Webinars

Join us for an hour and leave with tactical advice that will have an ongoing impact on your top initiatives.
Find Webinars
 


You are viewing: Upcoming Webinars

Results 1 - 10 of 39
1 2 3 4 | Next

  • The Future of IT Service Support Management
  • 23 Sep 2014
  • Claims of the death of the IT service desk are greatly exaggerated. Although the Nexus of Forces present challenges to traditional IT service desks, it also enables opportunities to modernize the business user experience. The ability to demonstrate value is paramount, and modern IT service support must place more emphasis on proactive business user productivity enablement. This presentation provides an overview of the current state of IT service management challenges and how IT service support organizations are modernizing to meet the needs of the business.
  • How Intelligence-Aware Security Controls Will Shape the Security Market
  • 23 Sep 2014
  • Intelligence-aware security control (IASC) is an emerging concept in security, built on the foundation of big data and intelligent analytics that enables security technologies to reach new bounds. This presentation discusses what IASC actually is, examples of technologies using this today and how IASC is positioned to change the security landscape of tomorrow.
  • Digital Ethics: How Not to Mess Up With Technology
  • 24 Sep 2014
  • Original webinar date of August 20th has been changed to September 24th. From Kant to Confucius, what is "good" and "bad" technology? It will be fun, as we'll discuss in Socratic style. Practical, because of contemporary examples. Provocative, asking you to take a stand, and not just listen. Not for the faint-hearted, this webinar is a must-attend for those who want to push the limits of innovations while avoiding public embarrassment through messing up.
  • The Enemy Within: Monitoring, Detecting and Mitigating the Threat of Insider Attack
  • 24 Sep 2014
  • Authorized users can destroy security through malice or incompetence. Although they may have noble intent, the damage created by employees and contractors can be dramatic. This webinar explores technology and practices that focus on human behavior to predict, detect and prevent insider threats to enterprise performance.
  • Is Managed Failover the End of Disaster Recovery?
  • 25 Sep 2014
  • Today, many cloud service providers and a growing number of enterprises are failing over data center operations between separate cloud data centers in lieu of using more traditional disaster recovery-centric approaches. Is managed failover the convergence holy grail for both traditional disaster recovery and availability management?
  • Protecting Applications on Mobile Devices
  • 30 Sep 2014
  • Organizations are implementing ways to protect mobile devices and mobile applications residing on these devices. Enabling applications on corporate- or employee-owned devices is a major security issue. In this webinar, we talk about the major trends in mobile application security, and the most effective solutions to adopt.
  • Key Growth Drivers in Enterprise Software for 2015 and 2016
  • 30 Sep 2014
  • Enterprise software markets are being revitalized. Software buying is increasingly shaped by cloud services, digitalization initiatives, information and data analytics, and mobility. These trends are changing how software investments support organizational goals and outcomes, driving new business models, and reshaping how software is valued, purchased, and utilized. This webinar helps technology and services providers plan for, and benefit from, opportunities created by upcoming market disruption, regionalized competition and new computing requirements.
  • Hybrid Clouds and Hybrid IT: The Next Frontier
  • 01 Oct 2014
  • Many private clouds will become hybrid, and enterprise IT organizations will move beyond the role of just hosting and managing IT capability to also managing IT services sourced elsewhere - especially with multiple cloud providers. Infrastructure and operations will take a primary role in changing the IT role from provider to broker. The key to success will be accelerating and adding business value as an intermediary.
1 2 3 4 | Next