Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Inside Sales – Inhouse vs. Outsourced
    Inside Sales – Inhouse vs. Outsourced
    Owen Richards. Managing Director. Air Marketing Group Live 60 mins
    Reasons to Attend:

    Outsourcing your sales, lead generation or telemarketing activity can be a fantastic way to grow revenue. But why wouldn’t you simply grow an in-house team?

    The reality is that both models can work well, but without the right systems and processes, both have many potential pitfalls.

    In this webinar, we explore the potential risks, upsides, and downsides of in-house vs. outsourced, as well as analysing the differences in investment levels, time and resource.

    You should attend this webinar if inside sales, telemarketing or lead generation is, or could be, part of your growth plans and if you’d like to learn more about which model is right for your business.

    Key Takeaways

    •The benefits if both outsourcing your sales and lead gen
    •How to choose the right outsourced sales partner – What to look for
    •The benefits of building your own inside sales team
    •How to setup and in-house Inside sales team successfully
    •The investment level required for both models
    •How to measure your investment and return
    •Running a combined in-house/outsourced model
  • Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Oct 22 2019 60 mins
    ** This is an EMEA focused webinar **

    Cybercriminals keep finding ways to attack businesses regardless of their size.

    Join Webroot Sr. Threat Research Analyst Kelvin Murray for this 30-minute webinar covering six ways to keep your business safe from cybercriminals. Topics that will be discussed include:

    •Preventing and mitigating ransomware attacks
    •Coping with the spectre of information theft
    •The latest in cybercrime featuring real incidents and case studies
  • Quilter Investors Monthly Income Portfolios Q3 Update
    Quilter Investors Monthly Income Portfolios Q3 Update
    Head of Investment Directors, Danny Knight and Portfolio Manager, Helen Bradshaw Recorded: Oct 22 2019 40 mins
    Join Portfolio Manager, Helen Bradshaw and Head of Investment Directors, Danny Knight in their first quarterly income webinar. They’ll share insights on the portfolio construction and current holdings of the Quilter Investors Monthly Income portfolios and will discuss markets and opportunities for income investors.
  • Die Cloud ist sicher, Ihre Konfiguration ist es möglicherweise nicht!
    Die Cloud ist sicher, Ihre Konfiguration ist es möglicherweise nicht!
    Maximilian Bode, Sales Engineer, FIreEye Recorded: Oct 22 2019 44 mins
    Wussten Sie, dass Angreifer die eDiscovery-Funktionen von Office 365 verwenden, um nach vertraulichen Daten zu suchen? FireEye nutzt Regeln, die z.B. speziell auf die Verwendung von eDiscovery und den Export von eDiscovery abzielen, welche in einem regulären Büroalltag im Allgemeinen selten sind.

    Nehmen Sie an diesem Webinar teil, um mehr über FireEye‘s Security Maßnahmen in O365 zu erfahren. FireEye’s Sales Engineer Maximilian Bode teilt:

    Einblicke in Microsoft Azure Events
    - Azure Audit und Azure AD
    - MS Exchange und Office365

