Webcast: Why Choose IBM for Your Desktop Alternative and Collaboration Software
By: IBM Software Group View more from IBM Software Group >>
Download this next:
Unified Communications: the key to prospering in the new working reality of Covid-19
By: TechTarget ComputerWeekly.com
Type: eGuide
The coronavirus is changing everything about how people work, and will do so permanently. It added that even though the working world was experiencing unprecedented uncertainty, there were two things that should be borne in mind: the virus will pass, and at the other side of the pandemic, the world of work will look very different. Read more in this e-guide.
These are also closely related to: "Webcast: Why Choose IBM for Your Desktop Alternative and Collaboration Software"
-
A Computer Weekly buyer's guide to communications as a service
By: TechTarget ComputerWeekly.com
Type: eBook
As communications needs evolve, organisations must keep pace with the latest services available. In this 15-page buyer's guide, Computer Weekly looks at how we arrived at current-day comms systems, the growing popularity of CPaaS and the advantages of cloud-based offerings in the new normal of hybrid working. Download our exclusive e-Guide and read more about:
- Adapting to the next generation of collaboration and comms services
- Comms platform as a service: Tech for the future
- Rethinking business communications
-
Jargon Buster Guide to Unified Communications
By: TechTarget ComputerWeekly.com
Type: eGuide
As an industry buzzword, unified communications (UC) had its day several years ago. The integration of multiple communication tools – such as voice, video, instant messaging and presence technology – in the service of collaboration within the business is something that virtually every enterprise is now doing.
Yet despite its mainstream status, the UC market continues to evolve as the digitisation of the enterprise gathers pace and new modes of doing business demand new modes of communicating and collaborating.
In this e-guide, we will explore and define some of the key elements of a UC deployment, and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives: Paul Clarke from UC provider 3CX argues that the technology is still far from ubiquity, particularly when it comes to mobile deployments within the enterprise, while Sandra Gittlen delves a little deeper into this topic, and we will also find out how to consolidate disparate UC deployments within the business.
Meanwhile, at Gitex 2017, the Middle East’s largest technology show, we met with Avaya, which is turning its focus back on its core UC business, and considering how UC can play a role in supporting projects that involve some more up-and-coming technologies, such as artificial intelligence, and even blockchain.
Find more content like what you just read:
-
Your people make it real
By:
Type: Replay
We have broken down the boundaries of work and proved remote teams can work effectively. Technology is crucial but it’s your people who make the change, your people make it real. It’s all about enabling people to collaborate, be creative, and thrive with the right technology without losing the connection between teams. In this session, we will share some insights on how to have a successful transformation.
-
MicroScope – March 2021: The 5G opportunity
By: MicroScope
Type: Ezine
Experts predict that 2021 is meant to be the year of 5G, but what does that mean for the channel? In this issue, discover what 5G technology could bring to the reseller community, learn about how smart buildings are influencing the way we live, and discover how remote working has changed the way we work
-
Your essential guide to sustainability solutions for modern business challenges
By: Fujitsu
Type: Video
Discover in this short video how Fujitsu can help create a sustainable world where people, regions, and organizations are connected and where innovation thrives.
-
Closing Remarks
By:
Type: Video
Together, leaders in our industry can collaborate to safeguard a more sustainable future. Our commitment to this journey will have a positive impact on people, communities and the planet.
-
Secure Collaboration and Workflows Among Distributed Teams with Box
By:
Type: Replay
Cloud security and privacy is growing increasingly complex. Adopting cloud technologies, and creating a secure, frictionless, collaborative environment helps people achieve more by doing less. In this session, learn how Box is powering collaboration for customers and employees with a zero-trust model, even when they do come back to the office.
-
Four Best Practices to Combat Insider Threats in Your Supply Chain
By:
Type: Talk
Collaboration has been key to many organisations’ success throughout the transition to remote working. Broadening the supply chain to collaborate with remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches. Safeguarding your organisation's IP and user data relies upon a people-centric approach to managing insider risk. Collaboration has been key to many organisations’ success throughout the transition to remote working. Broadening the supply chain to collaborate with remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches. Safeguarding your organisations’ IP and user data relies upon a people-centric approach to managing insider risk. Join us as we discuss how the technology sector and others in agile, collaborative industries can manage insider threats. In this session, you will learn how to: - Allow for open collaboration by using data to identify user risk - Protect your competitive advantage with real-time IP data tracking - Safeguard user data when working with third parties to remain compliant - Prepare your incident response plan to avoid unnecessary data loss
-
Effective Communication for IT Leaders
By:
Type: Video
Effective communication is harder than people think it is. In this session, we dive into the essential communication skills that every IT leader needs to master. Whether you’re managing a team, collaborating with stakeholders, or driving strategic initiatives, effective communication is key to your success.
