Data breaches and targeted attacks continue to plague organizations across the globe. Threat actors seem to be able to penetrate and then reside within a network for a very long time, siphoning off data they can use to profit from. In this webinar, learn what the latest attack techniques are and how to change your strategy to one which takes you from being hunted to becoming the hunter.
Whilst it is clear the responsibility for security and compliance posture for on-premises infrastructure is owned by the customer, there is still uncertainty on who is responsible for the security of applications and the confidentiality of data stored in the public cloud. The reality is that it is a shared responsibility, but who owns what, and where is the handshake between the organisations?
Did you know that Amazon web Services employs a "Shared Responsibility" security model? Do you really know your role and responsibilities within this shared security model? Watch this short video to find out who's responsible for what when securing your applications in the cloud.
Your workforce is using 3+ devices, is working from many locations, uses both business apps and a plethora of personal apps, and all while expecting to access their data easily and securely. How do you implement a solution that empowers your workforce while protecting your Corporate assets and resources? Discover Enterprise Mobility Suite (EMS) - a comprehensive cloud solution designed specifically to address the challenges of a mobile workforce.
Join this webcast to learn:
What components make up EMS
How to get up and running with EMS
How to provide secure access to corporate data
Protect everything—across devices, operating systems and applications
With MobileIron Access, organizations can now secure cloud services, such as Box and Salesforce, on mobile devices. Organizations can now be assured that users only connect to enterprise cloud services via trusted apps on managed devices.
MobileIron Access addresses a key security gap - employees accessing enterprise cloud services on unmanaged devices, via unmanaged apps and storing corporate data outside of IT control.
View this webinar to learn how MobileIron Access:
- Can enable access control to enterprise cloud services such as Box, Google Apps for Work, Office 365 and Salesforce
- Prevent access to cloud services from apps and devices not authorized by IT
- Establish a data boundary for mobile-cloud apps to keep business data within IT control at all times
According to research institutes, 70-90% of malwares found in breach investigations are unique to that organization – meaning there is no chance of detecting them with traditional security measures. As advanced threats become more and more quite, sophisticated and stealthy – detection and analysis methods need to be adapted accordingly. Using behavioral analysis, machine learning, and progressive visualization tools allows organizations to better detect, analyze and respond to threats.
In this webinar Mr. Oren Aspir, CTO at CYBERBIT Ltd. will review advanced threats stealth mechanisms and the methods to detect them – with focus on optimizing analysis processes and minimizing time intervals.
• Advanced threats stealth and persistency mechanisms
• Methods to minimize detection and analysis timeframes when confronting advanced and targeted threats
• What tools can be used to facilitate detection and response for advanced threats
The popularity of the smartphone and the bring your own device (BYOD) phenomena has given way to a new era in cybercrime – the era of mobile in which cybercriminals increasingly target phones and tablets as an attack vector. In fact, at any given time, mobile malware is infecting millions and millions of mobile devices globally, enabling criminals to get their hands on your personal information and money.
2015 was witness to the largest and most notorious mobile malware attacks in history. Considering that the number of smartphone users worldwide will surpass 2 billion in 2016 (emarketer), mobile app downloads will have increased to 268 billion (Gartner) by 2017, and that most companies have dedicated very little resources towards mobile application security, the industry is ripe for even bigger malicious attacks. Mobile malware will continue to grow, being destructive and costly to corporations and users.
Join (ISC)² EMEA and IBM as we demonstrate the effects of mobile malware and how to arm organisations to protect themselves against this growing concern.
Ein Security Operations Center (SOC) soll aufgebaut oder erweitert werden. Jede derartige Investition erfordert eine Make-or-Buy Entscheidung.
