ComputerWeekly.com Research Library

Powered by Bitpipe.com

Multimedia

  • OWASP Top 10: The Most Critical Risks Facing Web Applications

    Sponsored by: F5 Networks  | Premiered: May 28, 2020

    Today’s organization uses an average of 983 different applications. As such, ensuring the protection of these web applications is critical for avoiding disruptive breaches and maintaining operational efficiency. In this webinar, explore the top 10 most critical risks facing today’s web applications and the steps you can take to mitigate them.

  • Build for Change: A New Era of Customer Engagement

    Sponsored by: Pegasystems  | Premiered: May 28, 2020

    Pega provides an always-on, digital customer brain that allows you to put your customer squarely in the center of your business across marketing, sales and service interactions. Find out how they achieve that in this brief video.

  • The Secure DevOps Imperative

    Sponsored by: Trend Micro  | Premiered: May 28, 2020

    In this webinar, join experts from ESG and Trend Micro as they discuss, the composition of cloud-native applications, the challenges that come with securing cloud-native environments and Secure DevOps best practices.

  • The Future of Business Communications

    Sponsored by: Fuze  | Premiered: May 28, 2020

    In this video, Art Schoeller from Forrest Research identifies trends in the unified communications industry that have emerged over the last year, details how UCaaS’ flexibility plays a key role in the gig economy and shares best practices for meetings.

  • Digital Service Transformation for Local Councils

    Sponsored by: Acquia, Inc.  | Premiered: May 28, 2020

    Harlow Council wanted to be a trusted source of information to their 80,000 strong community. To do so, their digital services needed to cover everything from recycling information to planning forms. Tune into this webinar to discover how Harlow transformed their council’s digital capabilities to meet the needs of today’s digitally savvy citizens.

  • Automated and Integral Protection for Company-Owned IT Systems in the Home Office

    Sponsored by: Matrix42  | Premiered: May 28, 2020

    In this webinar, learn about the benefits of Matrix42 Workspace Security, automated protection for private IT systems in the home office.

  • Trend Micro Cloud One: Cloud Native Application Security

    Sponsored by: Trend Micro  | Premiered: May 27, 2020

    In this Trend Micro cloud One webinar, join Kyle Klassen, Product Manager of Cloud Native Application Security solutions and Mike Milner Director of Application security as they discuss the Cloud Native Applications framework.

  • Top Considerations When Moving to a Unified Communications Solution

    Sponsored by: Fuze  | Premiered: May 27, 2020

    In this video, Art Schoeller from Forrester Research details the top 5 considerations businesses should make when moving from a legacy communications system to a unified communications provider, as well as how to know when it’s the right time to move business systems to the cloud.

  • Kubernetes-Native Business Automation

    Sponsored by: Red Hat  | Premiered: May 27, 2020

    Quarkus, developed for Kubernetes-native Java, offers a full-stack framework for Java virtual machines (JVMs). The technology allows you to leverage your Java skills and apply them to new cloud architectures. This webinar provides developers with an approached introduction to Quarkus and all its capabilities.

  • Lead your Office to a Modern Digital Workspace

    Sponsored by: Citrix  | Premiered: May 27, 2020

    Tune in to this webinar to learn how to helm the charge into digital workspaces. Hear from digital workspace experts as they offer pointers on how to modernize IT security and enable mobile productivity in a digital workspace environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.