-
Ensono Flex Cloud Engineering: Deliver Value Faster with a Team of Cloud Experts
By: Ensono
Type: Video
Watch this video to see Ensono Flex Cloud Engineering manages the skill gap between your current resources and your cloud project backlog. See how it provides access to advanced cloud capabilities through Ensono agile engineering teams that will collaborate seamlessly with your people.
-
Collaboration Cafe: Don't let hybrid work be a culture killer
By:
Type: Replay
We all know that Communication and Collaboration is mission critical in organizations, and makes up a significant part in our daily lives. Communication allows humans to express themselves and understand others. Collaboration allows organizations to solve problems and build things together. As we shift into a Hybrid Workplace, the way we communicate and collaborate with each other changes. We have the power to shape what this looks like within our organizations. We invite David Byrum, a HR expert from Human Synergistics to discuss the human and culture aspect of our new working world with IR's CEO, John Ruthven and Chief People and Culture Officer, Vanessa Walker.
-
Building Success With Generative AI, Dataiku, & Databricks
By:
Type: Video
With the advent of Generative AI accelerating the path to democratizing data and AI in the enterprise, the challenge to provide tooling for more people and encourage collaboration between teams becomes paramount. With Dataiku and Databricks, everyone from data professionals to business experts has what they need to collaborate and develop successful data and AI projects at scale. This talk will showcase the ease in extensibility features between the technologies and feature a thought-provoking fireside chat.
-
A Computer Weekly buyer's guide to video conferencing and collaboration
By: TechTarget ComputerWeekly.com
Type: eGuide
In this 17-page buyer's guide, Computer Weekly looks at how employers can support a future of flexible working, with video conferencing, collaboration, augmented reality and unified comms technologies all lined up to play a part.
-
Educating Your People Against Cybercriminals Latest Tactics
By:
Type: Talk
Cybercriminals continue to leverage uncertainty and fear to launch malicious campaigns with one aim in mind – to get your people to click. And, while remote working and collaboration via digital platforms has become the new normal for many of us, criminal motivations haven't shifted quite so dramatically. It's their opportunity and attack surface that has just increased. Join us in a 30-mins Live Talk with Paul Down, Senior Security Awareness Specialist and Matt Cooke International Cybersecurity Specialist at Proofpoint as they discuss: - How to take security awareness beyond just threats and phishing and use it to help your people adapt to the new normal, securely - How we to educate so people understand their role in protecting not only your organisations data, but also personal and family data against those threats - How we can use security awareness training metrics to better understand and respond to organisational risk. At the end of this session we’ll be providing you the opportunity to take our free People Risk Assessment and see how you compare with other companies in your industry.
-
How HR is teaming up with Workplace to define the new employee experience
By:
Type: Video
Many employees now have new expectations about where and how they work. One thing is consistent, hybrid work is here to stay. Now HR and Workplace teams are collaborating like never before to help organizations reimagine the employee experience regardless of where and how employees work. Join us for an impactful webinar as we explore: - New strategies for managing transitions, attracting top talent, and retaining employees - Reshaping digital and physical experiences by bringing the best of both together - How to measure impact and manage costs for real estate, services, and people Stay ahead by understanding the latest global trends in the way we work that impact both people and workplaces.
-
Our Post APEC Trip to China: Promoting Green Initiatives
By:
Type: Video
In this week's video, Xiabing embarks on a journey across China to engage with officials and business leaders, aiming to inspire future collaborations on green initiatives. She is accompanied by the founder and CEO of KraneShares, Jonathan Krane, former US ambassador to China, Terry Branstad, and former US ambassador to Singapore and KraneShares General Counsel, David Adelman. Following positive dialogues between the US and China at the highest level during the APEC conference in San Francisco, this visit by KraneShares marked the first American delegation to China post-conference. The team discussed diverse areas of potential cooperation between the two nations, specifically focusing on green initiatives that address climate issues such as carbon markets, food security, renewable energy, and people-to-people exchanges. Join Xiabing as she and her colleagues discuss the vast opportunities for collaboration between the US and China on green initiatives, highlighting China's receptive stance towards business.