    Schaffen Sie Transparenz: Durch Erkennung von Anomalien in Logs kann der Diebstahl von Anmeldeinformationen identifiziert werden. Wir zeigen Ihnen, wie Sie verdächtige Ereignisse und kritische Konfigurationen durch die Verwendung von Regeln erkennen.
  • Desktops as a service with Citrix
    Desktops as a service with Citrix
    Kireeti Valicherla, Paul Carley Recorded: Oct 22 2019 45 mins
    Citrix Desktops-as-a-Service offering is the simplest and fastest way to deliver applications and desktops to today’s workforce while improving IT efficiency and enhancing user experience. This Azure-hosted solution delivers high-performance Windows desktops and applications as a service to any device from anywhere. Attend this session to learn about DaaS use cases, features and architecture to uncover opportunities where the Citrix Desktops-as-a-Service offering is right for your business.
  • Bitesize 30-minute update: JPM Asia Growth Fund
    Bitesize 30-minute update: JPM Asia Growth Fund
    Emily Whiting, Investment Specialist within the Emerging Markets and Asia Pacific Equities team Recorded: Oct 22 2019 30 mins
    Join Emily Whiting, Investment Specialist within the Emerging Markets and Asia Pacific Equities team, as she discusses why we remain constructive towards the long-term growth of Asia.
  • Case Study: How Tele2 built their Modern Integration Architecture
    Case Study: How Tele2 built their Modern Integration Architecture
    Andris Soms-Sakne, System Manager, Tele2 Shared Services Center & Saila Lehtovaara, Senior Integration Specialist, Solita Oy Recorded: Oct 22 2019 14 mins
    Tele2 and Solita have partnered together to develop a modern integration architecture. Tele2 has chosen Dell Boomi as their integration platform solution to enable digital transformation with Solita. Through the partnership they integrate on-premise and cloud applications safely and securely by utilizing Dell Boomi Integrate, MDM, EDI and APIs. (Recording of live customer session at Boomi World Tour London 2019) #winwithboomi
  • How to Improve your Disaster Recovery in Leaps and Bounds
    How to Improve your Disaster Recovery in Leaps and Bounds
    Manjul Sahay, Director of Product Management Nutanix Recorded: Oct 22 2019 37 mins
    In this webinar, you will learn about deploying a successful solution for Disaster Recovery (DR) with Nutanix. You will gain insights into key trends and gather data points to help you prepare a business case for DR within their organizations: ESG Senior Analyst Christophe Bertrand will outline the market landscape and explore organizations’ challenges and needs for a business continuity / disaster recovery planning. The key with DR is to get it done right. That’s why you will also hear from Manjul Sahay from Nutanix who will share how Xi Leap cloud DR service from Nutanix can help organizations deliver on their data protection and DR SLAs.
  • Standardization framework for trust services
    Standardization framework for trust services
    Nick Pope, ETSI TC ESI Vice-Chair Recorded: Oct 21 2019 60 mins
    This webinar will provide an update of the latest activities of the ETSI Technical Committee Electronic Signatures and Infrastructures to provide a standardization framework for trust services.
    It will cover digital signatures formats and procedures and policies for their creation and validation; policy, security and technical requirements for trust service providers (TSP) such as certification authorities, time-stamping authorities, TSP providing remote signature creation or validation functions, registered e-delivery providers, and long-term data preservation providers. It will also address Trusted Lists that enhance the confidence of parties relying on certificates or other services related to digital signatures by indicating whether a given TSP was operating under the approval of any recognized scheme.
  • BPI Alternative Fund - Iberian Equities Long-short 3rd Quarter 2019
    BPI Alternative Fund - Iberian Equities Long-short 3rd Quarter 2019
    Paulo Freire Oliveira Recorded: Oct 21 2019 37 mins
    BPI Alternative Fund is a long/short equity fund that invests in listed Portuguese and Spanish shares or equity linked instruments.
  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Recorded: Oct 18 2019 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • Automating data management for quality and compliance – the business case
    Automating data management for quality and compliance – the business case
    Mark Hobart, Nicola Askham Recorded: Oct 18 2019 44 mins
    IDC forecast a ten-fold increase on business data processed compared to today. Combine this with increasing regulatory compliance and demand for quality data, then it is perhaps not a surprise to find that many are feeling somewhat over-whelmed by the enormity of the data management and governance task. Don’t despair, there is a compelling business case, both in terms of efficiency gains and tangible financial savings in adopting a strategy for centralising information governance and automating the management of your data.
    This presentation will explore the emerging problem domain of data and look at the business case for use of automated data management tools to better prepare your organisation for the tsunami of data coming its way.
  • Deployment von SAP Data Hub auf Lenovo ThinkSystem und SUSE CaaS Platform
    Deployment von SAP Data Hub auf Lenovo ThinkSystem und SUSE CaaS Platform
    Marcel Scherer, Lenovo und Carsten Duch, SUSE Recorded: Oct 18 2019 46 mins
    SAP Data Hub hat die Aufgabe, die heute vorherrschenden heterogenen Datenquellen, seien sie in der Cloud oder im eigenen Rechenzentrum, zentral und ohne vorherige Konsolidierung zugänglich und vor allem auswertbar zu machen. Die zugrundeliegende Softwarearchitektur basiert auf Containern und setzt eine Kubernetes-Implementierung voraus.
    Eine Möglichkeit, SAP Data Hub auf Enterpriseebene zu betreiben, ist die SUSE Container as a Service (CaaS) Platform. Um den Kunden bei der Planung der durchaus komplexen Applikationsumgebung bestmöglich zu unterstützen, haben Lenovo und SUSE eine gemeinsame Referenzarchitektur entwickelt. Ziel ist es, das Thema Infrastruktur für den Kunden schnell abzuhaken und sich auf die Anwendung zu konzentrieren.
    Erfahren Sie in diesem Webinar mehr über den Aufbau von SUSE CaaS Platform, Grundlagen von SAP Data Hub und wie eine skalierbare Hardwareplattform basierend auf Lenovo ThinkSystem-Servern aussehen könnte.
  • Predictive Scheduling: What You Need to Know
    Predictive Scheduling: What You Need to Know
    Shiftboard Recorded: Oct 17 2019 33 mins
    Predictive scheduling laws affect employers across the country, and the number of jurisdictions passing these laws is rising. Managing compliance with these employment laws is a complex process, and penalties for violating the new rules are significant. As a result, companies are turning to technology and data to help them more efficiently create and maintain compliant worker schedules.