In diesem Vortrag erläutern wir zunächst, welche Funktionen ein SOC erfüllen sollte und mit welchen Kosten zur Erfüllung der Anforderung zu rechnen sind. Dann gehen wir auf die Herausforderung ein, Mitarbeiter für das SOC zu rekrutieren. Wir zeigen auf, welche quantitativen und qualitativen Kriterien für eine Make-or-Buy Entscheidung speziell bzgl. eines SOC relevant sind.
Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor
Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.
Erfahren Sie in dem Webcast
• Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
• Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
• Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen
Le 18 février, nous avons lancé notre série de webinaires intitulée « Assumption of Attack » illustrant la protection exhaustive et avancée qu'offre notre suite logicielle Smart Protection Suite, une solution particulièrement efficace face aux cybercriminels.
Le cinquième épisode de notre série de webinaires portera sur la sécurité du Cloud hybride.
Que vous souhaitiez mettre l'accent sur la sécurité des environnements physiques, virtuels ou cloud, vous découvrirez comment protéger vos données et éviter les interruptions d'activité tout en vous conformant aux réglementations.
The UCC (unified communications and collaboration) landscape continues to change dramatically, with new tools and technologies available to address employee needs in the face of an increasingly virtual and mobile workplace. Attend this webinar to learn what companies are doing today to help their workers stay productive and what they intend to do in the future.
Digitization is everywhere and banks and financial institutions need to include digital offers in their existing product portfolio. Furthermore, disruptive technologies and business models are taking more and more space in the banking and payment ecosystem. Nevertheless, these opportunities seem to have been mostly handled by innovative start-ups. But are start-ups changing finance for the better?
The payment industry expected mobile payment to become a major player. But market adoption failed to meet expectations. Thanks to the EMV (Europay MasterCard and Visa liability) shift in the US and many global initiatives, payment infrastructures are ready for a mobile payment explosion.
Why You Must Attend:
· Listen to Oberthur Technologies, one of the major market players in the field
· Learn the latest information regarding mobile payment evolution
· Hear about the latest technology directly from market players
· Understand your mobile payment knowledge and expectations
This briefing will analyze the reigning trends in the European data center services market, providing an overview of the go-to-market strategies of various providers. We will also be joined by Matthew Finnie, chief technology officer at Interoute, who will provide his perspective on the growth of the data center services market.
Why You Must Attend:
• Find out how cloud is impacting traditional data center services
• Learn about the major trends in data center and cloud services
• Discover how providers are catering to hybrid IT requirements
• Understand competing strategies adopted by data center services providers
Ajay Sunder, Vice President, Digital Transformation, Frost & Sullivan
Asia Pacific’s data center services market is currently undergoing significant traction, with a healthy growth of 15.4% over 2015 to reach revenues in excess of US$14 billion in 2016. With exceptional growth in emerging markets, Frost & Sullivan expects the strong pace of growth to continue within the Asia Pacific markets. The market is expected to grow at a CAGR of 14.7% between the period of 2015 - 2022 to reach US$32.8 billion at the end of 2022.
If you have any client that has an interest in gaining an in depth understanding of the data center services landscape in Asia Pacific this study will help, addressing questions such as:
What is the size of the Data Centre Services market at an APAC regional and at country level (10 markets)
Who are the major players in the fast moving and growing area
What are the key drivers for growth?
What are the market challenges?
This will interest:
Large enterprises who are procuring data center services in APAC (eg banks)
Any company looking at making a data centre investment, partnership or acquisition in APAC
Providers of power and cooling solutions who are selling into the APAC market
Property owners/developers who are planning to build data center facilities in the region
Other data centre providers who are interested to understand in detail what the market looks from an independent, trusted third party
Blockchains are a new solution to a fundamental question in the digital world: How do you establish trust between parties over the Internet’s untrusted network? More specifically, how do you get perfect, simultaneous, shared data between a number of different people, devices or businesses? It is the technology that supports cryptocurrencies such as Bitcoin, but it can support the transfer of any data or digital asset. Bitcoin is the tip of the blockchain iceberg. Decision makers across industries are beginning to ask: "What does blockchain technology mean for our future?" This webinar will equip attendees with the foundation to understand its huge potential.
