Inside the Briefcase

Driving Better Outcomes through Workforce Analytics Webcast

Driving Better Outcomes through Workforce Analytics Webcast

Find out what’s really going on in your business with our new online analytics tool.

Briefcase Highlights

Featured Webinars

Webinar: How to prepare your data pipeline for machine learning and AI

September 12, 2019 No Comments

Join Amazon Web Services (AWS) and global intelligence provider, IDC, for a training-based session on transforming your data to power machine learning and AI projects. Learn how to prepare data pipelines that automate your machine learning and AI workflows, use AWS Data Pipeline to automate data movement and transformation, unlock insights that fuel your business, and explore software solutions in AWS Marketplace that make your data analytics-ready.

Addressing GDPR Compliance: Implementing a Security Framework

June 25, 2018 No Comments

This webcast summarizes several key requirements of the GDPR and maps them to Oracle Data Security features.

Webcast: Hybrid Networks, Securing Digital Transformation, by Computing

December 18, 2017 No Comments

This webinar examines hybrid networks and investigates the best way to balance performance and security to create a viable path to digital transformation.

Finding your way in today’s rapidly changing tech environment

October 5, 2017 No Comments

The cloud, big data, open source and machine learning have all been around for years, but are only now reaching the mass adoption at the enterprise level that is changing how software is created and IT is managed.

RANSOMWARE: Industrial Control Systems

October 3, 2017 No Comments

70% of surveyed organizations surveyed an OT security compromise over the past 12 months resulting in operational disruption or loss of confidential information in their industrial networks.

Infographic: Oracle Databased Exadata Cloud Machine

July 12, 2017 No Comments

Exadata Your Way, in the cloud, on premises, or both. Be introduced to Oracle Database Exadata Cloud Machine in this infographic.

Webcast: Enterprises Reveal Ways to Increase Revenue and Productivity

July 12, 2017 No Comments

Discover how to deliver new business applications faster, based on Oracle customer experiences detailed in a recent IDC study.

The big security threats your organization needs to take seriously now

May 23, 2017 No Comments

As a security expert, you’ve seen dozens of top-10 lists and other articles about the major security threats your organization faces. But there are two threats you may not be taking seriously enough.

Driving Better Outcomes through Workforce Analytics Webcast

April 19, 2017 No Comments

Find out what’s really going on in your business with our new online analytics tool.

On-Demand Webcast – Accelerate critical business insight with IBM Storwize all-flash

October 4, 2016 No Comments

View this webcast to learn more about the marketplace dynamics and the latest release of the cost efficient IBM Storwize all-flash family and IBM FlashSystem V9000.

Webcast: Accelerate Critical Business Insight with IBM Storwize All-Flash

September 22, 2016 No Comments

Join Eric Stouffer, Director, Storwize Business Line Executive to learn more about the latest release of the cost efficient IBM Storwize all-flash family and IBM FlashSystem V9000. With comprehensive storage services, virtualization capabilities based on market-leading IBM Spectrum Virtualize technologies, and multiple all-flash options, IBM offers feature-rich, affordable, enterprise-grade storage solutions for the cognitive business looking to grow and thrive.

Wikibon Cube Conversation: Modernizing Data Protection

September 14, 2016 No Comments

A fundamental goal of any IT organization should be to protect, preserve and serve data and information in a cost-effective as well as productive way. This webcast discusses ways in which today’s organizations can safely and securely modernize their data protection within the context of the Wikibon Cube Conversation.

ESG Video Interview Webinar: IBM Data Protection Modernization and Strategy

September 14, 2016 No Comments

In this webcast, Enterprise Strategy Group Principal Analyst, Jason Buffington, and IBM Senior Technical Staff Member, Greg Van Hise discuss a range of data protection modernization issues that businesses are facing today, and strategies to help overcome these challenges.

Want to Accelerate Your Customer Journey?

August 31, 2016 No Comments

The customer experience commercial bankers deliver at the point of customer on-boarding may be the single most important experience their customers may have.