-
We Have Plenty of Security Tools – Now we Need to Connect the Dots
By:
Type: Talk
We’ve long known that there are far too many threats and security alerts, for overstretched analysts to respond to. But as enterprises have piled on new layers of security, especially during the COVID era, the sheer number of disparate tools is making the problem worse – not better. Recent estimates are that large enterprises average over 100 discreet security tools, many of which don’t play nicely together. Today’s security challenges are less about detection, than connecting the dots. This presentation will cover strategies to empower your security team through orchestration, automation, and collaboration tools, to connect systems across platforms, and connect the right people across silos to take intelligence-driven action. Learning Objectives: • How to connect people and systems across security silos • The need to orchestrate disparate security tools • Strategies for effective automation with humans in the loop • Integrating collaboration and threat intel sharing across organizations
-
Leadership, Digital Transformation and Partnership with Fintechs
By:
Type: Talk
In today's rapidly changing world, digital transformation isn't just about technology -- it's about culture, people and leadership. Collaboration with key industry players is critical to driving innovation. Partnership with Fintechs is one of the most interesting topics of our times. Fintechs are providing an exceptional and transparent consumer experience which makes them a very valuable partner of the eco system.
-
Getting Things Done through Influence vs. Authority
By:
Type: Talk
When you have a title or position of authority, you can boss people around + micromanage + issue orders. It's a command-and-control approach to getting things done. But that style only gets you so far... people don't like to be managed with an iron fist. A better alternative, one that doesn't require authority, is a heart-and-soul approach. When you develop skills for influencing others, you can: - Ask instead of tell... and get positive responses from people who WANT to be engaged. - Tap into others' intrinsic motivation, a powerful force that unleashes lots of effort and results. - Trust that others will continue as planned, even when you're not looking over their shoulders. - Ennoble others so they'll share their input and ideas for reaching your goals together. - Collaborate without the constraints of positional power. No matter what your rank on the org chart is, influence can help you be more effective in working with others.
-
Getting Things Done through Influence vs. Authority
By:
Type: Replay
When you have a title or position of authority, you can boss people around + micromanage + issue orders. It's a command-and-control approach to getting things done. But that style only gets you so far... people don't like to be managed with an iron fist. A better alternative, one that doesn't require authority, is a heart-and-soul approach. When you develop skills for influencing others, you can: - Ask instead of tell... and get positive responses from people who WANT to be engaged. - Tap into others' intrinsic motivation, a powerful force that unleashes lots of effort and results. - Trust that others will continue as planned, even when you're not looking over their shoulders. - Ennoble others so they'll share their input and ideas for reaching your goals together. - Collaborate without the constraints of positional power. No matter what your rank on the org chart is, influence can help you be more effective in working with others.
-
Connect collaboration tools for optimal hybrid work
By:
Type: Replay
Over 2 million teams around the world trust Trello for their large-scale collaboration. Trello can be deployed across any department—learn from our Senior Trello Product Manager, Matt Dolan, on how teams can manage their tasks more flexibly and intuitively. Silos: great for grain, crap for companies. With a small team in the same physical space, collaboration is easy. But with a large organization in a hybrid work world...not so much. See how your teams can use Trello, Confluence, Atlas, chat tools, and other apps for whole-company collaboration, giving people the visibility and connection they need to get work done effectively while protecting time for focus and deep work—and maybe having a little fun in the process!
-
Extending the Reach of Threat Intelligence: The Need for Collective Defense
By:
Type: Replay
In the healthcare industry, it’s more critical than ever to get the right threat intelligence to the right people at the right time. While security teams are inundated with threat feeds, vulnerabilities, and indicators of compromise, it is difficult to make sense of this flood of information, and even harder to collaborate, share insights, and respond quickly across enterprise silos and distributed organizations. Join experts from Health-ISAC and Cyware for an interactive discussion and learn how your peers are extending the reach of threat intelligence through collaboration and automation, to achieve the benefits of collective defense.
