Communication and Collaboration Technology Trends to Watch in 2014 and Beyond
Why you should attend:
• Learn about the most disruptive market trends in 2014
• Receive insight into customer UCC investment priorities
• Hear Frost & Sullivan’s strategic recommendations for end users and vendors
RecordedDec 18 201358 mins
Your place is confirmed, we'll send you email reminders
Adrian Drozd, Research Director and Vijay Michalik, Research Analyst
Historically, the education sector has been characterized by underestimated opportunities given poor visibility into the trends and challenges faced by the sector; however, investment inertia is finally starting to change. This briefing will focus on digital disruption in education, offering IT vendors insight into the growth opportunities. Education technology can disrupt the traditional service providers, and other IT vendors with applicable tools need to seize the opportunities before more nimble startups can lock them down. Education now represents a huge under-addressed market with significant new revenue streams available. However, it is crucial for providers targeting this space to understand the unique strategies and investment priorities of the education sector. In addition, having a clear perspective of how emerging technologies such as artificial intelligence, quantum computing, blockchain and IoT can help to revolutionize the sector is essential.
The UCC (unified communications and collaboration) landscape continues to change dramatically, with new tools and technologies available to address employee needs in the face of an increasingly virtual and mobile workplace. Attend this webinar to learn what companies are doing today to help their workers stay productive and what they intend to do in the future.
Financial technology (FinTech) is forcing the payment industry and financial institutions to rethink their strategies and accelerate their digital transformation. This disruption is a fantastic opportunity for banks and financial institutions to create new digital services, exciting customer experiences, and innovative technical solutions. In Europe, traditional players within the payment space will have to share the payment transaction process with new entrants. The quality of the security and liability may shift to the historical players, while start-ups could benefit from the new payment services market growth without having to support the risk. Payment alternative solutions providers will have a more aggressive sales approach and exciting pricing structure. Future consumers will probably be attracted to this disruptive payment initiative, shrinking the total addressable market for traditional players. Fintech is a global revolution, but the US is clearly driving investments.
The payment industry expected mobile payment to become a major player. But market adoption failed to meet expectations. Thanks to the EMV (Europay MasterCard and Visa liability) shift in the US and many global initiatives, payment infrastructures are ready for a mobile payment explosion.
Why You Must Attend:
· Listen to Oberthur Technologies, one of the major market players in the field
· Learn the latest information regarding mobile payment evolution
· Hear about the latest technology directly from market players
· Understand your mobile payment knowledge and expectations
This briefing will analyze the reigning trends in the European data center services market, providing an overview of the go-to-market strategies of various providers. We will also be joined by Matthew Finnie, chief technology officer at Interoute, who will provide his perspective on the growth of the data center services market.
Why You Must Attend:
• Find out how cloud is impacting traditional data center services
• Learn about the major trends in data center and cloud services
• Discover how providers are catering to hybrid IT requirements
• Understand competing strategies adopted by data center services providers
Ajay Sunder, Vice President, Digital Transformation, Frost & Sullivan
Asia Pacific’s data center services market is currently undergoing significant traction, with a healthy growth of 15.4% over 2015 to reach revenues in excess of US$14 billion in 2016. With exceptional growth in emerging markets, Frost & Sullivan expects the strong pace of growth to continue within the Asia Pacific markets. The market is expected to grow at a CAGR of 14.7% between the period of 2015 - 2022 to reach US$32.8 billion at the end of 2022.
If you have any client that has an interest in gaining an in depth understanding of the data center services landscape in Asia Pacific this study will help, addressing questions such as:
What is the size of the Data Centre Services market at an APAC regional and at country level (10 markets)
Who are the major players in the fast moving and growing area
What are the key drivers for growth?
What are the market challenges?
This will interest:
Large enterprises who are procuring data center services in APAC (eg banks)
Any company looking at making a data centre investment, partnership or acquisition in APAC
Providers of power and cooling solutions who are selling into the APAC market
Property owners/developers who are planning to build data center facilities in the region
Other data centre providers who are interested to understand in detail what the market looks from an independent, trusted third party
Blockchains are a new solution to a fundamental question in the digital world: How do you establish trust between parties over the Internet’s untrusted network? More specifically, how do you get perfect, simultaneous, shared data between a number of different people, devices or businesses? It is the technology that supports cryptocurrencies such as Bitcoin, but it can support the transfer of any data or digital asset. Bitcoin is the tip of the blockchain iceberg. Decision makers across industries are beginning to ask: "What does blockchain technology mean for our future?" This webinar will equip attendees with the foundation to understand its huge potential.
