dcsimg
eSeminars The Online Seminar Standard
logo
eSeminars Live - We bring together an elite list of editors, industry luminaries, analysts and expert panel speakers on an interactive webcasting platform.

Featured Events >>>

Why Mobility and Security Must Play Crucial Roles in Transforming Retail Experiences

March 28, 2017

There's little doubt that embracing mobility plays an important part in helping retailers adapt to the needs and wants of the modern customer. It is the key to creating innovative customer engagements in brick-and-mortar stores, where the staff is no longer bound by counters and registers, but instead roams freely to consult with customers, check inventory, and showcase new products with smartphones, tablets, laptops, desktops and IoT devices.

read more >>>

Sponsored by IBM MaaS360

Taming Digital Disruption in the Workplace

March 29, 2017

You may not recognize digital disruption in the workplace for what it is -- or what's causing it. Make no mistake, it's well underway and managers often struggle to come to grips with the root causes and impact on their organizations. This disruption is part of the Digital Transformation and it results from rapid innovation, increasing user expectations -- and an organization's inability to adapt quickly to change.

read more >>>

Sponsored By Pomeroy

No One is Immune to Social Engineering: How to Transform Fraud Protection for Your Customers

March 30, 2017

Today's digital banking channels offer your customers convenience, but they also present additional opportunities for fraud. Fraudsters continue to develop new attack techniques, and increasingly their focus is not financial institutions that invest heavily in IT security, but rather the customers like yours, who use devices to conduct transactions on a regular basis.

read more >>>

Sponsored by IBM

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

March 16, 2017

Security teams looking to extend their network perimeter defenses with an attack and breach detection capability are discovering that a hosted SIEM gets them up and running faster.

read more >>>

Sponsored by IBM

How to Meet the Unique Challenges of Protecting Cloud Assets

March 23, 2017

As you adopt the use of cloud services, whether in public/IaaS, SaaS or hybrid environments, the attack surface expands and, if breached, the costs increase exponentially. This webinar is designed to address the unique challenges that enterprises face when they deploy applications in the public cloud.

read more >>>

Sponsored by CyberArk

Why Your Financial Service Firm Can't Afford to Ignore Enterprise Mobility and Security

March 22, 2017

Financial services organizations are experiencing tremendous growth in the use of mobile devices by their employees and customers, and the price of ignoring the risks presented by unmanaged endpoints is too high to ignore.

read more >>>

Sponsored by IBM MaaS360

Is It Time for Your Organization to Deploy Hadoop?

March 14, 2017

Hadoop is an increasingly popular tool for organizations looking to manage and mine Big Data. But the decisions around when, how and where organizations should deploy Hadoop require thoughtful consideration and thorough evaluation, as the commitment in terms of both time and resources is not trivial. Identifying what the ?trigger points? are and what business needs drive the decision to use Hadoop is critical.

read more >>>

Sponsored by IBM

2017 Cybersecurity Forecast: What’s On The Horizon?

March 21, 2017

With the rise in ransomware attacks, bank heists that reached new levels of sophistication, and extortion plots that were beyond anything we could have imagined, 2016 certainly was an eventful year for cybersecurity. Going into 2017, no business can afford to be uninformed about cybersecurity or unprepared for an attack.

read more >>>

Sponsored by Kaspersky

Overcoming the 'Alternative Facts' on Web & Mobile Application Security

March 15, 2017

Protecting your organization from cyber-attackers is becoming a more serious concern each year, but it's also becoming more difficult to do so effectively. Organizations like yours struggle to separate authentic security trends from "alternative facts" that people believe about their level of protection.

read more >>>

Sponsored by IBM

Sponsors >>>

Topics >>>

Security

Cloud Security Enforcer, the New CASB from IBM Security

Cloud access security broker (CASB) solutions address security gaps left open by many software-as-a-service (SaaS) providers. This webinar discusses a next-generation solution, unique from other CASB products, that helps you better prepare and securely deliver cloud applications. It's the first solution to combine cloud application visibility, identity and access controls, and dynamic threat intelligence.

Sponsored by IBM MaaS360

IT Infrastructure

What Is NextGen WAN?

If you read technology media, next-generation wide-area networks (WANs) are the next best thing since sliced bread. Are they? Many businesses are asking themselves that very same question. This eSeminar compiles the most common questions and brings together engineers and architects to offer their experience and answers.

Sponsored by CDW & Cisco