-
Building a More Collaborative Consultancy
By:
Type: Video
Getting cross-organisational teams to collaborate and be on the same page is a tough but worthwhile task. If teams are unclear on the mission and what’s in it for them, precious time can be wasted. To succeed, you need everyone rowing in the same direction. Join Jennifer J. Fondrevay, founder of M&A consultancy Day1 Ready™ for her expertise on how to get teams aligned and working together. Built on her experience leading and influencing teams to collaborate post-M&A (merger and acquisition) deal, Jennifer will share insights to help you foster knowledge-sharing, team-building, transparency and collaboration with your clients. You’ll get insight into: 1) Why people might resist collaborating and how to overcome their fears 2) Overcoming the “us” vs “them” thinking that can undermine long-term success 3) Positioning your consultancy as a value-add partner
-
Dell | Proofpoint Customer Webinar: Enhancing M365 Security with Proofpoint
By:
Type: Video
Microsoft 365’s powerful collaboration capabilities make these suites a potential tool for abuse by sophisticated threat actors. While default security solutions provide some protection, attackers have gotten more sophisticated and introduced new techniques. Business email compromise, supplier fraud, and ransomware, in particular, have seen a surge in popularity. To stop them we need to take a defense-in-depth approach to people-centric security. In this presentation, we'll discuss: • Recent trends and insights of the threat landscape • Optimizing security in a people-centric way to focus on real-world security challenges • How to uncover insights and take proactive actions
-
Forcepoint Cyber Experts Discuss Our 2019 Cybersecurity Predictions
By:
Type: Video
Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely. This intersection of people interacting with data and technology will also drive cyber risk to all-time highs, according to new insights from Forcepoint researchers and data scientists. Watch this video as our Cyber Experts discuss their contributions to the 2019 Forcepoint Cybersecurity Predictions Report, including: - How attacks on industrial IoT could lead to widespread power outages - When credential theft moves to cloning your face to bypass biometric authentication - What happens in a world incentivized to commit intellectual property theft at scale
-
Freshservice On-call Management Featuring Latest Enhancements
By:
Type: Replay
Discover how Freshservice On-Call Management delivers on three fronts: - On the people front, it sets expectations, demands accountability, and offers a high degree of personalization. - On the process front, it integrates popular channels of communication, automates escalation, and simplifies collaboration - On the technology front, it powers a unified incident management platform that could be used by both – IT service management and ITOps.
-
Freshservice On-call Management Featuring Latest Enhancements
By:
Type: Replay
Discover how Freshservice On-Call Management delivers on three fronts: - On the people front, it sets expectations, demands accountability, and offers a high degree of personalization. - On the process front, it integrates popular channels of communication, automates escalation, and simplifies collaboration - On the technology front, it powers a unified incident management platform that could be used by both – IT service management and ITOps.
-
Ask the experts – collaboration tools: what do lines of business really want?
By:
Type: Talk
Collaboration tools are rapidly being adopted by organisations to help workers remain productive whilst being home based. However, once the current crisis is over and many people are back in the office, will those tools still hold value? Hear from Human Resources, Learning and Development and Marketing leaders who will discuss: ● Their requirements and priorities for collaboration tools ● The ongoing benefits for their organisation ● How collaboration technology has helped with recruitment productivity and staff retention ● Why lines of business require effective collaboration tools ● How collaboration tools can help bring new programs to market with speed and scale not possible when reliant on in-person execution. Moderated by Felicity Goven, Senior Manager Advanced Comms, Verizon Business Panellists: Dyanne Ierado, Senior Leader Human Resources – EMEA & APAC, Verizon Business John Williams, Marketing Director – EMEA & APAC, Verizon Business Roger White, Senior Manager, Learning Development – EMEA & APAC, Verizon Business
-
Beyond hybrid work: From collaboration to communities
By:
Type: Replay
Collaborative technologies are essential to thriving in a hybrid work environment. These platforms provide crucial connections between customers, colleagues and partners both directly and across their business applications. Our collaborative spaces need to transition to communities where real people can connect. The Conversational Enterprise is here, and now is the time to make sure your company is ahead of the curve. In this webinar, IDC’s Research Director Wayne Kurtzmann and Slack’s Senior Director of Product Marketing Daniel Hansens discuss the latest IDC MarketScape: “Worldwide Collaboration and Community Applications Vendor Assessment.” Learn about the challenges facing modern businesses and their latest strategies plus predictions for the future of work. We also discuss why Slack has emerged as a leader, thanks to powerful app integrations, useful audio and video features, world-class security and compliance, and more. What you will learn: - The hottest trends in collaboration and community applications - Advice on the most important criteria to consider when evaluating vendors - Which vendors have top scores for collaboration and communication
