Enterprises are widely adopting hyperconverged infrastructure to transform the way they deliver IT services. At the same time, with dropping prices and increasing storage density, we’ve reached an inflection point that is transforming decisions around all flash deployments as well. If HCI is the path to the future, shouldn’t your storage decisions reflect that? With emerging technologies such as NVMe and 3D CrossPoint rapidly coming into the market, this session will dig into the new realities for enterprise datacenters and what could possibly be the ideal way to deploy flash.
RecordedJul 28 201655 mins
Your place is confirmed, we'll send you email reminders
Fernando Montenegro, 451 Research & Jack Danahy, Barkly
A lot has changed since the early days of the antivirus industry. Not only have attacks increased in sophistication, speed, and complexity, but the environment around endpoints have changed significantly as well. Cloud adoption, mobility, and many other technological and business trends have significantly changed the nature of what endpoint security looks like. How should organizations look into these changes and adapt?
Join Fernando Montenegro from 451 Research and Jack Danahy from Barkly as they review what the major industry trends look like, what the modern endpoint security environment has to defend against, and what technology controls exist.
Fernando Montengro of 451 Research & Mitchell Bezzina of Palo Alto Networks
Visibility is an undeniable requirement of all security teams, but it shouldn’t come at a cost. EDR products are positioned as our last chance to improve defenses though since inception discovery and response times have only increased. Is EDR really enough? Do we need more visibility from other sources? Are security operations actually improving? We’ve surveyed over 300 of your peers to answer one important question, “Will Endpoint Detection and Response help me?”
Join 451 Research Senior Industry Analyst on Information Security, Fernando Montenegro and Palo Alto Networks Director of Product, Mitchell Bezzina to learn more about:
•The state of EDR technology and the challenges it faces in today’s threat landscape
•The need for visibility beyond the endpoint
•The future of detection and response with XDR
Garrett Bekker, 451 Research & Jeff Broberg and Joranna Ng, OneLogin
Cybercriminals never stop, so obviously the notion of a static username and password won't suffice. Authenticating based on items the user has and biometrics provides a greater security, but hackers keep getting smarter and so must your user authentication methods. In this webinar, we'll discuss the evolution of risks and how authentication technology has adapted for the future. The right MFA solution implemented correctly in your organization can quickly and significantly increase security. It’s the fastest way to easily secure all your users on all their devices at all times.
With so many new options available to IT professionals, it can be easy to lose track of the ultimate goal of technology; which is to serve the needs of business by providing insight, improving efficiency, increasing productivity, and targeting new markets. Today, most everyone is in a digital transformation mode of some sort; but we believe there is a better chance for long-term success if based on a comprehensive digital strategy that can serve as a roadmap for making intelligent choices that will fit seamlessly together over time. Advanced technologies such as hybrid cloud, software-defined infrastructure, AI/ML-based analytics, and evolved data management are powerful tools that are now available to companies of every size; but getting their full value for your business requires planning, foresight and communication.
You are cordially invited to join Steven Hill, Senior Analyst, Applied Infrastructure at 451 Research and Vinny Lee, Chief Strategist at EchoStor Technologies for a roundtable discussion on creating a digital strategy that can leverage the evolving nature of IT infrastructure and data management in an increasingly hybrid IT world.
Scott Crawford, 451 Research & Cindy Valladares, Onapsis
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security:
•The maintenance of security hygiene is not just an ongoing issue for security and IT teams. It has become a front-and-center concern for businesses worldwide. Some of the world’s most high-profile security incidents of recent months are traceable back to keeping enterprise IT - and the applications on which global business depends - well maintained and secure. This highlights the need for continuous monitoring, update and maintenance of systems such as ERP.
•A resurgence of compliance concerns has also risen to the fore. Ongoing requirements such as SOX continue to demand enterprise attention, while more recent mandates such as GDRP require new vigilance and highlight the importance of automating compliance and audit reporting.
•The behavior of people has become one of business’s top security priorities, reflecting the impact of everything from insider threats to phishing attacks, account takeover and credential compromise. These threats can have high impact on the business when they target enterprise application systems the business relies on as its lifeline to critical operations – or when enterprises leave themselves exposed through gaps or drift in effective management of configuration and access control.
ERP applications are among the most valuable assets organizations have and require specialized attention specific to their requirements to protect the business against these concerns. Join this webcast to hear from Scott Crawford, Research Director for Information Security with 451 Research, and Onapsis on how you can combat these common security challenges and ensure that the business-critical applications that house an organization’s crown jewels stay secure.
Al Sadowski, Research Vice President of Voice of the Service Provider
Service Providers are no longer just purveyors of compute and storage; they are now seen as partners for services beyond basic infrastructure and key allies in hybrid architectures. As such, vendors are now paying more attention to this increasingly important buying center.
