Owen Richards. Managing Director. Air Marketing GroupLive60 mins
Reasons to Attend:
Outsourcing your sales, lead generation or telemarketing activity can be a fantastic way to grow revenue. But why wouldn’t you simply grow an in-house team?
The reality is that both models can work well, but without the right systems and processes, both have many potential pitfalls.
In this webinar, we explore the potential risks, upsides, and downsides of in-house vs. outsourced, as well as analysing the differences in investment levels, time and resource.
You should attend this webinar if inside sales, telemarketing or lead generation is, or could be, part of your growth plans and if you’d like to learn more about which model is right for your business.
•The benefits if both outsourcing your sales and lead gen
•How to choose the right outsourced sales partner – What to look for
•The benefits of building your own inside sales team
•How to setup and in-house Inside sales team successfully
•The investment level required for both models
•How to measure your investment and return
•Running a combined in-house/outsourced model
Head of Investment Directors, Danny Knight and Portfolio Manager, Helen BradshawRecorded: Oct 22 201940 mins
Join Portfolio Manager, Helen Bradshaw and Head of Investment Directors, Danny Knight in their first quarterly income webinar. They’ll share insights on the portfolio construction and current holdings of the Quilter Investors Monthly Income portfolios and will discuss markets and opportunities for income investors.
Maximilian Bode, Sales Engineer, FIreEyeRecorded: Oct 22 201944 mins
Wussten Sie, dass Angreifer die eDiscovery-Funktionen von Office 365 verwenden, um nach vertraulichen Daten zu suchen? FireEye nutzt Regeln, die z.B. speziell auf die Verwendung von eDiscovery und den Export von eDiscovery abzielen, welche in einem regulären Büroalltag im Allgemeinen selten sind.
Nehmen Sie an diesem Webinar teil, um mehr über FireEye‘s Security Maßnahmen in O365 zu erfahren. FireEye’s Sales Engineer Maximilian Bode teilt:
Einblicke in Microsoft Azure Events
- Azure Audit und Azure AD
- MS Exchange und Office365
Schaffen Sie Transparenz: Durch Erkennung von Anomalien in Logs kann der Diebstahl von Anmeldeinformationen identifiziert werden. Wir zeigen Ihnen, wie Sie verdächtige Ereignisse und kritische Konfigurationen durch die Verwendung von Regeln erkennen.
Kireeti Valicherla, Paul CarleyRecorded: Oct 22 201945 mins
Citrix Desktops-as-a-Service offering is the simplest and fastest way to deliver applications and desktops to today’s workforce while improving IT efficiency and enhancing user experience. This Azure-hosted solution delivers high-performance Windows desktops and applications as a service to any device from anywhere. Attend this session to learn about DaaS use cases, features and architecture to uncover opportunities where the Citrix Desktops-as-a-Service offering is right for your business.
Andris Soms-Sakne, System Manager, Tele2 Shared Services Center & Saila Lehtovaara, Senior Integration Specialist, Solita OyRecorded: Oct 22 201914 mins
Tele2 and Solita have partnered together to develop a modern integration architecture. Tele2 has chosen Dell Boomi as their integration platform solution to enable digital transformation with Solita. Through the partnership they integrate on-premise and cloud applications safely and securely by utilizing Dell Boomi Integrate, MDM, EDI and APIs. (Recording of live customer session at Boomi World Tour London 2019) #winwithboomi
Manjul Sahay, Director of Product Management NutanixRecorded: Oct 22 201937 mins
In this webinar, you will learn about deploying a successful solution for Disaster Recovery (DR) with Nutanix. You will gain insights into key trends and gather data points to help you prepare a business case for DR within their organizations: ESG Senior Analyst Christophe Bertrand will outline the market landscape and explore organizations’ challenges and needs for a business continuity / disaster recovery planning. The key with DR is to get it done right. That’s why you will also hear from Manjul Sahay from Nutanix who will share how Xi Leap cloud DR service from Nutanix can help organizations deliver on their data protection and DR SLAs.
Nick Pope, ETSI TC ESI Vice-ChairRecorded: Oct 21 201960 mins
This webinar will provide an update of the latest activities of the ETSI Technical Committee Electronic Signatures and Infrastructures to provide a standardization framework for trust services.
It will cover digital signatures formats and procedures and policies for their creation and validation; policy, security and technical requirements for trust service providers (TSP) such as certification authorities, time-stamping authorities, TSP providing remote signature creation or validation functions, registered e-delivery providers, and long-term data preservation providers. It will also address Trusted Lists that enhance the confidence of parties relying on certificates or other services related to digital signatures by indicating whether a given TSP was operating under the approval of any recognized scheme.
Cameron Goedde - Client Solutions Field Marketing | Dell EMCRecorded: Oct 18 201942 mins
Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.
