More and more operational decision-making and activity that previously required human intervention is being programmatically driven into platforms. This type of intelligent automation baked into cloud-native platforms is transforming Operations teams into champions of delivering business value. This webinar will cover how you can:
- Auto detect apps and services running on multiple clouds
- Automate problem detection and resolution
- Identify behavior patterns, anticipate trends and respond quickly
- Why correlation is not causation
This is the final webinar in the series presented by Pivotal and Dynatrace on modernizing your application portfolio to cloud-native.
Webinars in this series are searchable by title:
- Journey to Cloud-Native: Where to start in your app modernization process
- Journey to Cloud-Native: Continuous Delivery with Artificial Intelligence
- Journey to Cloud-Native: Making Sense of Your Service Interactions
- Journey to Cloud-Native: Reducing Production Risks at Scale
Thank you in advance for joining us.
About the Speakers:
Kamala Dasika has been working on the Cloud Foundry product team since its inception in 2011 and previously held various product or engineering positions at VMware, Tibco, SAP and Applied Biosystems.
Mike Villiger helps Dynatrace customers implement Application Performance Management technologies and processes in the worlds of Public/Private Cloud, DevOps, Platform-as-a-Service (PaaS) and NoSQL.
For a corporate IT organization to create business value, then it needs to focus on things beyond the IT infrastructure, including: understanding customer needs and wants; delivering high quality services, support, and customer service; and effective financial stewardship.
Attend this webinar for practical help with five opportunities to improve how corporate IT organizations are run, and the value they ultimately provide to their business, across:
2.Improving service desk performance while reducing costs
3.Redefining services through BRM and service portfolio management
4.Better IT asset management
5.Financial management that focuses on the right things
As organizations move to virtual data centers and multi-cloud environments in a dangerous threat climate, they are faced with new security challenges they must overcome. But, they must do this without exponentially increasing the manpower, products, or resources they need, so they still get the most of their valuable security budgets. These challenges include:
-Improving visibility inside data centers and cloud
-Reducing the attack surface
-Maintaining regulatory compliance standards.
WHAT'S IN THIS WEBINAR:
vArmour will explore trends in data center security that include the rise of software to replace firewalls inside the data center, segmentation and micro-segmentation as security techniques, and shifting ideas about software defined networking that:
-Eliminate under-utilized zones and choke points
-Avoid costly hardware refresh cycles and on-going maintenance
-Lower the time it takes to see and stop threats
-Reduce the time and complexity to process security changes
-Increase speed of secure application delivery
ABOUT THE SPEAKERS:
Andy Ryan, Cloud Solutions Architect at vArmour
With the industry shift to value-based reimbursements and bundled payments, effective communication and care team collaboration are critical in reducing readmissions and avoiding costly penalties.
Join our Healthcare Industry team leaders as they discuss how Salesforce Health Cloud can help organizations deliver better patient care after discharge from acute care facilities. We’ll also show a demonstration specifically for how organizations can use Salesforce for the Medicare Comprehensive Care Joint Replacement (CCJR) program.
*According to data from the Center for Health Information and Analysis (CHIA)
John McArthur discusses reduce response time requirements to ensure application reliability.
Remote Office Tech Tips is a series of short videos from StorMagic offering advice on the technological challenges faced when managing remote sites.
StorMagic have recently released the latest version of SvSAN and it is now available to purchase. Read more about SvSAN 6 at: http://stormagic.com/svsan/
The NHS Five Year Forward View requires £20bn - £30bn cost improvements by 2020. Patient care requires continuous improvements to keep pace with increasing expectations on services. This calls for Trusts to improve processes, while reducing actual delivery costs.
Trusts need to understand the positive financial impact of an Outpatient Process Redesign. Winscribe’s healthcare process experts Chris Rodwell and Robin Kilner show how this can be achieved. The purpose of the redesign is to identify and write an action plan to reduce the costs of supporting outpatients by a minimum of £1m per annum for a small to medium trust. More for larger trusts.
Cost savings can be made as a result of:-
•Better document creation – getting it down to seconds per appointment for the clinician
•Reducing costs of administration for discharge / clinic letter production – reductions of 50 – 60% possible
•Improve document sharing (time taken) and document TAT – reduces admin further
•Accuracy – right first time
•Reduced cost per letter - reductions of 50 – 60% possible
This webinar is to share this approach with NHS Finance Managers and Directors. We will examine actual case studies and show the savings that can be made, in the current financial year and over a 5 year plan. Winscribe’s healthcare process experts Chris Rodwell and Robin Kilner show how this can be achieved.
Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**.
Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster.
While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.
In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. Specific topics addressing the threat of data breaches to be discussed include:
• The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention
• Practical steps both teams can take to transition to a secure DevOps environment
• Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle
Kent Woodruff, Chief Security Officer at Cradlepoint, talk about the trend toward cloud- and software-based security through solutions composed of integrated products.
Learn more about security through Cradlepoint:
Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.
On this webinar our panel of experts will discuss some of the best practices organizations can consider to reduce the risk of suffering from a data breach, and to proactively prepare for any subsequent breach that could happen.