Jean-Noël Georges, Frederique Richert, Mark Goldspink
The explosion of fraud in payment is a major concern for financial institutions as global business is based on trust. Fraudsters are clever and are able to quickly target unknown security breaches to succeed. In this webinar, we will focus on innovative ways to fight against fraud and discuss the latest trends in payment fraud.
Nancy Jamison, Principal Analyst, Digital Transformation and Rob Allman, Group General Manager, Dimension Data
It’s increasingly clear that improving the customer experience and reducing customer effort are critical in today’s competitive environment. It’s also clear that businesses and solution providers are embracing omnichannel customer care with the goal of seamless customer engagement. Is omnichannel realistic?
Why you should attend:
• Learn where companies are in providing omnichannel customer care
• Identify the drivers and restraints in omnichannel delivery
• Hear a key global systems integrator and solutions provider talk about the challenges and successes of omnichannel delivery
Adrian Drozd, Research Director and Jonanthan Robinson, Principal Consultant
The connected (or smart) home market is attracting widespread attention from companies across numerous sectors. Connected homes depend on a rich ecosystem of network infrastructure, content delivery, and home automation technologies. Growth opportunities exist for companies spanning communications, energy, healthcare and security, to name a few.
This webinar will draw on this insight to provide a pragmatic view of current consumer perspectives. In particular, this presentation will:
• Identify consumer demands for a connected lifestyle
• Understand consumer challenges and expectations in a smart home environment
• Define the functions that consumers see most value in connecting
• Outline the level of functional integration expected by consumers
This briefing will interest ICT vendors seeking to understand how cities are investing in open and big data, and how they plan to invest beyond the proof-of-concept stage. Participants from cities will gain an overview of activities and best practices in Europe.
During this webinar we will:
· Share results of the Real-time Cities Survey
· Discuss implications for future commercialization
· Identify the leading cities
· Point to the emerging ICT opportunities
Industry Analyst Lehlohonolo Mokenela and Ambar Sur, Founder and CEO at Terra
Mobile money is paving the way for greater financial inclusion throughout Africa and transforming the way consumers transact with one other. The mobile money industry has been shaped by a robust ecosystem of network operators, technology partners and merchants. Recent innovations are leading the trend toward more transactional services, moving beyond basic peer-to-peer transfers.
Why You Should Attend:
- Learn about the growth of mobile money
- Understand the innovation driving service uptake
- Hear from one of the leading mobile money technology partners
Hybrid IT is fast becoming the new normal across organizations in Asia-Pacific. With the increasing utilization of data centers and cloud services across the Asia Pacific region, companies have gradually updated or upgraded their existing IT systems, giving rise to the Hybrid IT environment. Besides helping enterprises to drive digital disruption, the latest Hybrid IT environment is also enhancing the customer experience and encouraging business model innovation. As a result, there is greater acceleration in the adoption of a multi-vendor multi-cloud environment or Hybrid IT.Together with the Cloud, Hybrid IT is enabling the accelerated adoption of new technologies such as Big Data, the Internet of Things and Connected Industries.
Mayank Kapoor, Industry Principal, ICT - Data Center and Cloud Computing, Frost & Sullivan, Asia Pacific discusses these and key insights on how these new technologies are driving industry transformation not just across the ICT industry but also the Manufacturing, Automotive and Healthcare industries.
Robert Arnold, Frost & Sullivan; Mark Dumas, Acano; Jim Moss, Plasticity; Andrew Dixon, Igloo Software
New business collaboration tools provide users with access to a range of rich functionality from a single interface. These tools complement and displace existing collaboration apps. Despite strong value propositions, the many choices with similar functionality may cause uncertainty and hesitation among buyers.
A panel of industry experts will discuss the dos and don'ts that organizations should consider when investigating or deploying these solutions.
