Can Retail/Wi-Fi Analytics Help Retailers Survive in the Age of Amazon?
This Frost & Sullivan Analyst Briefing introduces an approach that is helping retailers better understand both their customers and their own operations by harvesting analytics from the Wi-Fi that many of them are already providing to shoppers.
Designed to benefit a wide range of attendees, including:
• Every retail or e-tail organization, and individual retailers of all types and sizes
• Every brand that sells through either the retail or e-tail channels
• Every brand that utilizes mobile technologies for sales and retention activity
• Every company that plays a role, or could, in equipping retailers to better compete
RecordedDec 4 201340 mins
Your place is confirmed, we'll send you email reminders
Why You Must Attend:
•Find out how connected cars are impacting the traditional automotive ecosystem
• Learn about the major trends in connectivity and security
• Discover how technologies and existing services will transform the way we interact with vehicles
• Understand how the new market players such as Apple CarPlay and Android Auto are now taking control of the connected car market, and the opportunities to create new digital services and customer experiences.
• Participate in an interactive panel discussion with Frost & Sullivan, Gemalto and Eliocity
Jarad Carleton, Jae Shin, John Michelsen, Varun Kohli, Avi Rosen
A round-table discussion with executives from Check Point Software Technologies, Zimperium, Skycure and Kaymera Technologies will focus on mobile security and illuminate the issues for companies that want to improve BYOD security in their organizations.
Why You Must Attend:
· Understand why raising the bar on mobile security is important across industries in the developed world
· Get expert insight from leading security technologists about trends that impact the enterprise today
· Learn what can be done to increase security in the BYOD environment
Benoy CS, Head of the Digital Transformation, Syed Masroor, Country Manager, Flash Solutions, EMC India & SAARC
Why You Must Attend:
• India is on the cusp of a digital revolution. Discover the opportunities and trends in digital transformation.
• Learn about the benefits of flash storage for new-age enterprise needs, such as business intelligence, analytics, and virtual desktop infrastructure.
• Nearly 75% of CIOs in India are using flash storage to support their mission-critical databases, such as SAP, Oracle, Microsoft, etc. Find out why.
• Discover how flash storage has helped CIOs achieve their business goals.
Adrian Drozd, Research Director and Vijay Michalik, Research Analyst
Historically, the education sector has been characterized by underestimated opportunities given poor visibility into the trends and challenges faced by the sector; however, investment inertia is finally starting to change. This briefing will focus on digital disruption in education, offering IT vendors insight into the growth opportunities. Education technology can disrupt the traditional service providers, and other IT vendors with applicable tools need to seize the opportunities before more nimble startups can lock them down. Education now represents a huge under-addressed market with significant new revenue streams available. However, it is crucial for providers targeting this space to understand the unique strategies and investment priorities of the education sector. In addition, having a clear perspective of how emerging technologies such as artificial intelligence, quantum computing, blockchain and IoT can help to revolutionize the sector is essential.
The UCC (unified communications and collaboration) landscape continues to change dramatically, with new tools and technologies available to address employee needs in the face of an increasingly virtual and mobile workplace. Attend this webinar to learn what companies are doing today to help their workers stay productive and what they intend to do in the future.
Financial technology (FinTech) is forcing the payment industry and financial institutions to rethink their strategies and accelerate their digital transformation. This disruption is a fantastic opportunity for banks and financial institutions to create new digital services, exciting customer experiences, and innovative technical solutions. In Europe, traditional players within the payment space will have to share the payment transaction process with new entrants. The quality of the security and liability may shift to the historical players, while start-ups could benefit from the new payment services market growth without having to support the risk. Payment alternative solutions providers will have a more aggressive sales approach and exciting pricing structure. Future consumers will probably be attracted to this disruptive payment initiative, shrinking the total addressable market for traditional players. Fintech is a global revolution, but the US is clearly driving investments.
The payment industry expected mobile payment to become a major player. But market adoption failed to meet expectations. Thanks to the EMV (Europay MasterCard and Visa liability) shift in the US and many global initiatives, payment infrastructures are ready for a mobile payment explosion.
