Can Retail/Wi-Fi Analytics Help Retailers Survive in the Age of Amazon?
This Frost & Sullivan Analyst Briefing introduces an approach that is helping retailers better understand both their customers and their own operations by harvesting analytics from the Wi-Fi that many of them are already providing to shoppers.
Designed to benefit a wide range of attendees, including:
• Every retail or e-tail organization, and individual retailers of all types and sizes
• Every brand that sells through either the retail or e-tail channels
• Every brand that utilizes mobile technologies for sales and retention activity
• Every company that plays a role, or could, in equipping retailers to better compete
RecordedDec 4 201340 mins
Your place is confirmed, we'll send you email reminders
Adrian Drozd, Research Director and Vijay Michalik, Research Analyst
Historically, the education sector has been characterized by underestimated opportunities given poor visibility into the trends and challenges faced by the sector; however, investment inertia is finally starting to change. This briefing will focus on digital disruption in education, offering IT vendors insight into the growth opportunities. Education technology can disrupt the traditional service providers, and other IT vendors with applicable tools need to seize the opportunities before more nimble startups can lock them down. Education now represents a huge under-addressed market with significant new revenue streams available. However, it is crucial for providers targeting this space to understand the unique strategies and investment priorities of the education sector. In addition, having a clear perspective of how emerging technologies such as artificial intelligence, quantum computing, blockchain and IoT can help to revolutionize the sector is essential.
The UCC (unified communications and collaboration) landscape continues to change dramatically, with new tools and technologies available to address employee needs in the face of an increasingly virtual and mobile workplace. Attend this webinar to learn what companies are doing today to help their workers stay productive and what they intend to do in the future.
Financial technology (FinTech) is forcing the payment industry and financial institutions to rethink their strategies and accelerate their digital transformation. This disruption is a fantastic opportunity for banks and financial institutions to create new digital services, exciting customer experiences, and innovative technical solutions. In Europe, traditional players within the payment space will have to share the payment transaction process with new entrants. The quality of the security and liability may shift to the historical players, while start-ups could benefit from the new payment services market growth without having to support the risk. Payment alternative solutions providers will have a more aggressive sales approach and exciting pricing structure. Future consumers will probably be attracted to this disruptive payment initiative, shrinking the total addressable market for traditional players. Fintech is a global revolution, but the US is clearly driving investments.
The payment industry expected mobile payment to become a major player. But market adoption failed to meet expectations. Thanks to the EMV (Europay MasterCard and Visa liability) shift in the US and many global initiatives, payment infrastructures are ready for a mobile payment explosion.
Why You Must Attend:
· Listen to Oberthur Technologies, one of the major market players in the field
· Learn the latest information regarding mobile payment evolution
· Hear about the latest technology directly from market players
· Understand your mobile payment knowledge and expectations
This briefing will analyze the reigning trends in the European data center services market, providing an overview of the go-to-market strategies of various providers. We will also be joined by Matthew Finnie, chief technology officer at Interoute, who will provide his perspective on the growth of the data center services market.
Why You Must Attend:
• Find out how cloud is impacting traditional data center services
• Learn about the major trends in data center and cloud services
• Discover how providers are catering to hybrid IT requirements
• Understand competing strategies adopted by data center services providers
Ajay Sunder, Vice President, Digital Transformation, Frost & Sullivan
Asia Pacific’s data center services market is currently undergoing significant traction, with a healthy growth of 15.4% over 2015 to reach revenues in excess of US$14 billion in 2016. With exceptional growth in emerging markets, Frost & Sullivan expects the strong pace of growth to continue within the Asia Pacific markets. The market is expected to grow at a CAGR of 14.7% between the period of 2015 - 2022 to reach US$32.8 billion at the end of 2022.
If you have any client that has an interest in gaining an in depth understanding of the data center services landscape in Asia Pacific this study will help, addressing questions such as:
What is the size of the Data Centre Services market at an APAC regional and at country level (10 markets)
Who are the major players in the fast moving and growing area
What are the key drivers for growth?
What are the market challenges?
This will interest:
Large enterprises who are procuring data center services in APAC (eg banks)
Any company looking at making a data centre investment, partnership or acquisition in APAC
Providers of power and cooling solutions who are selling into the APAC market
Property owners/developers who are planning to build data center facilities in the region
Other data centre providers who are interested to understand in detail what the market looks from an independent, trusted third party
Blockchains are a new solution to a fundamental question in the digital world: How do you establish trust between parties over the Internet’s untrusted network? More specifically, how do you get perfect, simultaneous, shared data between a number of different people, devices or businesses? It is the technology that supports cryptocurrencies such as Bitcoin, but it can support the transfer of any data or digital asset. Bitcoin is the tip of the blockchain iceberg. Decision makers across industries are beginning to ask: "What does blockchain technology mean for our future?" This webinar will equip attendees with the foundation to understand its huge potential.