Audrey William | Head of Research, Australia and New Zealand | ICT | Frost & Sullivan, Arvind Arun |Industry Analyst Asia Pa
Wearable technologies illustrate a fundamental shift in how computing will move to the next level, as devices will no longer need to be placed on a desk or held by hand. They are now worn on the human body, offering the user hands free capability. The market is still in its early stages of development, and interest in wearables is currently largely restricted to innovators and early adopters. This Frost & Sullivan Analyst briefing will look at the demand for wearables technologies in the consumer and enterprise space as well as look at some of the leading players in this market
Why you should attend:
- Learn about the opportunities ahead in the Australian Wearables Market
- Understand the drivers in this market
- Understand the key players in both the Consumer and Enterprise Space
- Understand the issues in this space
- Learn about the Ecosystem of players in the Wearables Technologies Space
Michael DeSalles, Rene Yoakum, Mark Pfeiffer, and Sarah Troup
Impact Sourcing (IS) is a business process service delivery model that provides quality and cost at parity with traditional Business Process Outsourcing (BPO), but with optimized enhancements. IS employs individuals with limited opportunity for sustainable employment as principal workers in BPO centers to provide high-quality, information-based services to domestic and international public and private-sector clients.
You will learn about:
·A qualified, trained talent pool with skillsets aligned to match client needs
·Lower attrition rates and higher corresponding levels of employee engagement
·Opportunities to fulfil corporate social responsibility and diversity objectives
Michael Suby, VP of Stratecast; Mike Jude, Research Manager; and Sandy Borthick, Industry Analyst
Data breaches of all sorts, affecting credit card providers, retailers and health care providers, suggest that such breaches will continue and grow as a major risk to all organizations and their IT, security, and compliance departments. At the same time, Big Data solutions are gradually becoming more prevalent, connecting many new sources of data and thus potentially increasing both the vulnerability and the magnitude of a data breach. It is no wonder that Stratecast survey data suggest that one of IT managers’ primary concerns with Big Data is security, yet the advantages of Big Data in enabling revenue creation make it very attractive to the business. This panel discussion will explore the security issues around Big Data.
In particular, the panel will discuss:
•Whether Big Data necessarily increases the risk of a security breach
•How to assess the risks associated with different types of Big Data solutions
•How to avoid data breaches in a Big Data environment
Africa Director Hendrik Malan and Grant Theis, CEO of ttrumpet
Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
Enterprises still don’t trust the cloud for their sensitive workloads. Are their concerns reasonable? Are they inevitable? In this briefing, Frost & Sullivan examines perceptions and realities associated with cloud security and recommends ways to mitigate risk.
Why You Should Attend:
• Understand the “risk premium” ascribed to the cloud versus the private data center.
• Learn why the cloud requires new processes for governance and compliance.
• Hear why traditional security approaches, such as asset protection, are not relevant to a cloud environment.
• Understand how to build a holistic approach to cloud security.
Frost & Sullivan's Digital Transformation webcasts provides global industry analysis, market forecasts, competitive analysis, and insights into emerging technologies that are designed to help your company address current trends and challenges.
Our global teams of industry experts, consultants, and market analysts continuously monitor big data, cloud computing, communication services, conferencing & collaboration, digital identification, digital media, mobile & wireless, space & communications, IT applications & services, network security, customer contact, and unified communications markets.
FireEye’s Dynamic Threat Intelligence (DTI) has identified a wave of emails containing malicious attachments being sent to multiple banks in the Middle East region. The threat actors appear to be performing initial reconnaissance against would-be targets, and the attacks caught FireEye’s attention since they were using unique scripts not commonly seen in crimeware campaigns.
FireEye now invites you to learn more about what happened from its Director of Mandiant Services in the Middle East. Stuart will elaborate on these targeted attacks, detailing the tools, tactics, techniques and procedures used as well as to discuss the intelligence gained from them to help you better protect your organisation against similar natured attacks now and in the future.
Agile IT service delivery models and mixed infrastructure are presenting new security challenges for many organizations. Old approaches to security don’t work well with automated, on-demand infrastructure in mixed on-premise and cloud environments, all with high rates of change and shared resources.