On Storage: A Conversation with IBM Experts

August 30, 2016 No Comments

Big data, analytics, and especially mobile are disrupting the marketplace, and your customers need to understand the implications and opportunities inherent in the new marketplace. This webcast outlines ways to become a trusted source of knowledge and information on storage options for your customers.

Register now for the webcast – Data Defense: An inside look at your secure cloud

August 29, 2016 No Comments

Join us for the season premiere of Modern Workplace, Data Defense: An inside look at your secure cloud, airing September 13th, 2016, at 8:00 AM PDT / 3:00 PM GMT. In this episode, get an exclusive look inside the new generation of Microsoft datacenters and see firsthand how they seamlessly make trillions of transactions every day to help make your organization safer and more efficient by leveraging the power of cloud computing.

4 Steps to a Successful Cloud Contact Center

May 12, 2016 No Comments

This white paper outlines how today’s most modern enterprises are evolving their contact centers to achieve strategic organizational goals, from revenue retention to sales growth, and more.

Webcast: The Phantom Identity Menace

May 10, 2016 No Comments

Attackers are moving away from direct assault, and instead are hijacking and exploiting user credentials to thwart security tools, and gain easy access to business data. How can you strike back and stop breaches that attack your users far, far away?

Webcast: They have all our passwords. It’s time for MFA everywhere.

May 10, 2016 No Comments

Let’s face it. With so many credentials having been compromised and made available to attackers, password-based security is no longer effective. We know that eliminating passwords is the right thing to do, but that takes time, and the bad guys are already inside our networks.

2016 Cyberthreat Defense Report

May 2, 2016 No Comments

The Cyberthreat Defense Report examines the current and planned deployment of counter measures against the backdrop of numerous perceptions.

Are You Equipped to Win the Latest Battle Facing IT?

March 23, 2016 No Comments

Delivering what people expect from their technology while maintaining the secure environment for which IT is responsible. It’s called People-Centric IT as a Service (ITaaS) and this infographic will show you just how effective it can be in resolving your everyday, every way battles.

LogicNow Global IT Service Providers Harmony Report

March 7, 2016 No Comments

Based on the views of over 1,300 IT departments and almost 700 IT Service Providers, this report delivers the data and vital insights that will help every IT Service Provider to focus on improving sales figures, growing their portfolio and ensuring their service matches customer expectations.

5 Soft Skills for Customer Support with Paul Glen

February 8, 2016 No Comments

Join Paul Glen, award-winning author and Computerworld columnist, as he explores the top five soft skills you need to deliver amazing customer support experiences.

Identity and Access Management for Hadoop: The Cornerstone for Big Data Security

January 6, 2016 No Comments

Learn how an integrated security strategy can secure and simplify access to Hadoop environments, while leveraging your existing identity management infrastructure.

Simplify and Secure Your Hadoop Environment

January 6, 2016 No Comments

Watch this webcast to explore Hadoop security challenges and trends.

Cloud-based Privileged Identity Management for the Modern Enterprise

January 6, 2016 No Comments

Privileged identities are the number one target of hackers and the reason 80% of data breaches succeed. Protect your organization by minimizing the number of privileged identities.

Survive Hadoop Go-Live: Achieving Security, Compliance and Business Needs

January 6, 2016 No Comments

Get insights on securing the Hadoop infrastructure, as well as the data in Hadoop.

Comprehensive Privileged Identity Management and Audit for Red Hat Enterprise Linux Product

January 6, 2016 No Comments

Join Tony Goulding from Centrify and Jeff Williams from the National Weather Service to explore the benefits of using Centrify Server Suite to centralize RHEL identities within Active Directory and granularly control privileges, while auditing all privileged activity.

Mobile Devices, Wearables and the Future of Identity

January 6, 2016 No Comments

CBS Interactive is proud to present “Mobile devices, wearables, and the future of identity,” a recording of a live, interactive webcast about how the small devices we carry with us everywhere can help keep even the biggest companies more secure.

Trends Disrupting the Security Market

January 5, 2016 No Comments

Today there are various factors influencing the direction of security solutions over the next 5 years including. Watch this webcast to learn the trends disrupting the security market.