join us to hear more about how HPE Structured Data Manager for PeopleSoft Enterprise can help you simplify the retirement of legacy PeopleSoft instances and reduce the cost, complexity and risks associated with managing legacy applications and data.

      Read more >
    • Reduce Service Desk costs with Big Data Analytics
      Reduce Service Desk costs with Big Data Analytics Thore Senneset – Incident Manager in HEMIT and Markus Hammelmann – Dipl.-Ing., MBA working for T-Systems GmbH Recorded: Oct 11 2016 2:00 pm UTC 49 mins
    • What value does automation and big data analytics bring?

      Big Data analytics provides actionable insight and fast knowledge delivery. It allows you to see trends in incident and other service desk data for an easy jumpstart into proactive problem management. Together with faster call handling and problem resolution times, there are significant improvements in efficiency and a decrease in cost for the IT organization.

      See what others have achieved:

      The real proof of value of an automation solution is what others have achieved. Join us to hear from:

      -Thore Senneset – Incident Manager in HEMIT, Norway – on how Smart Analytics helped them reduce incident and interaction resolution times.
      -Markus Hammelmann – Dipl.-Ing., MBA working for T-Systems GmbH, Germany – will share how Smart Email helps T-Systems to automatically classify incoming tickets and help them to reduce email ticket handling time.

      Read more >
    • Reduce Risks and Secure Your Mobile Endpoints
      Reduce Risks and Secure Your Mobile Endpoints Phil Hochmuth, Program Director, IDC’s Enterprise Mobility; John Michelsen, Chief Product Officer, Zimperium Recorded: Oct 27 2016 4:00 pm UTC 57 mins
    • A long-held assumption about mobile technology in general is that endpoint security technologies are unnecessary since mobile operating systems (OSs) are inherently more secure than PC OSs. For policy enforcement and security on mobile devices, IT organizations have looked to enterprise mobility management (EMM) platforms for additional security and device control. However, there is a detection and enforcement gap between devices and back-end EMM, which does not provide real-time monitoring of app activity, network traffic, and overall endpoint health.

      Mobile endpoint protection is critical and BYO complicates the issue since enterprises may or may not own the mobile endpoint. Employee owned devices introduce many more risks and variables than enterprises account for and we wish to inform you on this webinar. Join Phil and John to learn how to privately secure your BYO devices and measure the risks these devices bring into your network.

      Agenda

      - How to privately secure BYOD mobile endpoints
      - How to classify risky devices by examining installed applications
      - How to create a plan to reduce risks introduced by mobile devices

      Read more >