451 Research launched Voice of the Service Provider to both qualify and quantify buying behaviors, business drivers and strategic priorities for the expanding universe of public cloud providers, hosters, MSPs, Telcos, Systems Integrators, SaaS companies, and Colos.
Join 451 Research’s Al Sadowski, Research Vice President for Voice of the Service Provider, to see highlights from the Voice of the Service Provider Q2 2018 survey – Differentiation & Vendor Selection, and learn:
•Competitive differentiation approaches
•Top verticals currently served and where growth is expected
•The role of the Hyperscaler as supplier, strategic partner, AND foe
•Preferred vendor attributes for compute, storage, colocation
•Service provider’s top reasons for joining hardware and software vendor partner programs
•Procurement and sparing strategies
Scott Crawford, 451 Research & Rami Elron, Whitesource
According to the latest open source security research report ,The State of Vulnerabilities Management in 2018, almost 97% of developers rely upon open source components in order to develop their applications nowadays. But with the recent spike in disclosed open source vulnerabilities, the question arises whether security and development teams have the right strategy in place in order to meet their security objectives?
Join Scott Crawford, Research Director at Information Security, and Rami Elron, Senior Director of Product Management at WhiteSource, as they discuss:
- the current state of Open Source Security
- the challenges faced by security and development teams when handling open source vulnerabilities; and
- how Open Source Security strategies need to be stepped up with the latest next-gen technology for management and prioritization
Shery Kingstone, 451 Research & Eric Mahecha, Adyen
Retail is evolving.
Shoppers today are enjoying elevated experiences and are demanding that brands deliver the best, both online and in stores. Prices alone aren’t enough to influence decisions. With retailers catering to shopper demands, the market is ushering in a new era: “The age of experience.”
Join retail experts from 451 Research and the payment platform Adyen, to learn what customers are demanding — with a focus on the next generation of shoppers — when you join this live event.
Register for free now.
Here’s what we’ll discuss:
•Top findings from the 2018 US retail survey, conducted by 451 Research for Adyen
•The new group of shoppers you need to know about
•3 fundamental customer demands that can make or break your business
•How much business you are losing by not meeting customers’ expectations
•Eric Mahecha, VP of Retail Business Development, Adyen
•Sheryl Kingstone, Research VP & GM, 451 Research
Research Director Chris Marsh, Senior Analyst Raul Castanon-Martinez and Senior Research Associate Rosanna Jimenez
The nature of work is being entirely transformed by innovative new technologies. Catalyzed by businesses looking for greater strategic and operational agility and by the techno-empowerment of individuals, ownership over work execution is decentralizing away from IT and other centralized teams of specialists. This shift requires new understanding and new language.
At 451 Research, we use the term ‘liquid enterprise’ to describe the massive responsiveness to changing market, customer and user requirements that the most innovative enterprises are looking to give affect to. ‘WorkOps’ describes how the nature of work is changing to make this possible – with intelligence, workflow automation, collaboration and reporting embedded and flexibly tessellating across the work execution lifecycle. WorkOps is opening up new possibilities for collective and connected yet highly personalized experiences that will supercharge work execution and drive employee engagement. It’s also giving rise to what we believe is a new enterprise software archetype we call the Workforce Intelligence Platform.
This radically different future for work is significant enough for us to have to rethink the archetypes we use to understand and describe work.
In this webinar, 451 Research analysts Chris Marsh, Raul Castanon-Martinez and Rosanna Jimenez will help you understand how to plan for the future for work that is unfurling:
•What does the future of work look like?
•What are the technology trends underpinning how work is changing?
•How should you be thinking about employee engagement?
•How do you leverage AI to improve work execution?
•How can you become ‘liquid’ and put in place for WorkOps practices?
Melanie Posey, 451 Research & Andy Smith and Eric Kraieski, TDS
In order to drive growth and deliver on the promise of digital transformation, businesses today must be agile. And they expect their IT teams to be able to embrace and successfully execute change. In this webinar event, Melanie Posey, Research Vice President and General Manager, Voice of the Enterprise at 451 Research, will discuss recent survey findings about the shifts in cloud adoption, what’s driving workloads to the cloud – and what research shows is standing in the way of successful cloud migration and adoption.
To confront the challenges and accelerate cloud adoption, experts at TDS recommend that you adapt a dual approach. Move the mobile workloads first and then tackle the complex applications that require greater planning and coordination. The migration of complex apps causes many projects to stumble and lose momentum. But the TDS team will share insights on what it takes to orchestrate a migration project and showcase a new software platform built specially to solve these issues.