Mark Hobart, Nicola AskhamRecorded: Oct 18 201944 mins
IDC forecast a ten-fold increase on business data processed compared to today. Combine this with increasing regulatory compliance and demand for quality data, then it is perhaps not a surprise to find that many are feeling somewhat over-whelmed by the enormity of the data management and governance task. Don’t despair, there is a compelling business case, both in terms of efficiency gains and tangible financial savings in adopting a strategy for centralising information governance and automating the management of your data.
This presentation will explore the emerging problem domain of data and look at the business case for use of automated data management tools to better prepare your organisation for the tsunami of data coming its way.
Marcel Scherer, Lenovo und Carsten Duch, SUSERecorded: Oct 18 201946 mins
SAP Data Hub hat die Aufgabe, die heute vorherrschenden heterogenen Datenquellen, seien sie in der Cloud oder im eigenen Rechenzentrum, zentral und ohne vorherige Konsolidierung zugänglich und vor allem auswertbar zu machen. Die zugrundeliegende Softwarearchitektur basiert auf Containern und setzt eine Kubernetes-Implementierung voraus.
Eine Möglichkeit, SAP Data Hub auf Enterpriseebene zu betreiben, ist die SUSE Container as a Service (CaaS) Platform. Um den Kunden bei der Planung der durchaus komplexen Applikationsumgebung bestmöglich zu unterstützen, haben Lenovo und SUSE eine gemeinsame Referenzarchitektur entwickelt. Ziel ist es, das Thema Infrastruktur für den Kunden schnell abzuhaken und sich auf die Anwendung zu konzentrieren.
Erfahren Sie in diesem Webinar mehr über den Aufbau von SUSE CaaS Platform, Grundlagen von SAP Data Hub und wie eine skalierbare Hardwareplattform basierend auf Lenovo ThinkSystem-Servern aussehen könnte.
Predictive scheduling laws affect employers across the country, and the number of jurisdictions passing these laws is rising. Managing compliance with these employment laws is a complex process, and penalties for violating the new rules are significant. As a result, companies are turning to technology and data to help them more efficiently create and maintain compliant worker schedules.
Sign up for this webinar to learn the top things you need to know about predictive scheduling. In this 30-minute discussion, we’ll share key information about the new laws, including:
- Predictive scheduling at a glance
- Impact of predictive scheduling laws
- Recent regulations and changes
- How technology can help
Mike Stone, Lead Architect & CIO, House of BrickRecorded: Oct 16 201945 mins
Relational databases have been the undisputed industry standard for data storage and management since the concept was introduced to the computing community, with the first commercially viable products appearing in the late 1970’s. Today, 50 years later, there continues to be a place for this technology and it is still a pillar of modern computing. However, in the ever-changing landscape of data platforms and technology, how does your organization determine the best options for storing, managing, and retrieving data going forward? Learn how concepts like Virtual, NoSQL, Columnar, and Streaming increase your options as well as offer the potential for improving your ability to truly manage data while maximizing its utility for your business.
• Common Cloud Services
- Google Spanner
- Amazon DynamoDB
Chris Scheels, Director of Product Marketing, CyxteraRecorded: Oct 17 201938 mins
VPNs are dangerous and overly complex. So why are we still pretending that VPNs are an effective security technology?
Join this webinar if you are responsible for implementing Zero Trust or managing complex VPN environments.
- VPNs cannot support your move to Zero Trust
- Managing VPNs is too complex for delivering granular access to a mobile workforce
- Eliminating VPNs can deliver Zero Trust secure access to the cloud, DevOps and third parties
Business interruptions can hurt an organization's reputation, decrease revenue and loose customer trust. Business continuity and resiliency plans detail the impact of various disaster scenarios and creates a solution for ensuring critical operations remain open during a crisis.
In this live webinar, Lockpath’s Sam Abadir will share what business continuity and resiliency management for 2020 and beyond looks like, including:
• What areas business continuity management and resiliency encompasses
• How your organization can gain efficiency from proper business continuity and resiliency management
• Advantages of managing business continuity and resiliency on an Integrated Risk Management or Governance Risk and Compliance platform
• Creating strategies for sustained growth in 2020 and beyond
Find out what you need to know to manage business continuity and resiliency in 2020 and beyond by attending this educational webinar. Register now!
Scott McComas, Sr. Product Line ManagerRecorded: Oct 17 201938 mins
We are noticing a marked shift in the digital economy in terms of how Mid-Market businesses rely on infrastructure. Mid-Market Business priorities are driving workload transformation and placement, which in turn are driving infrastructure transformation. Investing in “right-fit” workload infrastructure is one of the crucial pillars of this transformational journey. AMD 2nd Generation EPYC processors with up to 64 cores (codenamed “Rome”) represent a unique opportunity for addressing the modern workload-optimized infrastructure world. However, identifying the server platform that takes advantage of this opportunity is not always straightforward. Some server platforms may support the new processor, but don’t enable the new processor features. Businesses must check the processor specs against the vendor’s server specs and ensure the server platform is a fully optimized Rome platform.
