You've requested...

New Sugar 5.0 Platform Capabilities and Advanced CRM Functionality

If a new window did not open, click here to view this asset.

Download this next:

The future of e-commerce and CRM

While meshing e-commerce and CRM platforms has been an emerging implementation idea for several years, 2018 will be the year in which businesses make some of those implementation leaps and reap the benefits, according to insiders watching the technology.

In this e-guide, learn about some trends vendors and analysts are predicting for the future of e-commerce and CRM.

Explore key considerations when planning your CRM spend, including:

  • Mobile becomes the front door
  • The arrival of the subscription economy
  • Use behavior analytics to understand e-commerce and CRM
  • And more

These are also closely related to: "New Sugar 5.0 Platform Capabilities and Advanced CRM Functionality"

  • 6 customer service channels you need to support

    As the number of customer service channels continues to expand, organizations have been challenged to decide which to prioritize. Where should you allocate resources to most effectively engage with current and potential customers?

     

    In this expert e-guide, Scott Sachs (President of the specialized consultancy SJS Solutions) weighs the pros and cons of these 6 main customer service channels:

    • Chat/video chat
    • Phone
    • Email
    • Social media
    • Customer self-service
    • Mobile

  • Under the Hood Episode 1: Tour of MyAryaka Security Homepage

    Aryaka Solutions Architect Corey Schnoke opens this series with an on-screen tour of the MyAryaka Security Homepage.

Find more content like what you just read:

  • A Hospitality How-To: Consent and Customer Data Management Across a Global Brand

    Hear how the Radisson was able to employ sophisticated consent management on their homepage and update multiple versions of their global site in a seamless and simple way by using Tealium, saving them time, money and resources.

    Download

  • Latest updates on pensions dashboards and exploring the end user experience

    In this session with the Pensions Dashboards Programme (PDP), find out more about what users could see and experience when they interact with pensions dashboards, as the wider pensions industry prepares for connection to the dashboards ecosystem starting in April 2025. Join us to hear from the programme's Principal, Chris Curry, who will share the latest advancements and updates on the PDP and the MoneyHelper Pensions Dashboard, helping to keep you informed and ready for pensions dashboards becoming a reality.

    Download

  • Hidden Context, Adding Information Without Cluttering Your Dashboard

    Sometimes, your dashboard needs a little more explanation for your user. But it doesn’t need to appear on the dashboard all at once. In this latest Data Science Central Webinar, we will uncover a few techniques you can use to add information and update visuals behind the scenes, leaving you with a clean dashboard every time!

    Download

  • A Computer Weekly Buyer's Guide to Containers and Microservices

    In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.

    Download

  • General purpose hardware security modules as a service: Deep dive

    This webinar examines general purpose hardware security modules as a service, and provides key insights for ensuring success when adopting a data protection as a service strategy.

    Download

  • What’s New in the Latest NOM Release?

    Here’s exciting news! The May 2022 releases of Network Operations Management (NOM), Network Node Manager i, and Network Automation are here. Join our team leaders for a discussion of the new capabilities now available to you. Here’s a sneak peek of our updates: NOM Reporting – SaaS • Simplify your transition from Network Performance Server (NPS) to the OPTIC Data Lake with NOM Reporting – SaaS. • See how reporting and dashboarding capabilities–including the powerful Performance Troubleshooting module–deliver faster, more intuitive analysis and reporting using the SaaS-based data lake. • Learn how to easily access NOM data with the cloud-native BI tools you already use or via integrated reporting options. Incident and Performance Troubleshooting • Gain new insights for your performance data in new chart types, such as TopN tables and Pie Charts, and consolidate data with Group by and aggregation options. • Better understand traffic data in Performance Troubleshooting and Incident Troubleshooting workflows. • View network paths using specified nodes or interfaces for source and destination to identify related objects, then troubleshoot and complete the process with automated configuration-change capabilities. Monitoring for change • See how our powerful new workflow-based user interface allows operators to monitor for performance-impacting change from a single dashboard.