Why You Must Attend:
· Listen to Oberthur Technologies, one of the major market players in the field
· Learn the latest information regarding mobile payment evolution
· Hear about the latest technology directly from market players
· Understand your mobile payment knowledge and expectations
This briefing will analyze the reigning trends in the European data center services market, providing an overview of the go-to-market strategies of various providers. We will also be joined by Matthew Finnie, chief technology officer at Interoute, who will provide his perspective on the growth of the data center services market.
Why You Must Attend:
• Find out how cloud is impacting traditional data center services
• Learn about the major trends in data center and cloud services
• Discover how providers are catering to hybrid IT requirements
• Understand competing strategies adopted by data center services providers
Ajay Sunder, Vice President, Digital Transformation, Frost & Sullivan
Asia Pacific’s data center services market is currently undergoing significant traction, with a healthy growth of 15.4% over 2015 to reach revenues in excess of US$14 billion in 2016. With exceptional growth in emerging markets, Frost & Sullivan expects the strong pace of growth to continue within the Asia Pacific markets. The market is expected to grow at a CAGR of 14.7% between the period of 2015 - 2022 to reach US$32.8 billion at the end of 2022.
If you have any client that has an interest in gaining an in depth understanding of the data center services landscape in Asia Pacific this study will help, addressing questions such as:
What is the size of the Data Centre Services market at an APAC regional and at country level (10 markets)
Who are the major players in the fast moving and growing area
What are the key drivers for growth?
What are the market challenges?
This will interest:
Large enterprises who are procuring data center services in APAC (eg banks)
Any company looking at making a data centre investment, partnership or acquisition in APAC
Providers of power and cooling solutions who are selling into the APAC market
Property owners/developers who are planning to build data center facilities in the region
Other data centre providers who are interested to understand in detail what the market looks from an independent, trusted third party
Blockchains are a new solution to a fundamental question in the digital world: How do you establish trust between parties over the Internet’s untrusted network? More specifically, how do you get perfect, simultaneous, shared data between a number of different people, devices or businesses? It is the technology that supports cryptocurrencies such as Bitcoin, but it can support the transfer of any data or digital asset. Bitcoin is the tip of the blockchain iceberg. Decision makers across industries are beginning to ask: "What does blockchain technology mean for our future?" This webinar will equip attendees with the foundation to understand its huge potential.
Jean-Noël Georges, Frederique Richert, Mark Goldspink
The explosion of fraud in payment is a major concern for financial institutions as global business is based on trust. Fraudsters are clever and are able to quickly target unknown security breaches to succeed. In this webinar, we will focus on innovative ways to fight against fraud and discuss the latest trends in payment fraud.
Nancy Jamison, Principal Analyst, Digital Transformation and Rob Allman, Group General Manager, Dimension Data
It’s increasingly clear that improving the customer experience and reducing customer effort are critical in today’s competitive environment. It’s also clear that businesses and solution providers are embracing omnichannel customer care with the goal of seamless customer engagement. Is omnichannel realistic?
Why you should attend:
• Learn where companies are in providing omnichannel customer care
• Identify the drivers and restraints in omnichannel delivery
• Hear a key global systems integrator and solutions provider talk about the challenges and successes of omnichannel delivery
Adrian Drozd, Research Director and Jonanthan Robinson, Principal Consultant
The connected (or smart) home market is attracting widespread attention from companies across numerous sectors. Connected homes depend on a rich ecosystem of network infrastructure, content delivery, and home automation technologies. Growth opportunities exist for companies spanning communications, energy, healthcare and security, to name a few.
This webinar will draw on this insight to provide a pragmatic view of current consumer perspectives. In particular, this presentation will:
• Identify consumer demands for a connected lifestyle
• Understand consumer challenges and expectations in a smart home environment
• Define the functions that consumers see most value in connecting
• Outline the level of functional integration expected by consumers
This briefing will interest ICT vendors seeking to understand how cities are investing in open and big data, and how they plan to invest beyond the proof-of-concept stage. Participants from cities will gain an overview of activities and best practices in Europe.
