Hi [[ session.user.profile.firstName ]]

Cloud transformation in 2016. What are the key trends?

Cloud is rapidly entering an entirely new phase, one destined to prove far more transformative and disruptive than the initial phase of cloud computing. It is driving comprehensive transformation of digital assets in organizations of all stripes as IT decision makers begin to view this emerging cloud construct as a proxy for digital transformation. No single vendor can offer the end-to-end services that can satisfy all of a customer’s IaaS, PaaS, SaaS and business processing as a service needs, which is why a multi-cloud approach makes sense. 451 Research's William Fellows will discuss while technology is not the only consideration in cloud transformation – organizational change, risk posture and the adoption of cloud’s operating model are key – the fact is that a Cloud Management Platform which includes automation and orchestration wlll be necessary to navigate this journey. We look at the key trends and technologies which will enable this in 2016.

IT Spending Trends 2016
Recorded Jan 27 2016 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
William Fellows, 451 Research - David Iannacconi, IIS
Presentation preview: Cloud transformation in 2016. What are the key trends?
  • Channel
  • Channel profile
  • Reducing Risk in the Data Center with DCIM Jan 18 2018 4:30 pm UTC 60 mins
    Rhonda Ascierto, Research Director at 451 Research and Mark Gaydos, Chief Marketing Officer at Nlyte Software
    The management of change has been a recognized and necessary discipline in enterprise IT for decades. But the management of change – and indeed critical events – in datacenter facilities has not received so much attention, despite the dangers and significant costs associated with even partial failure.

    Increasingly, datacenter owners and operators are reducing risks associated with change and unplanned events by using purpose-built datacenter infrastructure management (DCIM) software. DCIM has become an essential element of modern datacenter risk management, from monitoring and alerting to traceable (auditable) workflows, asset tracking, predictive analytics and end-to-end risk analysis.

    In this webinar, you will learn how DCIM is being leveraged to understand, manage and lower risk, while at the same time delivering efficiency, agility and cost benefits.
  • Challenges and Opportunities in Workflow Automation for the Modern Workforce Jan 11 2018 6:00 pm UTC 60 mins
    Chris Marsh, 451 Research Director | Ryan Duguid, Nintex SVP of Technology Strategy
    Designing and managing complex, specific and even specialist work is no longer only the remit of centralized teams of specialist project managers, analysts and process experts. Companies are looking for looser, more matrixed, decentralized and collaborative forms of organization, they are reconsidering processes, people and technology as part of this shift with a focus increasingly on enabling these types of work to be done by business leaders and their teams.

    Unfortunately the traditional mix of collaboration, team, task, project and business process management tools are struggling to deliver the balance of cohesive, flexible and extensible work processes business teams need.

    They need a way of building automated processes that span across different systems and applications so that their myriad tactical workflows can be elevated into a strategic mesh of operations, giving them new ways to think about organizational culture, business agility, employee engagement, work throughput and customer satisfaction.

    In this webinar Chris Marsh, Director of Workforce Productivity and Compliance at 451 Research and Ryan Duguid, SVP of Technology Strategy at Nintex will discuss the trends, pain points and opportunities around content and workflow automation for the modern workforce.
  • Ensuring a Trusted Internet of Things Dec 19 2017 5:00 pm UTC 60 mins
    Christian Renaud, Research Director at 451 Research & Josh Jabs, Vice President at Entrust Datacard
    During this upcoming webinar we will discuss the current state of IoT adoption, security and trust challenges to deployment by key vertical markets. We will also dive into lessons learned, emerging standards for IoT security, and the necessary innovative technologies required for the Internet of Things to succeed. Please join Entrust Datacard and 451 Research for this informative upcoming webinar.
  • 2018 Cyber Security Predictions: The Identity-Aware Perimeter Comes to the Fore Recorded: Dec 14 2017 61 mins
    Chris Sullivan (SecureAuth+Core Security) & Garrett Bekker (451 Research)
    Join 451 Research and SecureAuth+Core Security for a peek into the emerging trends in cyber security and identity in 2018. Register today and learn how these trends will impact your strategy, organization, and job in the coming year.