-
We Have Plenty of Security Tools – Now we Need to Connect the Dots
By:
Type: Replay
We’ve long known that there are far too many threats and security alerts, for overstretched analysts to respond to. But as enterprises have piled on new layers of security, especially during the COVID era, the sheer number of disparate tools is making the problem worse – not better. Recent estimates are that large enterprises average over 100 discreet security tools, many of which don’t play nicely together. Today’s security challenges are less about detection, than connecting the dots. This presentation will cover strategies to empower your security team through orchestration, automation, and collaboration tools, to connect systems across platforms, and connect the right people across silos to take intelligence-driven action. Join experts from Cyware and ISSA as they discuss: • How to connect people and systems across security silos • The need to orchestrate disparate security tools • Strategies for effective automation with humans in the loop • Integrating collaboration and threat intel sharing across organizations
-
How to Repair Relationships & Restore Trust
By:
Type: Talk
Bruised egos, misunderstandings, personality clashes, competition for resources, and more can ruin relationships in the workplace. Sometimes, neither party can remember why they don’t get along. Sometimes, entire departments are split into an us/them mentality even though no one can articulate why it has to be that way. Along the way, it was usually a breach of trust that caused the divide in individual or group relationships. Those breaches are often inadvertent and unintended. People didn’t mean to injure or offend others... they just didn’t know what they didn’t know! So what can you do about it? How can you restore relationships and rebuild trust when there’s a lot of baggage, history, and habits that keep people divided? How can you build bridges for people to come back together and work in a collaborative, unified, and trusting way? Tune in for this presentation for tips and techniques that really work! Part 9 in the video series "Why Wait to Be Great?"
-
How to Repair Relationships & Restore Trust
By:
Type: Replay
Bruised egos, misunderstandings, personality clashes, competition for resources, and more can ruin relationships in the workplace. Sometimes, neither party can remember why they don’t get along. Sometimes, entire departments are split into an us/them mentality even though no one can articulate why it has to be that way. Along the way, it was usually a breach of trust that caused the divide in individual or group relationships. Those breaches are often inadvertent and unintended. People didn’t mean to injure or offend others... they just didn’t know what they didn’t know! So what can you do about it? How can you restore relationships and rebuild trust when there’s a lot of baggage, history, and habits that keep people divided? How can you build bridges for people to come back together and work in a collaborative, unified, and trusting way? Tune in for this presentation for tips and techniques that really work! Part 9 in the video series "Why Wait to Be Great?"
-
Unlocking Agile Media Management with iconik and Wasabi Hot Cloud Storage
By:
Type: Talk
Discover how iconik’s cloud-based media management and collaboration solution integrates with Wasabi hot cloud storage to revolutionize your workflows and connect people with their media. In this live demo, we’ll cover: - Flexible media management: bridging on-premise and cloud storage - Creative media management and archival that helps you to store your media, your way - Going beyond MAM – the power of collaborative production - API, automation, and extensibility for a world where no two workflows are the same - Why iconik and Wasabi are better together By registering for this webinar you agree to share your contact details and be contacted by Wasabi and Iconik.
-
Computer Weekly 19 May 2020: Ocado makes the friendly workplace robot a reality
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
-
Security Collaboration in Action
By:
Type: Talk
Traditional approaches to security involve using products which work on a specific enforcement point - maybe on a gateway or on an endpoint. The assumption is that attacks and threats are are contained to a specific vector. In reality, security operations teams can't keep up with the spread of attacks through the organization. While security products work in silos, cyber criminals attack consistently and creatively, across an organization. In this webinar Check Point's Security Operations experts will introduce a new way of working with security people, products and processes. We'll learn why collaborative security is the only way to ensure threat prevention, and how you can achieve a level of collaboration that will extend the reach of your siloed security tools.