Jean-Noël Georges, Frederique Richert, Mark Goldspink
The explosion of fraud in payment is a major concern for financial institutions as global business is based on trust. Fraudsters are clever and are able to quickly target unknown security breaches to succeed. In this webinar, we will focus on innovative ways to fight against fraud and discuss the latest trends in payment fraud.
Nancy Jamison, Principal Analyst, Digital Transformation and Rob Allman, Group General Manager, Dimension Data
It’s increasingly clear that improving the customer experience and reducing customer effort are critical in today’s competitive environment. It’s also clear that businesses and solution providers are embracing omnichannel customer care with the goal of seamless customer engagement. Is omnichannel realistic?
Why you should attend:
• Learn where companies are in providing omnichannel customer care
• Identify the drivers and restraints in omnichannel delivery
• Hear a key global systems integrator and solutions provider talk about the challenges and successes of omnichannel delivery
Adrian Drozd, Research Director and Jonanthan Robinson, Principal Consultant
The connected (or smart) home market is attracting widespread attention from companies across numerous sectors. Connected homes depend on a rich ecosystem of network infrastructure, content delivery, and home automation technologies. Growth opportunities exist for companies spanning communications, energy, healthcare and security, to name a few.
This webinar will draw on this insight to provide a pragmatic view of current consumer perspectives. In particular, this presentation will:
• Identify consumer demands for a connected lifestyle
• Understand consumer challenges and expectations in a smart home environment
• Define the functions that consumers see most value in connecting
• Outline the level of functional integration expected by consumers
This briefing will interest ICT vendors seeking to understand how cities are investing in open and big data, and how they plan to invest beyond the proof-of-concept stage. Participants from cities will gain an overview of activities and best practices in Europe.
During this webinar we will:
· Share results of the Real-time Cities Survey
· Discuss implications for future commercialization
· Identify the leading cities
· Point to the emerging ICT opportunities
Industry Analyst Lehlohonolo Mokenela and Ambar Sur, Founder and CEO at Terra
Mobile money is paving the way for greater financial inclusion throughout Africa and transforming the way consumers transact with one other. The mobile money industry has been shaped by a robust ecosystem of network operators, technology partners and merchants. Recent innovations are leading the trend toward more transactional services, moving beyond basic peer-to-peer transfers.
Why You Should Attend:
- Learn about the growth of mobile money
- Understand the innovation driving service uptake
- Hear from one of the leading mobile money technology partners
Hybrid IT is fast becoming the new normal across organizations in Asia-Pacific. With the increasing utilization of data centers and cloud services across the Asia Pacific region, companies have gradually updated or upgraded their existing IT systems, giving rise to the Hybrid IT environment. Besides helping enterprises to drive digital disruption, the latest Hybrid IT environment is also enhancing the customer experience and encouraging business model innovation. As a result, there is greater acceleration in the adoption of a multi-vendor multi-cloud environment or Hybrid IT.Together with the Cloud, Hybrid IT is enabling the accelerated adoption of new technologies such as Big Data, the Internet of Things and Connected Industries.
Mayank Kapoor, Industry Principal, ICT - Data Center and Cloud Computing, Frost & Sullivan, Asia Pacific discusses these and key insights on how these new technologies are driving industry transformation not just across the ICT industry but also the Manufacturing, Automotive and Healthcare industries.
Robert Arnold, Frost & Sullivan; Mark Dumas, Acano; Jim Moss, Plasticity; Andrew Dixon, Igloo Software
New business collaboration tools provide users with access to a range of rich functionality from a single interface. These tools complement and displace existing collaboration apps. Despite strong value propositions, the many choices with similar functionality may cause uncertainty and hesitation among buyers.
A panel of industry experts will discuss the dos and don'ts that organizations should consider when investigating or deploying these solutions.