Join Melanie Posey and TDS experts, Andy Smith and Eric Kraieski, for a crash course on how to plan your journey effectively and smoothly utilizing exciting new migration planning strategies and tools. After watching these experts discuss the details, you’ll learn how the journey to the cloud can not only be accelerated but can establish a resilient and business-aligned IT organization that will withstand the changes ahead.
Join us for some insightful discussion, use-case examples, and tips for getting started with these new strategies for cloud migration. Sign up today.
Penny Jones, 451 Research & William Fenick, Interxion
Europe is seeing an influx of US organizations keen to establish or expand operations across the region for a diverse set of reasons. Many face challenges, from understanding new business cultures and data regulations and the service provider landscape, to knowing where IT should be best positioned to scale for new technology adoption. We surveyed 250 US organizations seeking entry into - or expanding across - Europe to get a deep understanding of the issues that could delay actions in Europe today. In this webinar, we will draw upon these results to discuss not only the challenges these organizations face but considerations that should be top of mind for companies wanting to simplify and futureproof rollouts across Europe, a market that provides great opportunity for those that can deploy their IT assets right.
John Abbott of 451 Research and Jennifer Kotzen at SUSE
Moving to software defined infrastructure is all about getting rid of rigid system silos that can hold companies back from digital transformation, replacing them with more fluid resources that provide the flexibility and agility required to support a rapidly evolving mix of existing and new cloud native workloads. It’s the direction of travel for most enterprises and service providers alike. But how do you get there?
451 Research has identified a core set of essentials for companies looking to become software-defined organizations. In this webinar we’ll examine these principles, explore their importance to IT decision makers, and look at the new cloud native workloads and modern DevOps processes that they enable. Join us to hear from John Abbott, co-founder and distinguished analyst at 451 Research and Jennifer Kotzen, Applications Delivery Solutions Team Lead at SUSE.
Chris Marsh of 451 Research and Dana Fjermestad & Ian Hutchinson of Samsung
SMBs make up 95% of all businesses globally and employ 70% of the workforce, yet their productivity is typically lower than large enterprises. Embracing mobile is the ideal lever to improve their competitiveness, and this is indeed what is happening. SMBs are ramping up with those saying they are moving from experimenting to investing more heavily in mobile technologies jumping from 44% to 50% in just the last year.
In this webinar you will learn:
•Why SMBs stand to gain big from mobility and how they can succeed in their mobile journey.
•The four stages - Starting, Organizing, Strategizing and Optimizing – that they typically pass through as they mature their capabilities
•How to think through mobile strategy, security, governance, user engagement, processes and business model innovation.
•The pitfalls to avoid and questions to answer at each stage to get the most out of mobile.
Matt Aslett, 451 Research & John Thuma, Arcadia Data
For decades people have been talking about self-service BI and analytics to enable business users to make better decisions in organizations. Yet, the big data era (Hadoop, Spark, data lakes, and more) has seemingly pushed us in the direction of automation, machine learning, and AI. Are your business users left out? Do they still ask for more control over reporting and analysis? What if you could provide the simplicity of Internet search for ALL users on ALL of your data in the organization? What if you could do all of this and provide security and privacy with the full power of visual analytics?
Join industry thought leaders from 451 Research and Arcadia Data on October 17th at 12 p.m. BST, 1 p.m. EET to learn about recent trends in big data analytics around natural language search, self-service, and AI-driven insights. In this webinar, you will learn:
•Why modern analytical environments need to focus more on business users.
•Why traditional BI approaches are falling short.
•How new innovations like search-based BI are redefining self-service BI.
Rhonda Ascierto of 451 Research & Jerome Totel and Adam Levine of Data4
The best-run datacenters are those where managers have accurate and meaningful information about their datacenter’s assets, resource use and operational status, from the lowest level of the facility infrastructure to the higher echelons of the IT stack. These datacenters use industry-specific datacenter infrastructure management (DCIM) software.
Join us to hear how DCIM data and analytics in colocation datacenters can enable users of colocation to manage their systems and services more efficiently, effectively and easily, and to support key business drivers, including:
•Capacity planning and forecasting
•Compliance and corporate social responsibility
Carl Lehmann, 451 Research & Andrew Slivker, Nevatech
Hyper-competition and digital-first initiatives are forcing organizations to reconsider how they do business. ‘Digital transformation’ has emerged to engage customers, improve efficiencies, and fend off threats from rivals. It’s driving the need to rethink application design that delivers information in context and automates tasks across diverse digital devices and touchpoints.
APIs have emerged as integration enablers, and their value and proliferation require they be managed as strategic assets. This calls for a lifecycle management approach to API development in combination with intelligent run-time capabilities of an enterprise-class API architecture. Lifecycle management must include strong governance over use that can track and audit changes, policies, and dependencies critical to enterprise security, governance, risk, and compliance (GRC) practices where monitoring is a critical run-time function for secure and successful API platform implementations.