    Sign up for this webinar to learn the top things you need to know about predictive scheduling. In this 30-minute discussion, we’ll share key information about the new laws, including:

    - Predictive scheduling at a glance
    - Impact of predictive scheduling laws
    - Recent regulations and changes
    - How technology can help

    Register for the webinar today!
  • Modern Data Strategies – Moving Beyond RDBMS
    Modern Data Strategies – Moving Beyond RDBMS
    Mike Stone, Lead Architect & CIO, House of Brick Recorded: Oct 16 2019 45 mins
    Relational databases have been the undisputed industry standard for data storage and management since the concept was introduced to the computing community, with the first commercially viable products appearing in the late 1970’s. Today, 50 years later, there continues to be a place for this technology and it is still a pillar of modern computing. However, in the ever-changing landscape of data platforms and technology, how does your organization determine the best options for storing, managing, and retrieving data going forward? Learn how concepts like Virtual, NoSQL, Columnar, and Streaming increase your options as well as offer the potential for improving your ability to truly manage data while maximizing its utility for your business.

    Topics covered:
    • Security
    • Governance
    • Management
    • Self-Service
    • Common Cloud Services
    - Google Spanner
    - Amazon DynamoDB
  • Why it's Time to Kill Your VPN
    Why it's Time to Kill Your VPN
    Chris Scheels, Director of Product Marketing, Cyxtera Recorded: Oct 17 2019 38 mins
    VPNs are dangerous and overly complex. So why are we still pretending that VPNs are an effective security technology?

    Join this webinar if you are responsible for implementing Zero Trust or managing complex VPN environments.

    Learn why:
    - VPNs cannot support your move to Zero Trust
    - Managing VPNs is too complex for delivering granular access to a mobile workforce
    - Eliminating VPNs can deliver Zero Trust secure access to the cloud, DevOps and third parties
  • Business Continuity Management and Resiliency for 2020 and Beyond
    Business Continuity Management and Resiliency for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Oct 17 2019 48 mins
    Business interruptions can hurt an organization's reputation, decrease revenue and loose customer trust. Business continuity and resiliency plans detail the impact of various disaster scenarios and creates a solution for ensuring critical operations remain open during a crisis.

    In this live webinar, Lockpath’s Sam Abadir will share what business continuity and resiliency management for 2020 and beyond looks like, including:

    • What areas business continuity management and resiliency encompasses

    • How your organization can gain efficiency from proper business continuity and resiliency management

    • Advantages of managing business continuity and resiliency on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage business continuity and resiliency in 2020 and beyond by attending this educational webinar. Register now!
  • All Roads Lead to Rome - Dell EMC PowerEdge Servers + AMD EPYC 2nd gen procs
    All Roads Lead to Rome - Dell EMC PowerEdge Servers + AMD EPYC 2nd gen procs
    Scott McComas, Sr. Product Line Manager Recorded: Oct 17 2019 38 mins
    We are noticing a marked shift in the digital economy in terms of how Mid-Market businesses rely on infrastructure. Mid-Market Business priorities are driving workload transformation and placement, which in turn are driving infrastructure transformation. Investing in “right-fit” workload infrastructure is one of the crucial pillars of this transformational journey. AMD 2nd Generation EPYC processors with up to 64 cores (codenamed “Rome”) represent a unique opportunity for addressing the modern workload-optimized infrastructure world. However, identifying the server platform that takes advantage of this opportunity is not always straightforward. Some server platforms may support the new processor, but don’t enable the new processor features. Businesses must check the processor specs against the vendor’s server specs and ensure the server platform is a fully optimized Rome platform.