Audrey William | Head of Research, Australia and New Zealand | ICT | Frost & Sullivan, Arvind Arun |Industry Analyst Asia Pa
Wearable technologies illustrate a fundamental shift in how computing will move to the next level, as devices will no longer need to be placed on a desk or held by hand. They are now worn on the human body, offering the user hands free capability. The market is still in its early stages of development, and interest in wearables is currently largely restricted to innovators and early adopters. This Frost & Sullivan Analyst briefing will look at the demand for wearables technologies in the consumer and enterprise space as well as look at some of the leading players in this market
Why you should attend:
- Learn about the opportunities ahead in the Australian Wearables Market
- Understand the drivers in this market
- Understand the key players in both the Consumer and Enterprise Space
- Understand the issues in this space
- Learn about the Ecosystem of players in the Wearables Technologies Space
Michael DeSalles, Rene Yoakum, Mark Pfeiffer, and Sarah Troup
Impact Sourcing (IS) is a business process service delivery model that provides quality and cost at parity with traditional Business Process Outsourcing (BPO), but with optimized enhancements. IS employs individuals with limited opportunity for sustainable employment as principal workers in BPO centers to provide high-quality, information-based services to domestic and international public and private-sector clients.
You will learn about:
·A qualified, trained talent pool with skillsets aligned to match client needs
·Lower attrition rates and higher corresponding levels of employee engagement
·Opportunities to fulfil corporate social responsibility and diversity objectives
Michael Suby, VP of Stratecast; Mike Jude, Research Manager; and Sandy Borthick, Industry Analyst
Data breaches of all sorts, affecting credit card providers, retailers and health care providers, suggest that such breaches will continue and grow as a major risk to all organizations and their IT, security, and compliance departments. At the same time, Big Data solutions are gradually becoming more prevalent, connecting many new sources of data and thus potentially increasing both the vulnerability and the magnitude of a data breach. It is no wonder that Stratecast survey data suggest that one of IT managers’ primary concerns with Big Data is security, yet the advantages of Big Data in enabling revenue creation make it very attractive to the business. This panel discussion will explore the security issues around Big Data.
In particular, the panel will discuss:
•Whether Big Data necessarily increases the risk of a security breach
•How to assess the risks associated with different types of Big Data solutions
•How to avoid data breaches in a Big Data environment
Africa Director Hendrik Malan and Grant Theis, CEO of ttrumpet
Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
Enterprises still don’t trust the cloud for their sensitive workloads. Are their concerns reasonable? Are they inevitable? In this briefing, Frost & Sullivan examines perceptions and realities associated with cloud security and recommends ways to mitigate risk.
Why You Should Attend:
• Understand the “risk premium” ascribed to the cloud versus the private data center.
• Learn why the cloud requires new processes for governance and compliance.
• Hear why traditional security approaches, such as asset protection, are not relevant to a cloud environment.
• Understand how to build a holistic approach to cloud security.
Shailendra Soni - Industry Principal, Harsh Upadhyay - Industry Analyst
The unified communications industry in the APAC region will undergo several changes in 2015, which include growth in UCaaS, mid-market uptake, BYOD, and channel ecosystem. Apart from few hindrances, most market factors suggest growth in the UC market. In addition, the Mega Trends (Cloud Computing, Big Data, Internet of Things, and Mobility) will induce prosperity in this market. Join us in this webinar to get a Frost & Sullivan’s perspective on the future of APAC unified communications industry, and initiate a dialogue with our analysts.
Frost & Sullivan's Digital Transformation webcasts provides global industry analysis, market forecasts, competitive analysis, and insights into emerging technologies that are designed to help your company address current trends and challenges.
Our global teams of industry experts, consultants, and market analysts continuously monitor big data, cloud computing, communication services, conferencing & collaboration, digital identification, digital media, mobile & wireless, space & communications, IT applications & services, network security, customer contact, and unified communications markets.