Inside the Briefcase






Briefcase Highlights


Featured Webinars

On-Demand Webcast – Accelerate critical business insight with IBM Storwize all-flash

October 4, 2016 No Comments

View this webcast to learn more about the marketplace dynamics and the latest release of the cost efficient IBM Storwize all-flash family and IBM FlashSystem V9000.

Webcast: Accelerate Critical Business Insight with IBM Storwize All-Flash

September 22, 2016 No Comments

Join Eric Stouffer, Director, Storwize Business Line Executive to learn more about the latest release of the cost efficient IBM Storwize all-flash family and IBM FlashSystem V9000. With comprehensive storage services, virtualization capabilities based on market-leading IBM Spectrum Virtualize technologies, and multiple all-flash options, IBM offers feature-rich, affordable, enterprise-grade storage solutions for the cognitive business looking to grow and thrive.

Wikibon Cube Conversation: Modernizing Data Protection

September 14, 2016 No Comments

A fundamental goal of any IT organization should be to protect, preserve and serve data and information in a cost-effective as well as productive way. This webcast discusses ways in which today’s organizations can safely and securely modernize their data protection within the context of the Wikibon Cube Conversation.

ESG Video Interview Webinar: IBM Data Protection Modernization and Strategy

September 14, 2016 No Comments

In this webcast, Enterprise Strategy Group Principal Analyst, Jason Buffington, and IBM Senior Technical Staff Member, Greg Van Hise discuss a range of data protection modernization issues that businesses are facing today, and strategies to help overcome these challenges.

Want to Accelerate Your Customer Journey?

August 31, 2016 No Comments

The customer experience commercial bankers deliver at the point of customer on-boarding may be the single most important experience their customers may have.

On Storage: A Conversation with IBM Experts

August 30, 2016 No Comments

Big data, analytics, and especially mobile are disrupting the marketplace, and your customers need to understand the implications and opportunities inherent in the new marketplace. This webcast outlines ways to become a trusted source of knowledge and information on storage options for your customers.

Register now for the webcast – Data Defense: An inside look at your secure cloud

August 29, 2016 No Comments

Join us for the season premiere of Modern Workplace, Data Defense: An inside look at your secure cloud, airing September 13th, 2016, at 8:00 AM PDT / 3:00 PM GMT. In this episode, get an exclusive look inside the new generation of Microsoft datacenters and see firsthand how they seamlessly make trillions of transactions every day to help make your organization safer and more efficient by leveraging the power of cloud computing.

4 Steps to a Successful Cloud Contact Center

May 12, 2016 No Comments

This white paper outlines how today’s most modern enterprises are evolving their contact centers to achieve strategic organizational goals, from revenue retention to sales growth, and more.

Webcast: The Phantom Identity Menace

May 10, 2016 No Comments

Attackers are moving away from direct assault, and instead are hijacking and exploiting user credentials to thwart security tools, and gain easy access to business data. How can you strike back and stop breaches that attack your users far, far away?

Webcast: They have all our passwords. It’s time for MFA everywhere.

May 10, 2016 No Comments

Let’s face it. With so many credentials having been compromised and made available to attackers, password-based security is no longer effective. We know that eliminating passwords is the right thing to do, but that takes time, and the bad guys are already inside our networks.

2016 Cyberthreat Defense Report

May 2, 2016 No Comments

The Cyberthreat Defense Report examines the current and planned deployment of counter measures against the backdrop of numerous perceptions.

Are You Equipped to Win the Latest Battle Facing IT?

March 23, 2016 No Comments

Delivering what people expect from their technology while maintaining the secure environment for which IT is responsible. It’s called People-Centric IT as a Service (ITaaS) and this infographic will show you just how effective it can be in resolving your everyday, every way battles.

LogicNow Global IT Service Providers Harmony Report

March 7, 2016 No Comments

Based on the views of over 1,300 IT departments and almost 700 IT Service Providers, this report delivers the data and vital insights that will help every IT Service Provider to focus on improving sales figures, growing their portfolio and ensuring their service matches customer expectations.

5 Soft Skills for Customer Support with Paul Glen

February 8, 2016 No Comments

Join Paul Glen, award-winning author and Computerworld columnist, as he explores the top five soft skills you need to deliver amazing customer support experiences.