During this webinar we will:
· Share results of the Real-time Cities Survey
· Discuss implications for future commercialization
· Identify the leading cities
· Point to the emerging ICT opportunities
Industry Analyst Lehlohonolo Mokenela and Ambar Sur, Founder and CEO at Terra
Mobile money is paving the way for greater financial inclusion throughout Africa and transforming the way consumers transact with one other. The mobile money industry has been shaped by a robust ecosystem of network operators, technology partners and merchants. Recent innovations are leading the trend toward more transactional services, moving beyond basic peer-to-peer transfers.
Why You Should Attend:
- Learn about the growth of mobile money
- Understand the innovation driving service uptake
- Hear from one of the leading mobile money technology partners
Hybrid IT is fast becoming the new normal across organizations in Asia-Pacific. With the increasing utilization of data centers and cloud services across the Asia Pacific region, companies have gradually updated or upgraded their existing IT systems, giving rise to the Hybrid IT environment. Besides helping enterprises to drive digital disruption, the latest Hybrid IT environment is also enhancing the customer experience and encouraging business model innovation. As a result, there is greater acceleration in the adoption of a multi-vendor multi-cloud environment or Hybrid IT.Together with the Cloud, Hybrid IT is enabling the accelerated adoption of new technologies such as Big Data, the Internet of Things and Connected Industries.
Mayank Kapoor, Industry Principal, ICT - Data Center and Cloud Computing, Frost & Sullivan, Asia Pacific discusses these and key insights on how these new technologies are driving industry transformation not just across the ICT industry but also the Manufacturing, Automotive and Healthcare industries.
Robert Arnold, Frost & Sullivan; Mark Dumas, Acano; Jim Moss, Plasticity; Andrew Dixon, Igloo Software
New business collaboration tools provide users with access to a range of rich functionality from a single interface. These tools complement and displace existing collaboration apps. Despite strong value propositions, the many choices with similar functionality may cause uncertainty and hesitation among buyers.
A panel of industry experts will discuss the dos and don'ts that organizations should consider when investigating or deploying these solutions.
Audrey William | Head of Research, Australia and New Zealand | ICT | Frost & Sullivan, Arvind Arun |Industry Analyst Asia Pa
Wearable technologies illustrate a fundamental shift in how computing will move to the next level, as devices will no longer need to be placed on a desk or held by hand. They are now worn on the human body, offering the user hands free capability. The market is still in its early stages of development, and interest in wearables is currently largely restricted to innovators and early adopters. This Frost & Sullivan Analyst briefing will look at the demand for wearables technologies in the consumer and enterprise space as well as look at some of the leading players in this market
Why you should attend:
- Learn about the opportunities ahead in the Australian Wearables Market
- Understand the drivers in this market
- Understand the key players in both the Consumer and Enterprise Space
- Understand the issues in this space
- Learn about the Ecosystem of players in the Wearables Technologies Space
Michael DeSalles, Rene Yoakum, Mark Pfeiffer, and Sarah Troup
Impact Sourcing (IS) is a business process service delivery model that provides quality and cost at parity with traditional Business Process Outsourcing (BPO), but with optimized enhancements. IS employs individuals with limited opportunity for sustainable employment as principal workers in BPO centers to provide high-quality, information-based services to domestic and international public and private-sector clients.
You will learn about:
·A qualified, trained talent pool with skillsets aligned to match client needs
·Lower attrition rates and higher corresponding levels of employee engagement
·Opportunities to fulfil corporate social responsibility and diversity objectives
Frost & Sullivan's Digital Transformation webcasts provides global industry analysis, market forecasts, competitive analysis, and insights into emerging technologies that are designed to help your company address current trends and challenges.
Our global teams of industry experts, consultants, and market analysts continuously monitor big data, cloud computing, communication services, conferencing & collaboration, digital identification, digital media, mobile & wireless, space & communications, IT applications & services, network security, customer contact, and unified communications markets.
IT organizations have hit a breaking point in siloed management tools to address one of the most critical issues today - cybersecurity hygiene. In particular, numerous point solutions targeting the endpoints drive cost, complexity, and other challenges. New investments in cloud, distributed workforces and increasing numbers of connected devices only exasperate this problem. Addressing cybersecurity hygiene means that critical actions must be made on demand versus scheduled. Teams must also have confidence that assessment results and remediation actions are complete.