To support superior business outcomes, Mid-Market Businesses must make strategic investments in IT infrastructure to support current and next-generation workloads. This infrastructure must:
•Be highly available and scalable
•Support end-to-end security
•Support high performance compute
•Enable fast data access
Join us to learn more about Dell EMCs new PowerEdge Servers built with AMD EPYC 2nd generation processors and fully optimized capabilities of these next generation platforms.
Sean Walker, Enterprise Account ExecutiveRecorded: Oct 17 201933 mins
Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
Join us for a demo of Proofpoint Security Awareness Training to see for yourself!
You'll learn how to:
- Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
- Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
Esther Chen, Product Marketing at MuleSoftRecorded: Oct 17 201931 mins
To automate business and service processes requires enabling faster integration between Service Cloud and the ecosystem of surrounding applications. See how LendingTree was able to digitally transform their service experience and provide agents with a single view of their customers. Learn how to use MuleSoft's API approach to integrate Salesforce faster and more efficiently.
- Understand the power of MuleSoft + Service Cloud in building a personalized service experience
- Learn how LendingTree was able to create a single view of their customer using API Designer and Flow Designer
The latest developments on the EU Action Plan: Part 1
This summer, the EU’s Technical Expert Group on Sustainable Finance (TEG) gathered market feedback on its plans for a green taxonomy, green bond standards and low-carbon benchmarks.
To discuss the response and provide an update on the three initiatives – as well as the other parts of the Action Plan – RI will be joined by leaders from the TEG and the European Commission for a four-part webinar series.
Nathan Fabian, Chief Responsible Investment Officer at the PRI and Chair of the Technical Expert Group on Sustainable Finance, will kick off the series with an update on the state-of-play for the green taxonomy. He’ll be discussing key take-aways from the public consultation and the latest in the ongoing political negotiations that run parallel to the TEG’s work.
We encourage you to submit questions in advance, by emailing email@example.com. Questions can be asked anonymously, if requested.
Jupiter Independent Funds teamOct 22 20191:00 pmUTC60 mins
The Jupiter Merlin Portfolios are managed by the Jupiter Independent Funds team, consisting of fund managers John Chatfeild-Roberts, Algy Smith-Maxwell, Amanda Sillars, David Lewis and product specialist Alastair Irvine. In this webcast, the team will present their latest views on markets and fund choices for the Jupiter Merlin Portfolios.
To watch the live webcast or access the replay after the event, please register.
Ben Riley, Technical Director at Sweagle & Emily Tippins, Global Marketing Director, SweagleOct 22 20192:00 pmUTC30 mins
In this upcoming webinar, Ben Riley, Technical Director, will demonstrate the vital role of fighting bad config data and how you can help save your CI/CD pipeline from falling foul of violations, errors, and security risks.
Topics we will cover in this session:
1. Secrets management
Join us to see how sweagle will scan through your config data and discover and automatically encrypt sensitive data such as plain text passwords, API keys, and access tokens.
2. Fine granular RBAC
We will demonstrate how you limit access based upon the type of config data and the stage (whether it's for DEV, STAGING, or PROD) for human users, software systems, UI users, and API integrations.
3. GDPR compliancy, validation & mitigating risks
We'll show you how you can prevent data transfer violations through geographic validation rules and how to detect bad configurations to cloud resources which could be opening up vulnerabilities in your release process.
4. CI/CD evidence repository
We'll clearly demonstration how you can turn collected config data into an unalterable evidence repository that's available for analytics, reporting, and automated diff comparisons. A solid evidence repository is a prerequisite for everyone looking at reducing the effort of self-audit.
Join us for this technical webinar to see demos and practical illustrations of how you can secure, validate and audit your config data automatically.
Elliott Thompson, Senior Cybersecurity ConsultantOct 30 20194:00 pmUTC60 mins
As seen at DEF CON 2019, SureCloud's Senior Cyber Consultant continues his DEF CON presentation "[ MI CASA-SU CASA ] My 192.168.1.1 is Your 192.168.1.1".
This presentation will introduce the attack vector and demonstration of the MICASA-SUCASA tool. Elliott will also discuss his experience at DEF CON 2019 and the feedback regarding his tool post-release.