    To support superior business outcomes, Mid-Market Businesses must make strategic investments in IT infrastructure to support current and next-generation workloads. This infrastructure must:

    •Be highly available and scalable
    •Support end-to-end security
    •Support high performance compute
    •Enable fast data access

    Join us to learn more about Dell EMCs new PowerEdge Servers built with AMD EPYC 2nd generation processors and fully optimized capabilities of these next generation platforms.
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Oct 17 2019 33 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • How Lending Tree built an automated, connected service experience
    How Lending Tree built an automated, connected service experience
    Esther Chen, Product Marketing at MuleSoft Recorded: Oct 17 2019 31 mins
    To automate business and service processes requires enabling faster integration between Service Cloud and the ecosystem of surrounding applications. See how LendingTree was able to digitally transform their service experience and provide agents with a single view of their customers. Learn how to use MuleSoft's API approach to integrate Salesforce faster and more efficiently.

    Key Takeaways:
    - Understand the power of MuleSoft + Service Cloud in building a personalized service experience
    - Learn how LendingTree was able to create a single view of their customer using API Designer and Flow Designer
  • The EU Taxonomy
    The EU Taxonomy
    Responsible Investor Oct 22 2019 11:00 am UTC 45 mins
    The latest developments on the EU Action Plan: Part 1

    This summer, the EU’s Technical Expert Group on Sustainable Finance (TEG) gathered market feedback on its plans for a green taxonomy, green bond standards and low-carbon benchmarks.
    To discuss the response and provide an update on the three initiatives – as well as the other parts of the Action Plan – RI will be joined by leaders from the TEG and the European Commission for a four-part webinar series.

    Nathan Fabian, Chief Responsible Investment Officer at the PRI and Chair of the Technical Expert Group on Sustainable Finance, will kick off the series with an update on the state-of-play for the green taxonomy. He’ll be discussing key take-aways from the public consultation and the latest in the ongoing political negotiations that run parallel to the TEG’s work.

    We encourage you to submit questions in advance, by emailing sophie@responsible-investor.com. Questions can be asked anonymously, if requested.
  • Jupiter Merlin Portfolios webcast
    Jupiter Merlin Portfolios webcast
    Jupiter Independent Funds team Oct 22 2019 1:00 pm UTC 60 mins
    The Jupiter Merlin Portfolios are managed by the Jupiter Independent Funds team, consisting of fund managers John Chatfeild-Roberts, Algy Smith-Maxwell, Amanda Sillars, David Lewis and product specialist Alastair Irvine. In this webcast, the team will present their latest views on markets and fund choices for the Jupiter Merlin Portfolios.

    To watch the live webcast or access the replay after the event, please register.
  • Why config matters in DevSecOps
    Why config matters in DevSecOps
    Ben Riley, Technical Director at Sweagle & Emily Tippins, Global Marketing Director, Sweagle Oct 22 2019 2:00 pm UTC 30 mins
    In this upcoming webinar, Ben Riley, Technical Director, will demonstrate the vital role of fighting bad config data and how you can help save your CI/CD pipeline from falling foul of violations, errors, and security risks.

    Topics we will cover in this session:

    1. Secrets management
    Join us to see how sweagle will scan through your config data and discover and automatically encrypt sensitive data such as plain text passwords, API keys, and access tokens.

    2. Fine granular RBAC
    We will demonstrate how you limit access based upon the type of config data and the stage (whether it's for DEV, STAGING, or PROD) for human users, software systems, UI users, and API integrations.

    3. GDPR compliancy, validation & mitigating risks
    We'll show you how you can prevent data transfer violations through geographic validation rules and how to detect bad configurations to cloud resources which could be opening up vulnerabilities in your release process.

    4. CI/CD evidence repository
    We'll clearly demonstration how you can turn collected config data into an unalterable evidence repository that's available for analytics, reporting, and automated diff comparisons. A solid evidence repository is a prerequisite for everyone looking at reducing the effort of self-audit.

    Join us for this technical webinar to see demos and practical illustrations of how you can secure, validate and audit your config data automatically.
  • JOHCM Global Emerging Markets Opportunities Fund Q3 19 Update
    JOHCM Global Emerging Markets Opportunities Fund Q3 19 Update
    James Syme, Paul Wimborne Oct 22 2019 2:00 pm UTC 45 mins
    James Syme and Paul Wimborne give their country-led take on what happened to emerging markets and their portfolio over the last quarter
  • ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects
    ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects
    Robin Gareiss, President and Founder, Nemertes Research Oct 22 2019 3:00 pm UTC 60 mins
    Intelligent Customer Engagement Series [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects

    As IT and business leaders evaluate their how to use AI to improve customer experience, one of the biggest roadblocks is funding.