-
Using Threat Intelligence to Break Down Security Silos
By:
Type: Replay
Silos happen. In many security organizations, threat intelligence analysts and incident responders work in different teams, use different tools, and have gaps in how they communicate and collaborate. These fragmented silos of data, technology, and people are pervasive, and increase overall risk. While Threat Intelligence promises to anticipate and prevent cyberthreats, it is often run in isolation, hindering real-time sharing of threat data, and delaying response to emerging threats. And when threat intel is shared, it typically takes too long, provides too much extraneous information, and lacks the context required by downstream decision makers. It's time to break through silos and bring together multiple teams, security disciplines, and tools through orchestration, automation, and better human collaboration. Join security experts from Cyware for an interactive discussion of practical strategies and real-world case studies of SOC teams connecting the dots across tools and effectively integrating threat intelligence into security operations. Topics will include: • How to connect people, technology, and data across security silos • The need to orchestrate security tools, cloud apps, and data sources • Ways to effectively consolidate, and prioritize threat and incident data • How threat intelligence can be used to build better detection rules • Getting the right information to the right people, right away
-
Using Threat Intelligence to Break Down Security Silos
By:
Type: Replay
Silos happen. In many security organizations, threat intelligence analysts and incident responders work in different teams, use different tools, and have gaps in how they communicate and collaborate. These fragmented silos of data, technology, and people are pervasive, and increase overall risk. While Threat Intelligence promises to anticipate and prevent cyberthreats, it is often run in isolation, hindering real-time sharing of threat data, and delaying response to emerging threats. And when threat intel is shared, it typically takes too long, provides too much extraneous information, and lacks the context required by downstream decision makers. It's time to break through silos and bring together multiple teams, security disciplines, and tools through orchestration, automation, and better human collaboration. Join security experts from Cyware for an interactive discussion of practical strategies and real-world case studies of SOC teams connecting the dots across tools and effectively integrating threat intelligence into security operations. Topics will include: • How to connect people, technology, and data across security silos • The need to orchestrate security tools, cloud apps, and data sources • Ways to effectively consolidate, and prioritize threat and incident data • How threat intelligence can be used to build better detection rules • Getting the right information to the right people, right away
-
The human side of DevOps
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we'll share best practice and real-world examples of organisations who have successfully addressed the human side of DevOps.
-
Connection: The Key to Employee Engagement
By:
Type: Replay
We hear over and over again that employee engagement is low. A 2017 Gallup report shows 51% of the workforce is not engaged, and 16% are actively disengaged. What’s missing in our workplace cultures that has led to such low engagement? Connection. Connection between people - between employees and their leaders. Between teams. Between people and their companies. We have so much technology at hand to bring us together, but it may actually cause us to drift apart. Think of the email or text you send to a coworker sitting right across from you. The instant message you send instead of picking up the phone. This lack of connection leads to less collaboration, innovation, trust, and engagement. But companies can take active steps to build more interaction and relationships between their people, and use practices, like appreciation, to create a more integrated culture. Join Mindi Cox, Senior Vice President of People and Great Work at O.C. Tanner, as she shares insights and best practices on how to create a more connected workforce in today’s increasingly disconnected environment. During the webinar you’ll learn: • The importance of human connection in the workplace today • How to foster high-quality interactions among employees and teams • The impact of having a connected workforce on company culture and employee performance
-
Strategies for Working with Distributed Agile Teams
By:
Type: Replay
The Agile manifesto has taught us the most efficient and effective way to convey information is face to face interactions, but what do you do when it’s not possible? Distributed teams, work from home policies and even most recently the coronavirus (COVID-19) outbreak has many people not able to get together face to face. In this session we will discuss: - Tools to improve engagement from remote interactions with colleagues and employees - Insights and practices to improve communication, collaboration and productivity when working from home
-
Computer Weekly 4 February 2020: Ethics and the internet how to build a web we can trust
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.
-
Leading IT in a Pandemic - The New Normal for End User Computing
By:
Type: Video
The world of work and the nature of business continuity has shifted in an instant, which brings fresh challenges to organizations in the midst of digital transformation. So how do you enable the future of work when the future in now? This webinar aims to answer those questions. Join experts from IDC, Hitachi Vantara and VMware as they discuss: • Digital transformation during a pandemic: How IT must examine how best to transform infrastructure and deliver end‑user IT services • Federated collaboration: aligning digital transformation to empower collaboration across a highly dispersed work force • Resiliency vs. capacity: simplifying IT delivery and ensuring people, processes and technology are in sync • Cyber security: how data modernization can help you shore up weaknesses in IT delivery You’ll also learn how Hitachi Vantara and VMware can help ensure the resiliency, availability, and security of this new work environment, with solutions designed to ensure smoother collaboration across a federated workforce.