    Security experts Garrett Bekker, 451 Research and Chris Sullivan, SecureAuth+Core Security will share insight on these trends and more:

    •Why network-based approaches to security are no longer sufficient in the age of cloud and IoT
    •Why identity is the new gating factor for access to sensitive resources
    •How various methods for securing cloud resources – CASB and IDaaS - need to converge
    •The need for risk-based approaches to authenticating users – and machines
  • Real World Use Cases for AI Recorded: Dec 14 2017 54 mins
    Nick Patience (451 Research) and Mark Gamble (OpenText)
    The key to your enterprise's success lies in leveraging data, AI and analytics to improve processes and optimize your business. But what technologies and techniques should you use and what sorts of problems can AI solve for you? Join us to hear Nick Patience, Principal Analyst at 451 Research, discuss AI and explore how machine learning-based analytics benefits organizations across a variety of use cases. The session will include an overview of Magellan - OpenText's new AI and analytics platform - and will feature live demos and a customer case study. Attend to learn how Magellan can provide a powerful, cost effective, flexible option for implementing AI in your organization.
  • Shift Left: How testing early and often is best for the business and customer Recorded: Dec 12 2017 50 mins
    Nancy Gohring 451 Research and Steve Feloney CA Technologies
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • Endpoints in the Hyperconnected Era: Weaknesses and Weapons Recorded: Dec 7 2017 60 mins
    Scott Crawford, 451 Research | Ofer Israeli, Illusive
    If ever there were a truly asymmetric battle, it’s in the war for the endpoint. Enterprises must apply defense as broadly and consistently across hundreds or thousands of endpoints as best they can. But to penetrate an organization, the attacker only needs to succeed with one that exposes a weakness. And from the network, to the endpoint itself, to the user that interacts with malicious content, these weaknesses may be many.

    There is a new array of tools in the fight for the endpoint that go beyond traditional monitoring and controls, or the trend toward applying machine learning to the art of defense. In this webinar, Scott Crawford of 451 Research and Ofer Israeli of Illusive Networks will examine these issues and opportunities, and shed light on deception technology and other new tools for intelligent defense at the endpoint that can recognize and contain a threat before it has a serious impact.
  • Analytics and Machine Learning Drives ITOA 2.0 for Better App Performance Recorded: Dec 7 2017 50 mins
    Nancy Gohring, Senior Analyst at 451 Research and Kalyan Ramanathan, VP Product Marketing at Sumo Logic
    Today’s leading enterprises are striving to deliver high performance, highly scalable and always-on digital services. Built using a host of modern tools including microservices, multiple cloud platforms, containers and DevOps practices, these apps present new challenges for operations teams when it comes to understanding and driving performance.

    Although IT operations analytics (ITOA) tools bring visibility to IT teams, they don’t operate well in today’s complex and heterogeneous environments. A new breed of ITOA solutions (ITOA 2.0), driven by advancements in machine learning and big-data technologies are poised to better respond to the needs of IT pros responsible for the modern complex applications.

    In this webinar, we will discuss:

    •The driving factors behind the evolution of ITOA to ITOA 2.0
    •How machine learning and analytics play a central role
    •Why correlation of logs and metrics is becoming critical for monitoring tools
    •How organizations can leverage ITOA 2.0 technologies to reduce mean time to identify the source of problems and repair them
  • Digital Transformation Through Automation Recorded: Dec 7 2017 60 mins
    Carl Lehmann, 451 Research | Ryan Bazler, Kofax
    Organizations across the globe are engaged in what some consider to be another IT buzzword – Digital Transformation. Many though take it seriously, as concerted means to optimize customer experiences, improve business efficiencies, and capitalize on new market opportunities.

    In this webinar Carl Lehmann, Principal Analyst at 451 Research will discuss how industry leading enterprises pursue digital transformation from both business and technical perspectives by:

    •Describing digital transformation and how it is used to create competitive advantage
    •Discussing why and how enterprises are pursuing such initiatives
    •Identifying the critical technology needed for execution
    •Revealing how digital automation platforms improve and enable new ways of doing business
    Attendees will learn how to define and structure digital transformation initiatives unique to their firms and how best to make use of digital automation platforms for IT and business transformation.
  • Accelerate Digital Transformation with Integrated Machine and Human Data Recorded: Dec 6 2017 54 mins
    Nancy Gohring, Senior Analyst and Ancy Dow, Senior Product Marketing Manager at PagerDuty
    With the proliferation of data and tooling, it’s becoming harder to make sense of and take action on business-impacting events, yet it is more critical than ever to do so with revenue and brand impact on the line. Teams need to integrate machine data with human intelligence, alongside response best practices to drive action when it matters most. In this webinar you'll learn best practices leveraged by thousands of the most mature operations teams in reducing alert fatigue, improving productivity, and driving an empowered culture.
  • Five Risks That Could Jeopardize Your Application Security Strategy Recorded: Dec 5 2017 39 mins
    Arxan: Dustin Anders | 451: Scott Crawford
    Applications are ubiquitous and essential to the operation and growth of business in today's digital enterprise. Applications are a treasure trove of customer information, intellectual property, and confidential data. They often contain critical IP, application functionality, data, and keys for accessing back-end corporate systems.

