Tech Industry

Best practices for business technology. Whether it's infrastructure, mobile, security, or operational advice, you'll find leading experts and compelling insight here.

  • UCaaS: Skipping Hybrid and Moving Directly To The Cloud

    Webcasts // Sep 2016 // provided by 8x8, Inc.

    There are a variety of reasons to consider a hybrid approach, but is it the right path? If moving to the cloud, why not go all in? This webinar explores moving UC to the cloud, the advantages of a full UCaaS) deployment, and the issues a hybrid approach injects into ...

    Watch Now
  • Webinar: Office 365 business-driven provisioning deep dive

    Webcasts // Aug 2016 // provided by OKTA

    As we approach the fifth anniversary of the release of Office 365, many of the “easy” Office 365 migrations are done. Customers that are migrating to Office 365 now have much more complex requirements. Modern companies have to work around unique user access and governance challenges that may involve their ...

    View this now
  • On-Demand Webinar: Passive Detection Doesn't Work

    Webcasts // Aug 2016 // provided by FireEye

    In this webinar, we’ll look at the security ecosystem and some of the reasons why technologies that react to threat activity may not be adequate in this golden age of cyber threats. We’ll also discuss a few of the most important skill sets necessary to cultivate and why personnel and ...

    Register Now
  • Tackle the top five data challenges with SQL Server

    Webcasts // Jul 2016 // provided by Microsoft

    Join David Hobbs-Mallyon and Ramnik Gulati for this webinar examining how the top five data challenges for organisations and how to tackle them with SQL server solutions.

    Watch Now
  • Why Cloud? Why Not Cloud?

    Webcasts // May 2016 // provided by Interactive Intelligence

    The contact centre is at the heart of numerous government departments, and as customer expectations change rapidly, so does the need to change service delivery models. So how would the move to a cloud architecture improve the ability to deliver these changes? Interactive Intelligence alongside CIO of NSW Fire & ...

    Watch Now
  • The Rise of Red Team Operations

    Webcasts // May 2016 // provided by FireEye

    How strong is your cyber security? Join Chris Truncer, Senior Consultant at Mandiant, a FireEye company, as he provides an introduction to Mandiant Red Team Operations. Learn how Mandiant can achieve a realistic assessment of the effectiveness of your cyber security by emulating the attacker tools, tactics and practices used ...

    Watch Now
  • 30 Days to Complete Business Process Visibility

    Webcasts // Apr 2016 // provided by QuickBase

    You can't fix what you can't measure.That's why achieving total visibility into your company's processes – both on their own and all together – is the key to business growth. But many process leaders spend hours and hours tracking down status updates and compiling data from myriad sources. Your ...

    Watch Now
  • Webinar: The Move to Mobile-Android and iOS Attacks

    Webcasts // Jan 2016 // provided by FireEye

    Cyber attacks that target mobile apps, such as Masque attacks, are on the rise—so much so that mobile is now the fastest growing threat vector to the enterprise. Get insights into a threat group that exploit using the iOS Masque attack, and be vigilant against cyber attacks on mobile ...

    Watch Now
  • You’ve been hacked. Now what?

    Webcasts // Dec 2015 // provided by FireEye

    A network breach is not a matter of if, but when. However many companies are still a long way from having a network security posture to effectively manage or respond to today’s evolving cyber threats. Having security systems in place within your network architecture is only half the battle; todays ...

    Watch Now
  • Technologies to Thwart Insider Threats

    Webcasts // Jul 2016 // provided by ForcePoint

    Whether a disgruntled employee or simply an inadvertent mistake, your employees regularly put your most confidential data at risk every day. According to Ponemon, innocent accidents cause more security incidents than intentional or malicious acts – even your best employees put your data at risk. So how do you best ...

    Watch Now