Increasingly, organizations worldwide are implementing open source security and license risk assessment capabilities early in the software development lifecycle when the cost to remediate issues is lowest. This webinar will demonstrate Black Duck Hub’s effectiveness in providing comprehensive risk assessments when used in combination with our Eclipse IDE plugin, Build Tool, and CI Tool integrations. Additionally, we'll review valuable new features in Black Duck Hub 3.5.
You’ll also learn:
- How to improve the accuracy of your open source inventory by leverage open source dependency discovery techniques for build tools and package managers
- Options for incorporating Hub scanning into your Continuous Integration environments
- How to track remediation tasks using the Hub-Jira integration
- How to streamline your component review process
- Use cases for scanning binary repositories such as Artifactory
Predictive Analytics and the study of Big Data has helped many institutions to detect fraudulent practices before they become a hazard to the business. This is especially evident in the Financial Services sector where deploying an efficient prevention and detection strategy is of utmost importance.
Join this panel where experts will discuss:
-Which analytics to look at to stop fraudulent payments in real-time
-Using trends and behavioural analytics to detect anomalies
-How to implement a holistic strategy that's right for your organisation
-The challenges in maintaining compliance standards
-Use cases and applications of analytics to prevent financial crime
Join this session where our panelists will discuss:
- What challenge does mobile cause for eCommerce, and what benefits does mobile tech bring?
- Uber is the poster child for frictionless payments. How far could this mode be extended?
-Is going totally frictionless the right aim for consumer and merchant?
- What will be the significance of in-browser payments?
- Who is best placed to capitalise on frictionless payments? Card schemes? Tech companies?
- What role do wallets have?
- What does this tell us about the future of payments beyond mobile (e.g. IoT).
Cyber threats are increasing in frequency and complexity, and all industry segments are vulnerable. Join this presentation to learn the advances in identity security and privacy, and how you can protect your organization in 2017.
David Coxe is the CEO of ID DataWeb, Inc. (IDW) and was the Principal Investigator for the Criterion Systems NSTIC pilot program. He is also co- founder of Criterion Systems, a successful IT services contractor that provides information security, cloud computing, software development and other services to civilian agencies, DoD, and the Intelligence community. David has 20 years identity management experience and is currently very active in the development and implementation of attribute exchange trust frameworks. He co-chaired the Attribute Exchange Working Group (AXWG) at the Open Identity Exchange (OIX) for implementing the business, legal, technical, policy/privacy and assessor/certification requirements for Attribute Exchange (AX) Trust Frameworks.
Build an Active Application Defense System
Web applications accounted for an astounding 40% of last year’s security breaches. The challenges of securing legacy systems, third-party apps, and the extensive shadow IT landscape can be challenging, to put it mildly.
But here’s the good news: The combined F5 and WhiteHat Security approach to web application security represents a powerful new way for organizations to defend against application-level attacks.
Companies are constantly developing new applications, and it’s expensive to stop and patch as soon as a new vulnerability is found. Additionally, it may not be practical to remediate every finding due to issues with legacy code, third-party integrations, or other inherited limitations.
But the integration of F5 Networks and WhiteHat Security technology helps you more quickly identify and remediate vulnerabilities in your web applications. By automating updates to the web application firewall, you can ease the burden of management and reduce costs, while ensuring that your security posture remains strong.
Watch this EMC Webcast and learn how to build ECM applications with latest Documentum xCP.
Documentum xCP is a platform for rapidly building and deploying content-centric applications that manage the entire lifecycle of enterprise information to help the user work faster and more efficiently. Bringing together document and data capture, ECM, BPM, search and analytics, collaboration, customer communications, and records management to give decision makers immediate access to relevant and reliable information.
In recent years, criminal fines and penalties have risen drastically as a result of price-fixing and bid-rigging conspiracies uncovered among automotive parts manufacturers. While companies face these mounting fines, they need not accept the fine initially imposed. The United States Sentencing Guidelines do allow for a reduction of a criminal fine based on a company’s inability to pay. This webcast seeks to inform practitioners on the considerations of this ability-to-pay defense, strategies and process. As an illustration, this webcast includes a case study analyzing a company’s ability to pay a fine resulting from antitrust violations; however, the described methodology has other applications. Additional arenas where this defense has relevance include environmental clean-up costs, healthcare fraud, securities and commodities fraud, as well as FCPA and sanctions violations.
The session will provide insight into the financial analyst’s role in evaluating the company’s financial status and the basis of the framework for the ability-to-pay argument. As part of the case study, the session will walk through an ability-to-pay model including analysis of projected free cash flow and the strength of the company’s balance sheet. Lastly, the session will address the importance of the financial expert’s role in discussions with the DOJ and its financial expert.
Dial in for the third and final webinar in our Hybrid Data Platform Series with Kevin Orbaker!
Few industries are changing as rapidly as energy. The variable price of carbon-based fuels and the rise of alternative technologies are prompting businesses and consumers alike to examine how to streamline power usage and boost sustainability. Internet of Things (IoT) is poised to be a catalyst for even greater energy industry transformation. In the session below, we show how to look beyond the hype and create an Energy strategy that will unlock the potential of the Internet of Your Things to realize real, transformative results in your organization.