In this webinar Carl Lehmann, principal analyst at 451 Research joins Nevatech to discuss the business and technical considerations for API management and governance within a broader context of digital business strategy by:
•Describing the factors of planning digital transformation strategy and using the run-time environment to create competitive advantage
•Identifying the critical technology enablers needed for execution including API platforms
•Defining the lifecycle management and governance practices required of APIs as accelerants to digital business initiatives.
C-Level executives, enterprise architects, developers, integration and API professionals alike will learn how to reconsider their integration strategies and toolchains to become core enabling assets for their emerging digital business’.
Fernando Montenegro, 451 Research & Dan Hubbard, Lacework
Modern enterprises are rapidly moving to the cloud. Unfortunately, many are still using a network-centric security approach which is putting them at risk.
Even with the cost, efficiency, and business capabilities the cloud provides, it can still perplex those responsible for management of security. Shared responsibility, automation, ownership of duties — these are among the unique aspects of security in the cloud that can often be confusing. When understood, however, they can be used as a critical advantage for organizations that need to secure workloads and data in their cloud environments.
Join Fernando Montenegro of 451 Research and Dan Hubbard, Chief Product Officer at Lacework for this webinar about how to move away from a network-centric mindset and adopt a cloud approach to be successful in modern environments.
Scott Crawford of 451 Research, Mike Mcintyre of Panaseer and Rob Hyde of Schroders
Security is unique among technology fields. Where developers can advance toward defined goals, security’s agenda is set by an intelligent adversary, who can choose the most opportune targets among a host of potential exposures – and the way attackers target those exposures can change daily. Defenders, on the other hand, must do their best to defend their most serious exposures and keep them current with limited resources.
This would seem to be priority number one for organizations: the proactive preparation and protection of the business against attack. It’s a fundamental principle espoused by the likes of Edwards Deming: it costs far less to fix an issue before it’s exposed to the public at large, than after it becomes a public problem.
And yet, defenders have struggled with making it happen. Attacks continue to wreak havoc, and the result for many has been a tacit acknowledgement of this failure in the disproportionate spend on firefighting (monitoring, detection and response), when fireproofing – preparation and protection – may be the more strategic and economically sound investment.
Why has this fireproofing been so hard, and why do so many organizations struggle? And what’s different today that places a more effective approach to preparation and protection within reach?
Join Scott Crawford, Research Director for Information Security with 451 Research, Mike Macintyre, Chief Data Scientist and VP Product at Panaseer, and Rob Hyde, CISO with Schroders, to examine:
•The real impact of failure to take a proactive approach to strategic preparation and protection
•Four key obstacles that keep organizations from succeeding in pursuing a fireproofing strategy – and how to overcome them
•How Schroders Cyber Security team have been able to move towards a pro-active approach and the benefits and insight gained
Fernando Montenegro, 451 Research and Ed Metcalf of Cylance
Endpoint Detection and Response products were introduced to the market in the early 2010’s and have focused on detecting signs of a compromised system by recording behaviors then alerting humans. Unfortunately, the scale and pace of attacks often overwhelm even the best security analysts and teams.
As technology improves, new approaches to performing endpoint detection and response emerge. Artificial Intelligence and Machine Learning are new technologies that have been succesfuly applied to the traditional anti-virus problem of detecting “infected” or malicious files without the need for manually created signatures. It is now possible to extend this technology to the problem of detecting, and preventing attacks based on the new techniques that do not rely on infected files, but rather on the malicious behavior of systems regaurdless of the technique used for the attack.
Join Fernando Montenegro of 451 Research and Ed Metcalf of Cylance for this webinar about how endpoint detection and response can evolve by incorporating newer capabilities, and better support defenses in the modern threat environment.
As data centers and data center environments become more complex, the use of specialized infrastructure management tools has become critical. Results from the Uptime Institute’s global survey of data center and IT practitioners shows that most data centers are now being managed with DCIM software, and that DCIM implementations are becoming increasingly integrated with BMS, IT, and business systems, and relying on Machine Learning’s advanced analytics. In this webinar you’ll learn the DCIM trends from the survey that are affecting how organizations are managing their critical infrastructure.
Essential insight for leaders of the digital economy
451 Research is your radar into the business of IT innovation. Whether you are a product manager investigating the competition, an IT decision-maker evaluating the impact of emerging technologies on your business, a service provider finding your place in an evolving industry, or a dealmaker fueling the digital economy, 451 Research gives you the inside track on your business and your markets.
Flash Forward: Leave Legacy Performance BehindEric Hanselman, 451 Research Chief Analyst and Prabu Rambadran, Nutanix Director, Product Marketing[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]54 mins