- Covering old ground is sometimes valuable
- Combining vulnerabilities can have a greater impact than the sum of their parts
- Some router manufacturers make truly bizarre decisions
DEF CON Presentation being continued: [ MI CASA-SU CASA ] My 192.168.1.1 is Your 192.168.1.1
Ken Mertzel – Global Industry Leader, Financial Services at Automation AnywhereOct 22 20193:00 pmUTC45 mins
Transforming Customer Service in Insurance with Intelligent Automation
InsurTechs and new online insurance companies are disrupting the industry, forcing insurers to rethink how they interact with customers and deliver a high-quality customer experience. With the emergence of attended automation capabilities, Robotic Process Automation (RPA) is a critical technology solution empowering customer-facing associates to quickly deliver exceptional service by putting critical information at their fingertips, automating manual tasks and enabling real-time collaboration across the organization.
Automation Anywhere, the leading provider of RPA and cognitive intelligence solutions, will offer insights on how insurance organizations are using RPA, machine learning and attended automation to transform customer service.
During this session, we will discuss:
•Robotic Process Automation trends and benefits
•Use cases describing where companies typically apply RPA in the insurance industry
•Specific examples showing how RPA and attended automation can be used to improve customer service in insurance organizations
About the speaker - Kenneth Mertzel, Global Industry Leader – Financial Services
Ken Mertzel is the Global Industry Leader for Insurance and Banking at Automation Anywhere, a leader in robotic process automation (RPA). Ken brings more than 25 years of experience as a Financial Services industry executive improving business performance and organizational effectiveness. Previously, he served as chief financial officer of the Insurance Group at Bank of America as well as associate partner at Accenture, finance controller at Progressive Insurance and consultant at Bain & Company. At Automation Anywhere, Ken leads a team that develops customized RPA and intelligent automation solutions to help insurance, banking and finance customers improve productivity and lower operating costs.
Troy Vennon, Director of Security Innovation, the Columbus CollaboratoryOct 22 20193:00 pmUTC60 mins
It’s been 20+ years since the US government first issued a directive mandating that critical infrastructure providers in the public and private sectors share information about cyber threats. This directive, PDD63, recognized that, in the face of increasing threats, organizations that band together to share information and coordinate responses stand a better chance of protecting themselves. Thus, the realm of threat intelligence sharing was created. Join Troy Vennon, Director of Security Innovation at Columbus Collaboratory, as he reviews the basics of sharing threat intelligence and how it can benefit an organization of any size in any industry.
Today’s IT admins are loaded with non-value add and time-consuming tasks that take away from business innovation. Dell Technologies wants to help you by delivering an intelligent unified approach to IT that enables choice and innovation. Dell Technologies Unified Workspace is the industry’s most comprehensive solution to help IT deploy, secure, manage and support virtually all devices from the cloud. This new solution from Dell Technologies gives our customers time back by bringing together a combination of Dell Technologies offerings into an integrated, intelligent platform to transform your business.
Join us for our webinar, Transforming Your Business with Dell Technologies Unified Workspace, where we’ll be discussing the benefits of partnering with Dell Technologies, including how to:
• DEPLOY while reducing IT time and streamlining workflow
• SECURE endpoints with solutions that protect the entire ecosystem
• MANAGE through intelligent automation across a heterogeneous environment
• SUPPORT with 24/7 access to expert engineers and breakthrough tools to keep employees productive
Aaron Spencer is a Product Marketing Manager for Client Manageability at Dell Technologies. Aaron has more than 17 years of experience in Technology Sales and Marketing.
Today, Aaron evangelizes Dell’s client management offerings and leads product launch and sales enablement efforts in this area. Client management solutions differentiate Dell hardware by making it easier for customers to automate and optimize client deployments, and monitor and update PCs.
Paul Wolmering, VP Worldwide Sales EngineeringOct 22 20195:00 pmUTC45 mins
Join Paul Wolmering, the former Director of Technical Services at Netezza, to learn the top strategies for ensuring your Netezza migration success. He will share lessons learned from his real world experiences with customers to help you maximize your probability of success.
Visit www.actian.com/modernize to learn more
Guillaume Autier, Keith CostiganOct 22 20195:00 pmUTC17 mins
Combining and preparing data is a prerequisite for any reporting and analytics project. There are two leading approaches for this process: Extract, transform, and load (ETL) and data virtualization. Use ETL when you want to physically move data from multiple data sources into a single data warehouse. Use data virtualization when you want data to remain in data sources and specify the rows or files to be used for analytics on-the-fly.
Join us to learn the foundational concepts and considerations for these two approaches, and to identify the right path for your reporting or analytics project.
In this webinar, you will learn:
-The differences and use cases for traditional data integration vs data virtualization
-How and why you would want to virtualize multiple data sources
-How to make your data sources user-friendly to support self-service reporting
Richard Cramer, Chief Healthcare Strategist, Informatica & Tony Sheaffer, Master Data Management Specialist, InformaticaOct 22 20195:00 pmUTC30 mins
Health plans have made big investments and great progress in improving operations, enhancing the member experience and becoming more data-driven. However, inaccurate and unreliable provider data continues to be a source of inefficiency, unnecessary rework, and a barrier to innovation.