Jean-Noël Georges, Frederique Richert, Mark Goldspink
The explosion of fraud in payment is a major concern for financial institutions as global business is based on trust. Fraudsters are clever and are able to quickly target unknown security breaches to succeed. In this webinar, we will focus on innovative ways to fight against fraud and discuss the latest trends in payment fraud.
Nancy Jamison, Principal Analyst, Digital Transformation and Rob Allman, Group General Manager, Dimension Data
It’s increasingly clear that improving the customer experience and reducing customer effort are critical in today’s competitive environment. It’s also clear that businesses and solution providers are embracing omnichannel customer care with the goal of seamless customer engagement. Is omnichannel realistic?
Why you should attend:
• Learn where companies are in providing omnichannel customer care
• Identify the drivers and restraints in omnichannel delivery
• Hear a key global systems integrator and solutions provider talk about the challenges and successes of omnichannel delivery
Adrian Drozd, Research Director and Jonanthan Robinson, Principal Consultant
The connected (or smart) home market is attracting widespread attention from companies across numerous sectors. Connected homes depend on a rich ecosystem of network infrastructure, content delivery, and home automation technologies. Growth opportunities exist for companies spanning communications, energy, healthcare and security, to name a few.
This webinar will draw on this insight to provide a pragmatic view of current consumer perspectives. In particular, this presentation will:
• Identify consumer demands for a connected lifestyle
• Understand consumer challenges and expectations in a smart home environment
• Define the functions that consumers see most value in connecting
• Outline the level of functional integration expected by consumers
This briefing will interest ICT vendors seeking to understand how cities are investing in open and big data, and how they plan to invest beyond the proof-of-concept stage. Participants from cities will gain an overview of activities and best practices in Europe.
During this webinar we will:
· Share results of the Real-time Cities Survey
· Discuss implications for future commercialization
· Identify the leading cities
· Point to the emerging ICT opportunities
Industry Analyst Lehlohonolo Mokenela and Ambar Sur, Founder and CEO at Terra
Mobile money is paving the way for greater financial inclusion throughout Africa and transforming the way consumers transact with one other. The mobile money industry has been shaped by a robust ecosystem of network operators, technology partners and merchants. Recent innovations are leading the trend toward more transactional services, moving beyond basic peer-to-peer transfers.
Why You Should Attend:
- Learn about the growth of mobile money
- Understand the innovation driving service uptake
- Hear from one of the leading mobile money technology partners
Hybrid IT is fast becoming the new normal across organizations in Asia-Pacific. With the increasing utilization of data centers and cloud services across the Asia Pacific region, companies have gradually updated or upgraded their existing IT systems, giving rise to the Hybrid IT environment. Besides helping enterprises to drive digital disruption, the latest Hybrid IT environment is also enhancing the customer experience and encouraging business model innovation. As a result, there is greater acceleration in the adoption of a multi-vendor multi-cloud environment or Hybrid IT.Together with the Cloud, Hybrid IT is enabling the accelerated adoption of new technologies such as Big Data, the Internet of Things and Connected Industries.
Mayank Kapoor, Industry Principal, ICT - Data Center and Cloud Computing, Frost & Sullivan, Asia Pacific discusses these and key insights on how these new technologies are driving industry transformation not just across the ICT industry but also the Manufacturing, Automotive and Healthcare industries.
Robert Arnold, Frost & Sullivan; Mark Dumas, Acano; Jim Moss, Plasticity; Andrew Dixon, Igloo Software
New business collaboration tools provide users with access to a range of rich functionality from a single interface. These tools complement and displace existing collaboration apps. Despite strong value propositions, the many choices with similar functionality may cause uncertainty and hesitation among buyers.
A panel of industry experts will discuss the dos and don'ts that organizations should consider when investigating or deploying these solutions.
Audrey William | Head of Research, Australia and New Zealand | ICT | Frost & Sullivan, Arvind Arun |Industry Analyst Asia Pa
Wearable technologies illustrate a fundamental shift in how computing will move to the next level, as devices will no longer need to be placed on a desk or held by hand. They are now worn on the human body, offering the user hands free capability. The market is still in its early stages of development, and interest in wearables is currently largely restricted to innovators and early adopters. This Frost & Sullivan Analyst briefing will look at the demand for wearables technologies in the consumer and enterprise space as well as look at some of the leading players in this market
Why you should attend:
- Learn about the opportunities ahead in the Australian Wearables Market
- Understand the drivers in this market
- Understand the key players in both the Consumer and Enterprise Space
- Understand the issues in this space
- Learn about the Ecosystem of players in the Wearables Technologies Space
Michael DeSalles, Rene Yoakum, Mark Pfeiffer, and Sarah Troup
Impact Sourcing (IS) is a business process service delivery model that provides quality and cost at parity with traditional Business Process Outsourcing (BPO), but with optimized enhancements. IS employs individuals with limited opportunity for sustainable employment as principal workers in BPO centers to provide high-quality, information-based services to domestic and international public and private-sector clients.