    Many enterprises believe the measures they have taken to protect their networks and endpoints and to develop more secure applications are sufficient to mitigate these risks. But many of these measures only build better fences around applications. Organizations that develop applications, meanwhile, may believe that the measures invested in application security testing and operational defense can mitigate at least the most significant exposures. But when an adversary has the ability to analyze applications closely, organizations may be surprised to discover that the security of sensitive data, their competitive advantage, and keys to accessing critical back-end systems, can be laid bare more easily than they think.

    Compromises to an organization’s applications can create enormous risks that company leaders may rarely consider fully. Breaches to an application can quickly lead to a loss of IP, damage an organization’s brand, violate compliance and regulatory requirements, and even lead to customer harm – consequences abundantly evident in recent high-profile breaches.

    Join us to learn more about the 5 critical areas where application risk management falls short.
  • Next Generation IoT Connectivity: Combining Cellular and Wi-Fi Recorded: Dec 5 2017 59 mins
    Brian Partridge Research Vice President at 451 Research, Evan Whitelock Product Marketing Executive at Aeris
    Traditional IoT deployments have been forced to pick between cellular or Wi-Fi networks for wireless connectivity. And while each has its benefits, each also has its limitations. Meanwhile, our smartphones can seamlessly connect and transition between the two. Why can’t your IoT devices do the same? Now they can. In this webinar, we’ll cover how it’s now possible to combine both coverage and cost benefits with cellular and Wi-Fi hybrid connectivity.

    In this webinar, join 451 Research vice president Brian Partridge and Aeris product marketing executive Evan Whitelock as they:

    •Discuss today’s IoT market drivers, challenges, and new opportunities
    •Review 451 IoT survey results for which IoT use cases typically leverage cellular and which leverage Wi-Fi connectivity
    •Discuss the pros and cons of each technology and provide examples of why customers have chosen one over the other
    •Present the possibilities of combining cellular and Wi-Fi networks into a single subscription
    •Explain the value and key considerations for this new hybrid connectivity model

    Please reserve your spot today!
  • How to Achieve 4 Nines Uptime with Performance Testing and Monitoring Tools Recorded: Dec 5 2017 54 mins
    Nancy Gohring, Senior Analyst, 451 Research & Anders Iderström, Manager – Engineering: LiveOps and Observability, Klarna
    Proactive digital experience monitoring has become a business requirement for all digital organizations, and in a time when application complexity continues to rise and cloud migration is no longer just a strategic vision, businesses are investing in people, practices and tools to ensure their critical internal and external applications are always-on and high performing.

    In this webinar you’ll hear from 451 Research Senior Analyst Nancy Gohring on what’s driving the demand for a proactive approach to application performance and how active load testing and monitoring tools can help your business increase release speed, quality and uptime. You’ll also hear first-hand how leading fintech innovator Klarna uses Apica synthetic for end-to-end monitoring across its vast DevOps organization to ensure 99.99% uptime of its payment platforms for 60 million consumers across the world. This is one you don’t want to miss.
  • Beyond the Data Lake: Self-service Marketplaces on the rise Recorded: Nov 30 2017 61 mins
    Matt Aslett, Research Director, Data Platforms & Analytics, 451 Research Paul Barth, CEO, Podium Data
    The idea of the data lake was alluring; the means to having data at your fingertips, filtered, profiled, secure and business-ready for data consumers to rapidly derive higher-levels of business value. However, this widely adopted concept didn’t come with an instruction manual.
    The past few years have been turbulent times for enterprise data and analytics. In this live discussion, the presenters look beyond the lake, discussing the combination of self-service data preparation and data management and governance as one; a truly functional data marketplace or “data bazaar”. In addition, they will touch on other key enablers fueling the adoption of the self-service marketplace, including;
    •Data as a service,
    •Smart data ingestion – validation/profiling,
    •Smart data cataloging/search,
    •Data governance,
    •Machine-learning-driven recommendations,
    •Data collaboration.
  • The Foundation of Cloud Security Recorded: Nov 30 2017 57 mins
    Garrett Bekker, Principal Security Analyst at 451 Research & Richard Walters, Chief Security Strategist at CensorNet
    Cybercrime damages are predicted to cost organizations $6 trillion by the year 2021, doubling from $3 trillion in recent years,1 and some say this astronomical figure may be an underestimation. As more organizations shift their infrastructure to the cloud, the number of attack vectors grows fueling an exponential increase in cybercriminal activity – and it’s not expected to slow down any time soon.