    This webinar provides step-by-step guidance on finding stakeholders to fund the projects, with specific data on how much companies are spending today on their AI-enabled initiatives.
  • DEF CON 27: How to Take Over Internal IPs, Externally
    DEF CON 27: How to Take Over Internal IPs, Externally
    Elliott Thompson, Senior Cybersecurity Consultant Oct 30 2019 4:00 pm UTC 60 mins
    As seen at DEF CON 2019, SureCloud's Senior Cyber Consultant continues his DEF CON presentation "[ MI CASA-SU CASA ] My 192.168.1.1 is Your 192.168.1.1".

    Your browser thinks our 192.168.1.1 is the same as your 192.168.1.1. Using a novel combination of redirects, Karma, JavaScript and caching, Elliott demonstrates that it’s viable to attack internal management interfaces without ever connecting to your network. Using the MICASA-SUCASA tool, it’s possible to automate the exploitation of hundreds of interfaces at once.

    This presentation will introduce the attack vector and demonstration of the MICASA-SUCASA tool. Elliott will also discuss his experience at DEF CON 2019 and the feedback regarding his tool post-release.

    - Covering old ground is sometimes valuable
    - Combining vulnerabilities can have a greater impact than the sum of their parts
    - Some router manufacturers make truly bizarre decisions

    DEF CON Presentation being continued: [ MI CASA-SU CASA ] My 192.168.1.1 is Your 192.168.1.1
  • Opportunity Spotting
    Opportunity Spotting
    Liz Miller - CMO Council, Nick Mason - Turtl, Faith Wheller - Cisco Oct 22 2019 3:00 pm UTC 75 mins
    Let's investigate Content ROI issues by asking one foundational question: Can content be better used as an opportunity spotter than opportunity indicator?
  • Transforming Customer Service in Insurance with Intelligent Automation
    Transforming Customer Service in Insurance with Intelligent Automation
    Ken Mertzel – Global Industry Leader, Financial Services at Automation Anywhere Oct 22 2019 3:00 pm UTC 45 mins
    Transforming Customer Service in Insurance with Intelligent Automation

    InsurTechs and new online insurance companies are disrupting the industry, forcing insurers to rethink how they interact with customers and deliver a high-quality customer experience. With the emergence of attended automation capabilities, Robotic Process Automation (RPA) is a critical technology solution empowering customer-facing associates to quickly deliver exceptional service by putting critical information at their fingertips, automating manual tasks and enabling real-time collaboration across the organization.

    Automation Anywhere, the leading provider of RPA and cognitive intelligence solutions, will offer insights on how insurance organizations are using RPA, machine learning and attended automation to transform customer service.

    During this session, we will discuss:
    •Robotic Process Automation trends and benefits
    •Use cases describing where companies typically apply RPA in the insurance industry
    •Specific examples showing how RPA and attended automation can be used to improve customer service in insurance organizations

    About the speaker - Kenneth Mertzel, Global Industry Leader – Financial Services

    Ken Mertzel is the Global Industry Leader for Insurance and Banking at Automation Anywhere, a leader in robotic process automation (RPA). Ken brings more than 25 years of experience as a Financial Services industry executive improving business performance and organizational effectiveness. Previously, he served as chief financial officer of the Insurance Group at Bank of America as well as associate partner at Accenture, finance controller at Progressive Insurance and consultant at Bain & Company. At Automation Anywhere, Ken leads a team that develops customized RPA and intelligent automation solutions to help insurance, banking and finance customers improve productivity and lower operating costs.
  • Sharing Cyber Threat Information: Why, When and How?
    Sharing Cyber Threat Information: Why, When and How?
    Troy Vennon, Director of Security Innovation, the Columbus Collaboratory Oct 22 2019 3:00 pm UTC 60 mins
    It’s been 20+ years since the US government first issued a directive mandating that critical infrastructure providers in the public and private sectors share information about cyber threats. This directive, PDD63, recognized that, in the face of increasing threats, organizations that band together to share information and coordinate responses stand a better chance of protecting themselves. Thus, the realm of threat intelligence sharing was created. Join Troy Vennon, Director of Security Innovation at Columbus Collaboratory, as he reviews the basics of sharing threat intelligence and how it can benefit an organization of any size in any industry.
  • The challenge of the Nth Party in 3rd party risk management
    The challenge of the Nth Party in 3rd party risk management
    Brad Keller, JD, CTPRP, CTPRA Chief Strategy Officer & Sr. Vice President Santa Fe Group Oct 22 2019 3:00 pm UTC 60 mins
    n this BrightTALK, Brad will be discussing the ongoing and emerging risk challenges your 3rd party's 3rd parties can present, positive solutions and the future as he sees it.
  • Investing in SDG #7: Affordable and Clean Energy
    Investing in SDG #7: Affordable and Clean Energy
    TBD Oct 22 2019 3:00 pm UTC 60 mins
    Investing in SDG #7: Affordable and Clean Energy
  • ISSA International Series; Attack of the BotNets- Internet of Terror loT
    ISSA International Series; Attack of the BotNets- Internet of Terror loT
    ISSA International Oct 22 2019 4:00 pm UTC 120 mins
    Attacks on IoT have been dreaded for the past 5 years. 2020 is supposed to be the year that these attacks will be realized, or will they? Is this another Y2K scare, or will IoT become real?

