End-to-End Visibility into Application Availability using HPE BPM and Sitescope
Managing applications while providing a top-notch user experience can be a challenge to any organization using the traditional systems-centric, bottom-up approach to application management. The bottom-up approach is not scalable to handle the issues and challenges with ever-changing, distributed environments.
Within an end-to-end business service, operations teams rely on having data for each component and setting a threshold or status check for everything that can go wrong. In essence, systems monitoring focuses on looking for what could go wrong instead of focusing on the desired results. The diversity of applications such as Web, Enterprise, Composite, Mobile, and Cloud make the bottom-up approach impossible to deploy and maintain.
Join us for this Webinar to learn the latest about Business Process Monitor (BPM) and SiteScope capabilities. For BPM we will review the new real devices monitors, new selenium monitoring and tips for BPM such as how to use dynamic baselines and script parameters. For Sitescope we will review our new Web interface, automatic docker monitoring, ChatOps integration and more...
RecordedMay 18 201670 mins
Your place is confirmed, we'll send you email reminders
Johna Till Johnson, CEO & Founder, Nemertes Research
Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk.
But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they can build the case for cybersecurity tools, staffing, and initiatives in a way that business professionals will understand--and fund.
Rebecca Herold. Panel: Jake Olcott, BitSight; Todd Boehler, ProcessUnity; Matt Kunkel, LogicGate; Scott Schneider, CyberGRX.
As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.
Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.
• Find out how to gain executive leadership buy-in for your VRM program.
• Learn how to perform quantifiable vendor security analyses.
• Discover how to leverage Automation to Scale your VRM program.
May 25th 2018 is the deadline day for achieving General Data Protection Regulation (GDPR) compliance. It is also only the beginning of GDPR.
Discover what GDPR means for your organization, how it affects US businesses and why it's important to be GDPR compliant.
Join this interactive Q&A panel discussion with industry experts to learn more about:
- The intersection of GDPR, privacy and cybersecurity
- How GDPR affects data governance, breach disclosures and overall data protection
- Recommendations for improving your organization's cyber resilience
- Brian Rutledge, Principal Security Engineer at Spanning
- Kalani Enos, IT Security Manager, FARO Technologies
- Heather Stratford, CEO of Stronger.tech
Cloud…outsourcing…Platform as a Service…all of these could make IT irrelevant, so how do you prevent this? By providing value every day and by running IT as a Business. Great catch-phrase, but what does it mean? In a nutshell: knowing the services IT is providing, what they cost to operate and whether they provide value, and by staying on the cutting edge of technology even with todays fast pace of change, so that the business you support remains competitive. This webinar addresses the basic building blocks you need to run like a business: defining services and offerings, layering in financial management and charge-backs/show-backs so you understand the costs of these offerings and how to pull it all together in a way that helps you run as a business does, even if it’s only on paper.
Rob Akershoek, Solutions Architect at Shell and part of the IT4IT Forum, discuss the challenges and opportunities of running IT as a business. Running IT as a business is more than finances and cutting cost – it’s about IT quality.
Ian MacDonald FBCS, CITP, FSM - Independent Consultant, Edenfield IT Consulting
Today, simply meeting the service commitments of the business consistently may no longer be considered enough.
Your business customers will over time have an expectation of increasing ‘value’ from their investment in the IT services you provide.
Continual Service Improvement (CSI) provides an opportunity to exploit the insight, knowledge and skills of your people to identify and drive improvements to your IT services that add value to the customer and begin to positively influence their perception of getting value for money from their IT service provider.
However, there is no value in CSI if the improvements provided are not focused on what your customer considers important to them. Equally, if the CSI improvements are not communicated to your customer and explained in a way that demonstrates tangible business value then this is a missed opportunity to demonstrate value and enhance customer satisfaction.
In this session, we explore the essential ‘CSI Building Blocks’ required to ensure that CSI becomes a core capability for the IT service provider to demonstrate value for money from the IT services provided to their customers.
This session will provide learning and guidance on:-
The importance of demonstrating value to ensure commercial success….and the challenge for the IT Service Provider
Understanding the concepts & characteristics of ‘value ‘
Understanding how CSI can provide ‘Value Add’ and positively influence customer perception of value for money
The essential ‘Building Blocks ‘ to enable CSI as an approach demonstrate the value provided from the IT Service providers people and capabilities
The ‘CSI Building Blocks’ include the need to apply ‘Outside In’ thinking to your ITSM strategy, understanding the importance of purpose and contribution in motivating your people to drive CSI in the workplace, the importance of business measures to convey business value and the importance of a ‘target and tailor’ approach to customer communications.
Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga
Endpoint security represents the frontline in your fight against cybercriminals. Despite the relative maturity of the endpoint security market, new threats and evolving attacker capabilities have proven traditional approaches inadequate - and left organizations exposed.
Guest speaker Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga will discuss the current state of endpoint security while highlighting a path forward for organizations looking to re-focus their strategies to combat current threats.
Attendees will learn:
• Which threats are causing the most difficulties for traditional
endpoint security approaches
• Why organizations need to balance positive and negative security
•How to layer multiple tools for maximum protection
Rob Shapland, Principal Cyber Security Consultant, First Base Technologies
How to make your staff your first and last line of defence.
Learn how to:
•Identify your enemy and their tactics
•Discover why technological defences will lose to hackers
•Learn how to make staff genuinely care about security
About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies
Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
Amar Singh (Cyber Management Alliance) | Simon Moor (FireEye) | Bob Honour (SonicWall)
With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.
Join this interactive Q&A panel to learn more about:
- Key factors for building a successful CISO strategy
- Why breach prevention matters
- True costs of breaches
- Technological solutions to consider for a more cyber resilient enterprise
- How AI/machine learning and human talent can work together
- Top threats to look out for in 2018
- Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
- Simon Moor, VP for Northern Europe, FireEye
- Bob Honour, EMEA Marketing Director, SonicWall
Dr. Christopher Pierson (Binary Sun) | Ben Johnson (Obsidian) | Deidre Diamond (CyberSN)
Having a strong buy-in from the highest level of executive leadership in your organization is a key factor for a successful implementation of your CISO strategy. With high-profile breaches on the rise and a company's reputation at stake, cybersecurity is a top-of-mind issue for CISOs.
Join this interactive Q&A panel to learn more about:
- Key factors for building a successful CISO strategy
- Selling your security strategy to the Board
- Why your Board should be up to date on cybersecurity
- Top threats to look out for in 2018
- Ben Johnson, CTO of Obsidian Security
- Deidre Diamond, Founder and CEO, CyberSN
- Dr. Christopher Pierson, CEO of Binary Sun Cyber Risk Advisors
This case study examines how a major NHS organisation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.
Join this webinar presentation to learn:
- Key lessons on the value of micro-marketing
- Lessons from cybernetics
- The value of cyber resilience in healthcare
About the Presenter:
Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.
Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.
Join this webinar to learn the GDPR requirements for managing personal information and digital identity.
Sophie Legault, Director of T&D Business Unit, EXFO
Listen to Sophie Legault, Director of T&D Business Unit at EXFO as she talks about the 4G to 5G transition, the implication of highly dense networks, impact on the costs of maintenance on fronthaul networks and the challenges MNOs may face. She will also delve into best practices for addressing interference and PIM in mobile networks and improving the quality of fiber-based fronthaul and CRAN deployments.
Presenter: Robin Gareiss, President, Nemertes Research; Moderator: Irwin Lazar, VP & Service Director, Nemertes Research
Digital workplace initiatives broadly expand applications and customization available to employees. During this webinar, we will cover:
• What is a digital workplace initiative, and the phases of deployment?
• What technologies and capabilities are included? Which vendors are the most critical?
• How soon will digital workplace initiatives incorporate artificial intelligence, human-to-machine interfaces, always-on collaboration, and other advanced technologies?
• Who is leading these initiatives? How involved are the business units, and which ones?
• What cultural or operational changes must be considered?
We look forward to sharing this information with you!
How frustrating is it to find qualified and reliable performance engineering talent in today’s hiring market? This talk will cover some challenges and success strategies in hiring that basic scripter all the way up to the rare full stack performance engineering unicorn. What to look for, what to avoid, how to handle technology interview fraud.
Join us for the next Quality & Testing SIG Talk on Tuesday, February 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1057043&group=.
HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View
As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.
And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.
During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.
“When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
Join Roy Ritthaler, VP of Product Marketing IT Operations Management and Genefa Murphy, VP of Partner and Product Marketing, Application Delivery Management at Hewlett Packard Enterprise Software, as they discuss the challenges and opportunities of digital transformation in organizations today. They will also discuss how IT management can accelerate your transition to the digital enterprise. Transformation is driven by business needs, and innovations in application delivery and testing, hybrid cloud, machine learning, collaboration and mobility. By leveraging these innovations you can manage risk while also realizing rapid time to value and to market.
The IT Specialist Network is one of the leading online networks with over 500,000 members and growing. Our speakers are leading IT professionals and executives with a wealth of knowledge and experience in the selection, evaluation and implementation of information technology.