Come learn about the key issues why cybersecurity hygiene fails in most organization. We’ll discuss in depth how the platform approach and speed of Tanium are poised to fix this critical problem. Eric Hanselman, 451 Chief Analyst, and Erik Kristiansen, Senior Director of Product Marketing at Tanium will discuss.
Cyber attackers are going phishing in your network pond.
Learn how you can keep your people from taking the bait.
Nowadays there are as many ways to communicate as there are things to say. Even so, email continues to be the primary method to connect with others, and the preferred vector for cyber-attacks. The latest threat targeting higher learning institutions comes from Business Email Compromise, an emerging but sophisticated cyber-attack consisting of low-volume campaigns of highly targeted phishing emails.
In part 3 of our three-part Webinar series, we’ll take a deep dive into Business Email Compromise and explore the various approaches attackers are using to execute campaigns targeting higher education institutions. You’ll learn the indispensable tactics you need to protect your higher learning environment from Business Email Compromise phishing attacks. Register Now.
One in five businesses don’t test for security vulnerabilities. A recent study by Osterman Research found that many businesses fail to conduct frequent security testing despite believing that it’s critically important to securing their systems and data.
In this presentation Michael Osterman, President of Osterman Research, Inc., will discuss key findings from the “Security Testing Practices and Priorities: An Osterman Research Survey Report”, including:
•Common types of security issues experienced in the past 12 months.
•The extent to which organizations take a proactive approach to security testing.
•Types of security testing conducted during the past 6 months.
•How often organizations conduct detailed review of security tests.
•Challenges faced by organizations in the context of security testing.
As application security moves into the realm of monitoring and protecting applications in production, it’s becoming even more critical to adopt solutions that are automated, continuous and natural. New technology innovations from HPE Security Fortify enable practitioners to continuously discover, profile and assess application portfolios of all sizes.
Avec le degré de maturité et le niveau de menace atteint par les ransomwares au cours de l’an dernier, comment pouvez-vous être sûrs que votre infrastructure IT est réellement protégée et que vous êtes prêt à parer à une attaque ?
Aujourd’hui, les responsables sécurité sont confrontés à :
•un manque de renseignements exploitables sur les menaces, qui leur permettraient de mieux cerner les acteurs et les campagnes susceptibles de viser leurs entreprises
•une carence en analystes de sécurité qualifiés, capables d’identifier le nombre croissant de menaces pénétrant leurs organisations. Par exemple, les cryptoransomwares sont en augmentation constante (+35 % en 2015 ) et il faut encore en moyenne plus de 200 jours à une entreprise pour découvrir qu’elle victime d’une attaque.
•peu d’expertise spécialisée dans les techniques requises pour réagir à des menaces et les neutraliser une fois que celles-ci ont pénétré leur environnement IT
Les gangs de rançonneurs ne cessant d’affiner leurs tactiques, les entreprises ont besoin d’être parfaitement au courant des menaces et des risques qu’elles encourent. Symantec vous donne rendez-vous pour un webcast consacré aux attaques par ransomware. Vous y découvrirez ce qui est arrivé à une société et les mesures qu’elle a prises pour remédier à la menace.
The cyber threat landscape has never been more dynamic, than what we are seeing today. With an expanding surface area for attacks and a cybercriminal ecosystem worth billion of dollars on a global scale, cybercriminals are constantly pursuing new methods to obtain financial funds.
It is no different in the Nordics – a region that is well known for its natural resources, innovations in renewable energy and healthcare, proximity to the Arctic, and emphasis on transparency in government is also a prime target for cybercriminals. These unique attributes make the region a prime target for cyber threat groups looking to capitalize on Nordic countries’ robust economies and distinct geopolitical concerns.
Join Jens Monrad, Senior Intelligence Account Analyst at FireEye, who will discuss:
* The Threat Landscape in the Nordics
* Trends and Insights in Malware detections across the Nordics
* Geopolitical situations which can influence the threat landscape in the Nordics
* How having accurate and enriched threat intelligence can enable organisations to make tactical, operation and strategic decisions.