You will learn about:
·A qualified, trained talent pool with skillsets aligned to match client needs
·Lower attrition rates and higher corresponding levels of employee engagement
·Opportunities to fulfil corporate social responsibility and diversity objectives
Michael Suby, VP of Stratecast; Mike Jude, Research Manager; and Sandy Borthick, Industry Analyst
Data breaches of all sorts, affecting credit card providers, retailers and health care providers, suggest that such breaches will continue and grow as a major risk to all organizations and their IT, security, and compliance departments. At the same time, Big Data solutions are gradually becoming more prevalent, connecting many new sources of data and thus potentially increasing both the vulnerability and the magnitude of a data breach. It is no wonder that Stratecast survey data suggest that one of IT managers’ primary concerns with Big Data is security, yet the advantages of Big Data in enabling revenue creation make it very attractive to the business. This panel discussion will explore the security issues around Big Data.
In particular, the panel will discuss:
•Whether Big Data necessarily increases the risk of a security breach
•How to assess the risks associated with different types of Big Data solutions
•How to avoid data breaches in a Big Data environment
Africa Director Hendrik Malan and Grant Theis, CEO of ttrumpet
Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
Enterprises still don’t trust the cloud for their sensitive workloads. Are their concerns reasonable? Are they inevitable? In this briefing, Frost & Sullivan examines perceptions and realities associated with cloud security and recommends ways to mitigate risk.
Why You Should Attend:
• Understand the “risk premium” ascribed to the cloud versus the private data center.
• Learn why the cloud requires new processes for governance and compliance.
• Hear why traditional security approaches, such as asset protection, are not relevant to a cloud environment.
• Understand how to build a holistic approach to cloud security.
Frost & Sullivan's Digital Transformation webcasts provides global industry analysis, market forecasts, competitive analysis, and insights into emerging technologies that are designed to help your company address current trends and challenges.
Our global teams of industry experts, consultants, and market analysts continuously monitor big data, cloud computing, communication services, conferencing & collaboration, digital identification, digital media, mobile & wireless, space & communications, IT applications & services, network security, customer contact, and unified communications markets.
The Brexit decision is leaving many boards in disarray due to a lack in contingency planning and the uncertainty that comes with this transitional period.
There are steps boards can take to ensure they are making timely decisions and fulfilling requests and questions from shareholders and regulatory bodies.
Please join us as we tackle the topic of crisis management in the wake of the Brexit referendum result.
We will offer guidance on how to draft and implement a strong crisis management plan and improve board communications during this challenging time, including:
• Becoming better informed of the situation
• Getting all relevant parties on the same page
• Deciding on what measures to take
• Ensuring all communication are secure and confidential
• Taking steps to facilitate conversations between key decision makers during times of crisis and uncertainty
Il est possible d’offrir aux utilisateurs nomades un accès simple et rapide aux applications, données et ressources de l’entreprise, sans compromettre la sécurité.
Inscrivez-vous à ce webcast en direct pour découvrir comment :
•garantir aux seuls utilisateurs autorisés et appareils approuvés l’accès au réseau de votre entreprise ;
•fournir rapidement et aisément un accès mobile sécurisé et des privilèges basés sur des rôles.
•utiliser les principales fonctionnalités de la version de firmware SMA 11.4.
Detecting and investigating malicious or unintentional activity is a time consuming effort and an inefficient use of our limited resources. All too frequently, we discover something is amiss and realize that problem has existed for a long time, yet it's just come to your attention. How can an organization increase the speed of detection of malicious activity? Can detection and investigation processes benefit from "hitting the afterburners"? Join RSA Security and (ISC)2 on June 30, 2016 at 1:00PM Eastern for a discussion on detection and investigation visibility and what to leverage to make threat detection effective.
Data protection laws in Europe, until now, have been fragmented and inconsistent. With passage of the new European Union General Data Protection Regulation (GDPR) this year, 2018 will be the beginning of widespread unification and standardization of data privacy requirements across 28 nations that now comprise the EU. Organizations should start planning now, as they will have increased obligations related to data throughout its lifecycle. The growth of data use through Big Data, Cloud, Mobile, and Internet of Things (IoT) applications has heightened the challenges of managing, securing and governing information.
GDPR requirements go into effect over the next two years, what does it mean for your organization? How does the new technology landscape factor into GDPR? How do you get started with your compliance program? What kinds of tools and assistance are available? You are not alone in the desert. Join us for some roadmap ideas to help you navigate this significant data governance challenge.