Identity and Access Management for Hadoop: The Cornerstone for Big Data Security

January 6, 2016 No Comments

Learn how an integrated security strategy can secure and simplify access to Hadoop environments, while leveraging your existing identity management infrastructure.

Simplify and Secure Your Hadoop Environment

January 6, 2016 No Comments

Watch this webcast to explore Hadoop security challenges and trends.

Cloud-based Privileged Identity Management for the Modern Enterprise

January 6, 2016 No Comments

Privileged identities are the number one target of hackers and the reason 80% of data breaches succeed. Protect your organization by minimizing the number of privileged identities.

Survive Hadoop Go-Live: Achieving Security, Compliance and Business Needs

January 6, 2016 No Comments

Get insights on securing the Hadoop infrastructure, as well as the data in Hadoop.

Comprehensive Privileged Identity Management and Audit for Red Hat Enterprise Linux Product

January 6, 2016 No Comments

Join Tony Goulding from Centrify and Jeff Williams from the National Weather Service to explore the benefits of using Centrify Server Suite to centralize RHEL identities within Active Directory and granularly control privileges, while auditing all privileged activity.

Mobile Devices, Wearables and the Future of Identity

January 6, 2016 No Comments

CBS Interactive is proud to present “Mobile devices, wearables, and the future of identity,” a recording of a live, interactive webcast about how the small devices we carry with us everywhere can help keep even the biggest companies more secure.

Trends Disrupting the Security Market

January 5, 2016 No Comments

Today there are various factors influencing the direction of security solutions over the next 5 years including. Watch this webcast to learn the trends disrupting the security market.

Single Sign-On: Past, Present, and Future

January 5, 2016 No Comments

Join Pete Lindstrom, Research Director for IDC’s Security Products program, and Chris Webber, Security Strategist with Centrify, to learn how the lessons of the past can help IT springboard into the future of Identity.

Cloud IAM is Set to Break the Sound Barrier

January 5, 2016 No Comments

Join guest speaker Andras Cser, VP, Principal Analyst serving security and risk professionals from Forrester Research, and Chris Webber, Security Strategist from Centrify, as they walk through key trends and guidance for the Cloud IAM market.

Top 10 Best Practices for Privilege Identity Management

January 4, 2016 No Comments

In this webinar we explore the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud and one where IT functions are split between internal and 3rd-party administrators.

OMG, my root password is in the cloud – and that’s where it should be!

January 4, 2016 No Comments

How can an organization securely manage and monitor the use of privileged accounts for their distributed workforce without slowing down the business?

Incorporate, Don’t Alienate Shadow IT

November 12, 2015 No Comments

Learn how to provide users a “carrot” without the “stick” through an approved marketplace for purchasing public cloud. At the same time, you give IT the visibility and traceability to manage security and costs.

Barbarians at the Gate: Enhancing Web Security with Behavioural Analytics

November 11, 2015 No Comments

Cybercrime is thriving … as demonstrated by several high-profile, online data breaches in the press recently. As static, on-premise security measures are increasingly becoming ineffective against attempts to steal data and take web services offline, many security professionals are left unsure how to best mitigate these evolving threats.

The Power of Passive Authentication in the Contact Center

November 11, 2015 No Comments

In this webcast, authentication and fraud experts from Gartner and Verint Systems discuss passive authentication for the contact center.

Rethinking Big Data Platforms like Hadoop with Open Technology

November 11, 2015 No Comments

This webinar with Dr. Srini Chari, Managing Partner, Cabot Partners and IBM Distinguished Engineer Linton examines how organizations can derive high value insights by framing strategic business questions and combining systems of records with systems of engagement and how these can be achieved by implementing a high-performance, scalable and agile information foundation to support both real-time and large-scale analytics capabilities.

The key to a successful data migration.

November 11, 2015 No Comments

In this program, we answer those questions and more with two leading experts – Gartner Vice President and Distinguished Analyst Ted Friedman and Experian Data Quality’s Head of Product Strategy Derek Munro.

ADVERTISEMENT

AnDevCon


American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange