The Year Ahead: Mobile Enterprise Management (MEM) and the evolution of MDM
Mobility has become a key -- and rapidly growing -- component of today's workforce. Employees expect the freedom to bring their own devices, choose where they work and what applications they need to do their jobs. While this creates a much more productive and engaged workforce, it also leads to an increased mix of corporate data with personal apps and information. It’s no longer a mobile workforce that can be secured or managed by simple device management. Enterprises now need to look beyond just devices ... to the apps that run on those devices. And most importantly, what it takes to secure, control, and manage the corporate data that is being accessed and moved around between them. In this program, two of the industry’s leading experts – Gartner Research Vice President Phil Redman and OpenPeak CEO Dan Gittleman, share their insights to examine the evolution of MDM and the new approach to managing mobility in the enterprise. They will also discuss what to look for, what’s important and what’s ahead.
Fabric-Based Infrastructure in Today’s Data Centers
Meeting the challenge for increased efficiency and scale while preparing for the technology needs of tomorrow, is driving businesses toward application and solution based architectures in their data centers – what Gartner refers to as Fabric Based Infrastructure. In this video, Donna Scott (a VP and Distinguished Analyst at Gartner) and Paul Perez (VP and CTO for the Data Center Business Group at Cisco Systems) examine the motivations and impact, for customers moving to a Fabric Based Infrastructure and how Cisco UCS helps customers achieve their goals.
Best Practices in Database Protection
Data is the biggest driver of success today … be it in business, government or society. And with data such a valuable currency, protecting it is a paramount concern. So what must your organization do to make sure your database is secure? What are the real threats to your data? What can you do to stop them? And where can you turn for help in protecting your database? In this program, leading experts from Gartner and Warevalley reveal the solutions and best practices you need to keep your data safe. We’ll also find out why more and more companies around the world increasingly turn to Warevalley to protect perhaps their most valuable asset – their database.
Answers to Balancing Energy Efficiency and Customer Performance Demands in the Data Center
Energy drains an average of 25-40 percent of a data center’s annual budget. And energy costs continue to rise about 12 percent each year. Data center operators must balance increasing customer demands and fluctuating customer environments with ongoing efforts to achieve energy efficiency and reliability within their data centers. Increasingly, companies rely on data center operators to help them boost the energy efficiency of their specific operations. But there are many questions to address as enterprises search for optimal data center co-location space, including: What are the most popular efficiency techniques being used by co-location service providers? What are the major challenges of implementing these technologies in a single versus multi-tenant environment? And, how does a co-location service provider’s approach compare to a traditional in-house enterprise data center build-out and operation? In this program, we’ll answer those questions and more with two of the industry’s leading experts: Gartner research Vice President Dave Cappuccio and Cyrus One Chief Operating Officer Michael Duckett.
The Social Workplace: Rethinking Communication and Collaboration in the Age of Social Networks
There was a time when we had a social life and a business life, and rarely did the two cross. Now, business needs social to succeed. It’s not a question of if you’re using social tools and channels, but how that determines your place in the market. In fact, what you really need to become is a social workplace. But what is a social workplace? How do you become one? And what challenges can you expect? We’ll put those questions and more to two of the top experts on turning business into a social workplace: Gartner analyst Nikos Drakos and Mika Sissonen, marketing manager for social software at SAP. We’ll also find out how SAP is helping enterprises blaze a new trail in social networking.
Wireless App Strategy in the Enterprise
Wireless Apps must now be an integral part of any corporate strategy. They play an increasingly important role in improving: Customer interaction, Quality of services delivered, Compliance monitoring and, live key management indicators. How you integrate wireless apps into your strategy will have a significant impact on how your company and your staff are perceived in the market. In this program, we’ll find out what your strategy should entail and what best practices you need to make it a reality. Gartner analyst Ian Finley will help you determine which apps will most impact your company and offer you the best return on investment. And, Mary Brittain-White, Managing Director of Retriever Communications, will look at the key project and design attributes your organization needs to succeed.
Securing Against Advanced Cyber Threats: A Profile of American Cancer Society
Despite the billions of dollars being invested in security technologies each year, threats continue to bypass conventional defenses – compromising sensitive data and wreaking havoc on enterprise networks. Meanwhile, innovations including mobile devices and cloud computing are further complicating threat detection and incident response. Today’s organizations must take a defense-in-depth approach to security, with internal network visibility being a cornerstone of their strategy. But what is the best way to obtain the visibility and threat intelligence needed to detect advanced cyber-attacks? In this program, we address this question with experts from Gartner, Lancope and the American Cancer Society. We’ll also learn how you move past perimeter- and signature-based strategies to fortify your companies network defenses.
A Pragmatic Path to Navigating Your Applications to the Cloud
Desktop Management is no longer confined just to the desktop. It’s no longer just about machines on desks in a confined office space. Desktop Management must encompass multiple devices and systems spread out in any number of places – be it a main office, remote office, home office or somewhere on the road. What approach should your organization take with desktop management? Is virtualization the best path for you? And what should look for in a virtualized desktop solution? We’ll get those answers and more from leading experts from Gartner and Virtual Computer.
Mobility in the Workplace
Because worker expectations have changed about how, where, and when they access corporate data and applications, mobility has taken on an even greater focus for today’s enterprises. This webcast will look at today’s trends and challenges when approaching the development of a corporate mobile strategy. We will explore this as well as how you implement it, the components you should consider and the benefits you will gain.
DDoS Mitigation for the Enterprise
Enterprises face a rising threat from distributed denial of service attacks (DDoS) and if the enterprise is not prepared for such an attack, the impact can be devastating. What are the potential consequences and more importantly, how do you protect your enterprise from a DDoS attack? In this webcast, top experts from Gartner and Arbor Networks look at this rising threat and its implications to the enterprise. Most importantly, they’ll help you determine the right approach and solution to keep your enterprise safe from a distributed denial of service attack.
Authentication-as-a-Service: Securing Access to the Cloud
Security is no longer confined to the organization's perimeters. For years, user authentication served a vital role in organizations' security policies, securing networking access, protecting user identities and ensuring that users are who they claim to be. But as new business environments like the cloud and the increased use of mobile devices emerge, organizations find they need to quickly adopt new models for authenticating their users to offset potential threats. In this program, Gartner, Vodafone and SafeNet will discuss the emerging authentication models that organizations are adopting; new approaches to user authentication driven by demanding cloud and virtualized environments that are transforming traditional security paradigms; intelligent authentication strategies that can drive value and cost savings; and how you can ensure these implementations will scale as business needs evolve and new environments emerge.
Accelerate your journey to the private cloud
Especially in these tough economic times, CIOs aim to increase efficiency while decreasing costs, and more and more IT executives are turning to the cloud to do so. Why is the cloud so enticing? What advantages does a private cloud offer, what challenges does it raise, and what is a hybrid cloud? In this program, Gartner Research Vice President, Donna Scott, looks at the growing movement toward the cloud and helps you determine which cloud approach is right for your organization. We’ll also find out how Microsoft and HP have teamed up to take the complexity, risk, and cost out of accelerating your journey to private cloud computing.