Register today and learn what tools, processes and information organisations need in order to allow them to fully reconstruct the attack scenario and help make the right decisions based on the attack, as well as prepare for the next one.
El año pasado, el ransomware alcanzó un nivel de peligrosidad y profesionalidad nunca visto hasta ahora: ¿cómo puede estar seguro de que su infraestructura informática está protegida y de que está preparado para gestionar un ataque?
En la actualidad, los líderes de los equipos de seguridad se enfrentan a los siguientes desafíos:
•Una falta de inteligencia procesable sobre amenazas para mejorar su comprensión sobre los ciberdelincuentes y campañas que podrían tener como objetivo a su empresa.
•Muy pocos analistas de seguridad cualificados que puedan identificar el creciente número de amenazas que se infiltran en su organización. Por ejemplo, el uso del ransomware de cifrado como herramienta de ataque por parte de los ciberdelincuentes continuó aumentando en 2015, con un crecimiento del 35 %. Sin embargo, las empresas que sufren un ataque siguen tardando más de 200 días en conocerlo.
•Pocos conocimientos especializados en las técnicas necesarias para responder a las amenazas y repararlas una vez han invadido su entorno informático.
Los grupos de cibercriminales especializados en ransomware continúan evolucionando sus tácticas, por lo que las organizaciones deben ser plenamente conscientes de las amenazas que estos representan. Únase a Symantec en un webinar que se centrará en un ataque de ransomware para conocer más detalles sobre el incidente y sobre las medidas que tomó la empresa para reparar la amenaza.
Lo scorso anno il ransomware ha raggiunto un nuovo livello di evoluzione e pericolosità: come essere certi che l'infrastruttura IT sia protetta e in grado di affrontare un attacco?
Oggi i leader della sicurezza hanno importanti sfide da risolvere:
•Un’intelligence sulle minacce insufficiente a individuare gli aggressori e le campagne che potrebbero attaccare la loro azienda.
•La penuria di analisti di sicurezza competenti in grado di identificare il numero crescente di minacce che penetrano all’interno delle aziende. Nel 2015, ad esempio, l’uso del crypto-ransomware come strumento di aggressione è aumentato del 35%, ma le aziende aggredite impiegano ancora più di 200 giorni per accorgersi del problema.
•Scarsa conoscenza specializzata delle tecniche di incident response e remediation per gli ambienti IT colpiti.
Gli autori dei ransomware continuano ad affinare le proprie tattiche, e le aziende devono imparare a conoscere bene le nuove minacce. Partecipa al webinar Symantec che descrive un attacco di ransomware, le sue conseguenze e la strategia di remediation adottata dall’azienda colpita.
Next Generation Firewalls are Next Generation Firewalls…or maybe NOT.
In the light of new advanced attacks and the demands to lower security infrastructure costs, just how can one get the most out of the Next Generation Firewall (NGFW) solutions? Are all NGFW solutions the same?
What criteria should one consider for a NGFW solution that is best for your distributed enterprise environment? Join Forcepoint™’s Michael Ferguson and find out key value points when selecting a network security solution catered to your environment:
• Latest trends in NGFW
• Addressing total cost of ownership
• Security effectiveness in increasingly complex threat landscape
• Challenges in policy management
Also, find out why Forcepoint Stonesoft NGFW has won NSS Labs' coveted highest rating of “Recommended” for the 4th year in a row. Learn how it can provide the scalability, protection and visibility needed to effectively manage your distributed networks. Plus, rapidly and easily deploy, monitor and manage thousands of firewalls from a single pane of glass.
Learn how all employees can work and collaborate securely! The new world of work demands that people collaborate faster and more seamlessly than ever before.
Your employees have access to cloud-based apps, personal devices, and pervasive internet connectivity. All these things are great for getting work done, but your company is still held to high standards around security, and auditing, and you can't afford to make a wrong move.
Join this webcast to explore some common security scenarios such as:
•How do you provide access when you can't always control the endpoint?
•How do you know where all your company's files are right now?
•If you terminate an employee, how would you know what files they had in their possession.?
•Could you wipe a terminated employee's corporate data while leaving their personal content alone?
This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!