-
4 Strategies to Combat Insider Threats in Your Supply Chain
By:
Type: Replay
Collaboration is key in today’s workplace. However, broadening the supply chain to include remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches. To safeguard your critical IP and sensitive data, organizations need to take a people-centric approach to protect their data and mitigate insider risk. Watch our 30-minute webinar to learn about how the technology sector and others in agile, collaborative industries can manage insider threats. In this webinar, we’ll cover the four strategies on how to: ● Allow for open collaboration by using data to identify user risk ● Protect your competitive advantage with real-time IP data tracking ● Safeguard user data when working with third parties across your supply chain to remain compliant ● Prepare your incident response plan to avoid unnecessary data loss
-
Leading IT in a Pandemic - The New Normal for End User Computing
By:
Type: Video
The world of work and the nature of business continuity has shifted in an instant, which brings fresh challenges to organizations in the midst of digital transformation. So how do you enable the future of work when the future in now? This webinar aims to answer those questions. Join experts from IDC, Hitachi Vantara and VMware as they discuss: • Digital transformation during a pandemic: How IT must examine how best to transform infrastructure and deliver end‑user IT services • Federated collaboration: aligning digital transformation to empower collaboration across a highly dispersed work force • Resiliency vs. capacity: simplifying IT delivery and ensuring people, processes and technology are in sync • Cyber security: how data modernization can help you shore up weaknesses in IT delivery You’ll also learn how Hitachi Vantara and VMware can help ensure the resiliency, availability, and security of this new work environment, with solutions designed to ensure smoother collaboration across a federated workforce.
-
4 Strategies to Combat Insider Threats in Your Supply Chain
By:
Type: Video
Collaboration is key in today’s workplace. However, broadening the supply chain to include remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches. To safeguard your critical IP and sensitive data, organizations need to take a people-centric approach to protect their data and mitigate insider risk. Watch our 30-minute webinar to learn about how the technology sector and others in agile, collaborative industries can manage insider threats. In this webinar, we’ll cover the four strategies on how to: ● Allow for open collaboration by using data to identify user risk ● Protect your competitive advantage with real-time IP data tracking ● Safeguard user data when working with third parties across your supply chain to remain compliant ● Prepare your incident response plan to avoid unnecessary data loss
-
Digital Transformation: Part I
By: TechTarget ComputerWeekly.com
Type: Presentation
In this presentation from our CW500 event, director of digital architecture and transformation Chris Boyd explains how Telefonica tackled the challenges of delivering people, cultural and organisational change.
-
Welcoming and wayfinding your way to a frictionless hybrid experience
By:
Type: Video
The hybrid workplace is here to stay, along with all its benefits and challenges. Companies have reduced square footage but must still provide essential spaces for employees. Physical flexibility is now a must, as employees need to easily find and book individual spaces, neighborhoods, and collaborative work areas. Large campuses with multifunctional spaces are even more challenging to navigate, impacting space usage and employee engagement. In this session, we’ll look at how wayfinding can help address the challenges of the hybrid workplace, connecting people with spaces – and each other. What will you learn? - How to effectively manage your physical workplace in a hybrid environment - What helps employees feel familiarity in large and small corporate spaces - Why wayfinding is no longer a vanity feature, but an important tool for collaboration
-
Collaboration software in the era of Gen-Z
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, learn how Microsoft is dominating the Software-as-a-Service space thanks to its strength in collaboration software and how the new generation of collaboration software could be stoking communication overload. Also, check out our chart comparing Slack, Microsoft Teams and Spark.
-
How to Build a Detection & Response Strategy for Insider Threats
By:
Type: Video
It’s common for organizations to spend time investigating external cyber threats, including understanding the motivations, intent and capabilities of attackers. But this level of effort is rarely employed when it comes to internal threats. Insider threats are a significant and underinvested problem, and it is crucial for organizations to adopt a people-centric approach to cybersecurity to better protect their data. Join us for a 30-minute webinar on Insider Threat Management (ITM) programs. Our Proofpoint experts will deep dive into customer case studies and explore how companies built successful ITM programs with governance and incident response processes, collaboration across teams, and strong detection and prevention technology. You will learn: - The primary types of insider threats: negligent, malicious or compromised users - Why a people-centric, comprehensive and cloud-native technology approach is crucial - Customers strategies for building successful people-centric ITM programs - Where managed services can help you build the right processes and augment your security teams