    Moderator:
    Mark Kadrich, Principal, Kadrich InfoSec Consulting Services

    Speakers:
    Don Shin, Lead DDoS Defender Advocate, A10 Networks
    Ryan Leirvik, Principal, Cybersecurity Management Solutions Practice, GRIMM
    David Merritt, VP, Applied Cognitive Solutions
  • Transforming Your Business with Dell Technologies Unified Workspace
    Transforming Your Business with Dell Technologies Unified Workspace
    Aaron Spencer - Product Marketing Manager, Client Manageability, Dell Technologies Oct 22 2019 4:00 pm UTC 60 mins
    Today’s IT admins are loaded with non-value add and time-consuming tasks that take away from business innovation. Dell Technologies wants to help you by delivering an intelligent unified approach to IT that enables choice and innovation. Dell Technologies Unified Workspace is the industry’s most comprehensive solution to help IT deploy, secure, manage and support virtually all devices from the cloud. This new solution from Dell Technologies gives our customers time back by bringing together a combination of Dell Technologies offerings into an integrated, intelligent platform to transform your business.

    Join us for our webinar, Transforming Your Business with Dell Technologies Unified Workspace, where we’ll be discussing the benefits of partnering with Dell Technologies, including how to:

    • DEPLOY while reducing IT time and streamlining workflow
    • SECURE endpoints with solutions that protect the entire ecosystem
    • MANAGE through intelligent automation across a heterogeneous environment
    • SUPPORT with 24/7 access to expert engineers and breakthrough tools to keep employees productive

    Presented by:
    Aaron Spencer | Product Marketing Manager, Client Manageability

    Aaron Spencer is a Product Marketing Manager for Client Manageability at Dell Technologies. Aaron has more than 17 years of experience in Technology Sales and Marketing.
    Today, Aaron evangelizes Dell’s client management offerings and leads product launch and sales enablement efforts in this area. Client management solutions differentiate Dell hardware by making it easier for customers to automate and optimize client deployments, and monitor and update PCs.
  • Rethinking Netezza Migration - 7 Real-World Secrets to Success
    Rethinking Netezza Migration - 7 Real-World Secrets to Success
    Paul Wolmering, VP Worldwide Sales Engineering Oct 22 2019 5:00 pm UTC 45 mins
    Join Paul Wolmering, the former Director of Technical Services at Netezza, to learn the top strategies for ensuring your Netezza migration success. He will share lessons learned from his real world experiences with customers to help you maximize your probability of success.
    Visit www.actian.com/modernize to learn more
  • Back to Basics: Data Integration and Virtualization
    Back to Basics: Data Integration and Virtualization
    Guillaume Autier, Keith Costigan Oct 22 2019 5:00 pm UTC 17 mins
    Combining and preparing data is a prerequisite for any reporting and analytics project. There are two leading approaches for this process: Extract, transform, and load (ETL) and data virtualization. Use ETL when you want to physically move data from multiple data sources into a single data warehouse. Use data virtualization when you want data to remain in data sources and specify the rows or files to be used for analytics on-the-fly.
    Join us to learn the foundational concepts and considerations for these two approaches, and to identify the right path for your reporting or analytics project.

    In this webinar, you will learn:
    -The differences and use cases for traditional data integration vs data virtualization
    -How and why you would want to virtualize multiple data sources
    -How to make your data sources user-friendly to support self-service reporting
  • Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Richard Cramer, Chief Healthcare Strategist, Informatica & Tony Sheaffer, Master Data Management Specialist, Informatica Oct 22 2019 5:00 pm UTC 30 mins
    Health plans have made big investments and great progress in improving operations, enhancing the member experience and becoming more data-driven. However, inaccurate and unreliable provider data continues to be a source of inefficiency, unnecessary rework, and a barrier to innovation.