This webinar does not provide legal advice; it is designed to highlight tools, techniques, and services that can help you with your compliance programs. For legal advice, IBM recommends you consult with your own legal counsel.
Chief architects and CIOs know that API-led connectivity drives business and IT agility. MuleSoft surveyed tech leaders among its customers and discovered not only the value of IT agility, but dramatic, measurable business outcomes for organizations that adopted our approach to integration. This webinar will provide a practical approach to understanding the value of API-led connectivity within your company.
The concept of the Connected Hospital offers full integration with Electronic Health Record (EHR) systems, streamlined operations, and enhanced patient safety. Secure implementation of the capabilities that enable a connected hospital is a challenge given the diverse nature of the components involved. Hospitals, integrators and developers must work together to ensure that security is considered at each stage of a product and system life cycle. Device manufacturers and Solution Providers must ensure that their offerings have been securely engineered and have undergone sufficient testing, while health providers must work to apply defense-in-depth strategies to mitigate the threats to their systems and patients.
Join us for a panel discussion that examines the challenges associated with building a connected hospital and some of the measures taken to do so securely. We’ll hear from medical device developers, service providers, health care providers and security engineers in an attempt to make sense of the complex health environment being shaped by the IoT. Topics will include:
- Hospital concerns and approaches for enabling connected infrastructures and services
- Integrator concerns related to creation of connected systems
- Developer concerns related to smart, connected healthcare devices
- Thoughts on best practices for mitigating threats
- Chris Frenz, Director-Infrastructure, Interfaith Medical Center
- Jennifer Cathcart, Manager Cyber Security at Clinicomp
- Yogi Shaw, Medtronic
- Gib Sorebo, Cyber Security Technologist at Leidos
New breeds of malware are emerging every day. These network threats can run the gamut from minor bugs, to ransomware programs used to extort money and subject victims to the mercy of their data kidnapper. All malware is unwanted, but which types of malware are the most deadly to the health of your network?
Join Corey Nachreiner, CTO, and Marc Laliberte, information security analyst, as they discuss their Top 5 Least Wanted Malware: what they are, and more importantly, how to avoid them.
Join Martin Sugden, CEO of Boldon James and Martin Whitworth, ex-CISO and Senior Analyst at Forrester Research Inc. as they discuss the challenges faced by today’s CISO and senior security professionals, and the practical measures they can adopt to protect sensitive data assets and safeguard their reputation.
The latest data classification solutions can help protect data, reinforce good security behaviour and transform security culture. It can even optimise and enhance existing technologies such as DLP.
Using this best practice approach can help you protect your most sensitive data, ensure you stay compliant and help identify risky user behaviour – before it impacts your business.
Register now and find out more in this live, interactive webinar.
There's no such thing as infallible security, and preventing every single security breach is impossible.
But when a breach does happen, the steps an organization takes next will largely determine the damage they suffer, and how the business recovers. A security team's first reaction is often to move to eject the attackers. But is that always the right strategy? Especially when it comes to advanced threats, there is a case for biding your time, and gathering intelligence.
In this webinar, we will look at the key considerations for deciding how and when to expel attackers from the network, including:
•Why acting too quickly might cause more disruption
•Key points to consider when choosing an expulsion approach
•Critical areas to focus on when expelling attackers from the network ends
Viel zu häufig werden einfach neue Technologien gekauft, um „die Mauern zu erhöhen“ und damit das Sicherheitsniveau zu verbessern. Es ist jedoch erwiesen, dass diese Art von Investitionen nicht den gewünschten Effekt bei der Vermeidung von Datenlecks haben. Eine aktuelle Studie von Mandiant zeigt, dass 97% der befragten Unternehmen bereits Opfer von Datenschutzverletzungen waren. Was sollten Organisationen also tun?
In diesem Webinar erläutert Frank Koelmel, VP Central and Eastern Europe
bei FireEye, folgende Fragen:
- Mit welchen Methoden können Sie die Risiken für Ihr Unternehmen bewerten und diese ins Verhältnis zu den Security-Ausgaben setzen?
- Was sind die wichtigsten Schritte hin zu einer risikobasierten Sicherheitsstrategie?
- Wie und wo haben Ihre Investitionen in IT-Sicherheit den größten Effekt?
- Welche Arten von Managed Services helfen Ihnen, einen großen Teil der Herausforderungen zu lösen? Was kann outgesourced werden,
was muss intern gemacht werden?
- Welche Risikomanagement-Modelle können Sie anwenden, um
den Nutzen und die Total Cost of Ownership (TCO) der Security-Investitionen gegenüber Ihrem CIO zu demonstrieren?