    Lack of visibility is one of the greatest vulnerabilities posed by the move away from on-premises, firewall-protected systems and apps to the cloud. Ultimately, it is near impossible to protect what you can’t see, and gaining insight into cloud properties owned and managed by external vendors can be a challenge. Yet, building strong cyber defenses depends on having a view into every corner of your environment to identify single risk factors as well as anomalies across your network.
    In this webinar, 451 Research and CensorNet share how organizations can implement a comprehensive security solution that delivers visibility throughout your environment. We’ll cover:

    •An overview of the cloud security market and current trends
    •The four most common attack vectors and how to secure them
    •Why a unified approach to security is imperative to identifying threats
    •Why avoiding complex security solutions helps improve visibility
    •How to expand your visibility beyond single points of vulnerability to catch cloaked attacks
    •And more

    Register now to save your spot!
  • Combatting Fraud in the New Digital Commerce Ecosystem Recorded: Nov 17 2017 35 mins
    Jordan McKee, Principal Analyst, Payments at 451 Research
    In this webinar, we examine exclusive survey data to better understand the state of card-not-present (CNP) fraud through the eyes of digital commerce enablers (DCEs) like payment gateways and e-commerce platforms. The webinar will hone in on the following topics:
    •CNP fraud growth and drivers
    •Level of CNP fraud preparedness among DCEs
    •The threat landscape and prevalence of specific attacks
    •Adoption of traditional and emerging authentication methods
    •Outlook of the CNP fraud landscape
  • Next Gen Apps Need Next Gen Databases Recorded: Nov 16 2017 51 mins
    James Curtis Senior Analyst of Data Platforms & Analytics at 451 Research; Leena Joshi, VP of Marketing at Redis Labs
    The next generation of applications being built at the rising star companies are different from the clunky software being built in traditional businesses. As traditional companies modernize their software stacks, they need to incorporate renewed expectations into their applications such as tailored user experiences, built-in analytics and decision-making while meeting response time requirements under any conditions.

    James Curtis, senior analyst at 451 group, outlines top trends in user experience requirements and the higher bar for application developers when it comes to delivering complex analytics so users can take real time action. The wide availability of new NoSQL, streaming and advanced analytics technologies are enabling state of the art functionality in applications.  Join this session for a discussion of top drivers and barriers organizations face while overhauling their applications to incorporate cutting edge functionality.

    Leena Joshi, VP Product Marketing at Redis Labs examines specific advantages of the Redis Enterprise platform that simplify the implementation of real-time analytics functionality such as probabilistic counts, time-series analysis, leaderboards, personalized recommendations, location-based calculations into modern applications.
  • CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation Recorded: Nov 15 2017 48 mins
    Aaron Sherrill Senior Analyst 451 Research, Dave Mahon CSO CenturyLink
    Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?
  • Finding Success in Tech Careers: Understanding Where Gender Viewpoints Diverge Recorded: Nov 15 2017 50 mins
    Melanie Posey, Research VP
    As part of an ongoing partnership, WITI (Women in Technology International) and 451 Research have joined together to conduct a survey on how gender viewpoints differ in the workplace. The survey, conducted in June and July 2017 and completed by 1,901 respondents currently working in a science, technology, engineering or math (STEM)-related field, touched on a variety of topics to better understand what factors have helped shape employees’ careers and what challenges they face in the workplace. To better understand where gender might result in different points of view, the survey was fielded to both women and men.

    Join 451 Research Vice President Melanie Posey for an interactive webinar as she walks through the key findings of the report.
  • Lower your risk of datacenter outages – proactive maintenance via data analytics Recorded: Nov 13 2017 48 mins
    Daniel Bizo 451 Analyst, Datacenter Technologies; David Crites COO & Michael Carr CEO at Panoptic;
    Your mission-critical datacenter runs on a highly resilient infrastructure: it has N+1, N+2 or better still, 2N mechanical and electrical capacity redundancy for critical components. But does it really? Based on Panoptic’s experience many datacenters carry a variety of lurking issues that might develop into a cascading failure. According to the Uptime Institute, the vast majority of even the world’s most elite datacenters do not operate as designed/installed on day one. This webinar will cover, in case study form, some of the causes underlying poor performance, and how a proactive maintenance program can uncover and help avoid an impact on the availability of services.
Essential insight for leaders of the digital economy
451 Research is your radar into the business of IT innovation. Whether you are a product manager investigating the competition, an IT decision-maker evaluating the impact of emerging technologies on your business, a service provider finding your place in an evolving industry, or a dealmaker fueling the digital economy, 451 Research gives you the inside track on your business and your markets.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud transformation in 2016. What are the key trends?
  • Live at: Jan 27 2016 3:00 pm
  • Presented by: William Fellows, 451 Research - David Iannacconi, IIS
  • From:
Your email has been sent.
or close