The webinar, featuring 451 Group Senior Security Analyst, Adrian Sanabria and Chief Product Officer at CloudPassage, Ram Krishnan, will cover:
•A brief overview of the transformation of IT delivery models
•Conversation about why old tools don’t work in this new model
•Specific ways to prepare for securing agile IT delivery models and on-demand IT services
Join Catherine Roy, Director of PMO at HOSTING, and Kellen Amobi, Project Manager at HOSTING, on June 23 at 3 pm EST for Cloud Migration: Tales from the Trenches – an interactive webinar, in which they will discuss:
-Developing scopes and deadlines for complex projects
-Developing realistic schedules
-How to approach and define problems for c-level and team members
Dealing with a large number of IT vulnerabilities is an issue for most organizations. Only 10 Common Vulnerabilities and Exposures (CVEs) account for 97% of the exploits*. Clearly, it is vital for you to identify which of your vulnerabilities are the most critical to address first with fast, effective remediation.
Qualys’ newest solution ThreatPROTECT correlates vulnerability data with a Live Threat Intelligence Feed from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first.
During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to:
* Quickly identify your most important assets and critical vulnerabilities
* Prioritize remediation efforts so you know which vulnerabilities to tackle first
* Eliminate the guesswork with real-time correlation of active threats
Employees might feel intimidated or overwhelmed with the amount and diversity of business data available to them.
Accessing and harnessing all of that data could be a game changer for them, but they're not sure how to do it. Up until now integrating, analyzing, and understanding all those data sources hasn't been easy, timely, or affordable for your team - not to mention your business users. Your main role has been telling them what they can't do. What if you could offer a comprehensive solution that business groups could use on their own terms - to answer their own questions? Just imagine how your role would change from being a traffic cop to a strategic advisor.
In this webcast, viewers will learn more about:
•Data accessibility for business users and managers: the human element of data
•Managing the backend data infrastructure
•Internet of Things (IoT) and what that means for businesses
•The future of automation in intelligent data systems
Les terminaux sont toujours une cible privilégiée pour les attaques, particulièrement lorsqu’ils ne sont pas reliés au réseau d’entreprise.
Vous avez profité des avantages de prévention que le cloud de renseignement sur les menaces de Wildfire™ offre à votre périmètre et à votre réseau mais saviez-vous qu’il est possible d’appliquer ce même degré de protection à vos terminaux ?
Regardez ce webinar et découvrez comment Traps et Wildfire peuvent s’associer mais aussi :
•Comment les acteurs malveillants élaborés compromettent des terminaux à l’aide d’exploits zero day
•Pourquoi les solutions de terminaux actuelles ne peuvent pas empêcher les violations sur les terminaux
•Comment empêcher les menaces connues et inconnues de compromettre vos systèmes
Inscrivez-vous ici pour ce webinar et découvrez comment associer Wildfire et Traps pour améliorer la prévention des violations sur vos terminaux.
Organizations' ultimate goal is protecting corporate assets and reducing cyber risk around them. A multitude of security tools, both traditional and advanced, are deployed towards attaining this goal. But in order to truly address today’s cyber risk challenges, organizations need a security analytics platform that automates the process of aggregating data from existing security tools, enables understanding the assets at risk, and effectively communicates cyber risk to the right people at right time. In this presentation, you will learn how the Bay Dynamics Cyber Risk Analytics platform goes beyond traditional SIEM and User Behavior Analytics solutions to provide a prescription for organizations to measurably reduce cyber risk.
Protecting your data requires an understanding of the threat vectors and taking action to minimize those risks. According to the Verizon 2016 Data Breach Investigation Report, insider and privilege misuse represents one of the most common incident types and typically requires the longest to detect.
Attend this webinar to:
· Learn how improving your visibility into insider activity and threats can reduce risk
· Understand why monitoring both user behavior and data access activity can improve your detection rate and response times
· Find out how you can expand your security monitoring capabilities without impacting system performance, adding cumbersome processes or hiring specialized personnel
Over the last few years, there are a known 620 million user accounts that have been compromised across hundreds of sites. Organized cybercrime have figured out that this is the fastest, most reliable method to infiltrate organizations, as well as achieve financial gain. Since users share passwords across multiple sites, it is easier to find logins that work on a target site than try to bypass firewalls, find software flaws, or even run spearphishing campaigns.
These types of attacks are collectively coming to be known as “Account Takeover” (ATO). Some are simple, while others are sophisticated. Some can be stopped relatively easily, and others require much more effort.
ATO attacks (via stolen credentials) were cited as the #1 method of confirmed data breaches in both 2014 and 2015, for web applications, which itself was the #1 vector for data breaches.
Come learn what these ATO threats are, their impact to your business, how to detect them, and what you can do about it.