    Download

  • Cache Invalidation: What it is and How to Implement It

    Did you know that removing objects from the cache is just as important as storing objects in the cache? Keeping objects in the cache for too long can result in data inconsistency. Imagine breaking news not ending up on a news websites because the homepage is cached. Luckily Varnish has some built-in invalidation mechanisms to allow applications to forcefully remove objects from the cache. In this webinar we'll talk about: - Purging - Soft purging - Banning - Secondary key

    Download

  • APAC: Cache Invalidation: What it is and How to Implement It

    Did you know that removing objects from the cache is just as important as storing objects in the cache? Keeping objects in the cache for too long can result in data inconsistency. Imagine breaking news not ending up on a news websites because the homepage is cached. Luckily Varnish has some built-in invalidation mechanisms to allow applications to forcefully remove objects from the cache. In this webinar we'll talk about: - Purging - Soft purging - Banning - Secondary key

    Download

  • Enhance threat hunting with expanded data and analytics

    The eXtended Threat Hunting (XTH) data module enhances Cortex XDR's visibility, expanding data collection and empowering security teams to detect threats faster and with better precision. Download this solution brief to learn how XTH can supercharge your threat hunting capabilities.

    Download

  • Using Integrated Security to Overcome Adversaries

    Harness comprehensive cloud and email threat intelligence integrated into a single XDR framework with Mimecast, Netskope and Secureworks to streamline your security operations What You’ll Learn: • Simplified investigations and improved threat hunting, detection, and response confidence through a centralized Taegis platform • Email and cloud-borne threat visibility, threat hunting, dashboarding, and cross-telemetry alerting capabilities • Stop sensitive data from being emailed outside of the organization. • Best-in-class shared intelligence preventing future attacks. • Continuously evaluate risk signals with adaptive user policies for applications, data and coaching Speakers: Joseph Tibbetts, Senior Director, Technology Alliances & API, Mimecast David Willis, Head of Technology Integrations, Technology Alliances, Netskope Ryan Alban Director, Global Presales Strategy & Operations, Secureworks

    Download

  • Interactive Document Intelligence With NLP

    Many firms have a large document corpus made up of both digitized and raw images. Now more than ever, financial institutions are turning towards unstructured data sources to capture additional attributes in order to, ultimately, adjust or confirm their analyses and discover new trends and insights. Many organizations rely on individuals to read sections of these documents or search for relevant materials in an ad hoc manner, with no systematic way of categorizing and understanding the information and trends. Join us for this Dataiku session on interactive document intelligence, where we will showcase a modular and reusable pipeline to rapidly and automatically digitize documents, extract text, and consolidate data into a unified and searchable database. We will focus on NLP techniques applied to prepare, categorize, and analyze textual data based on themes of interest (in this project: ESG), with additional theme modules available. Lastly, we will demo a purpose-built dashboard to provide business users with a simple and interactive tool to analyze high-level trends and drill down into aggregated insights.

    Download

  • Alert Management 2.0 with easy onboarding, integrations, and intelligence

    Struggling to manage your digital infrastructure? You need a solution that takes care of the noise while letting you focus on what you do best – solving problems. Explore how Freshservice tackles the challenge in this webinar, the third in the Let's Talk ITOM series. Get a detailed walkthrough of the revamped Alert Management module. Discover the new onboarding flow, the upcoming enhancements in email integrations, and multiple new features that simplify digital operations.

    Download

  • Email Marketing’s Missing Link: Purchase Intent Data

    From A/B testing subject lines to leveraging dynamic content modules, many marketers are already adept at innovating their email campaigns to drive better open and click-through rates. True email effectiveness stems from a marketer’s ability to personalize the messaging to a prospect’s specific technology need. And yet, with email volumes at an all-time high, balancing scale with personalization must be a priority for any GTM team in 2023. Purchase intent data is a missing link in many email marketing playbooks. Join BBD Boom’s Adam Lewis and TechTarget’s Colin Mitchell to learn how intent data can improve the performance of your email campaigns. You’ll hear real examples of how tech companies use intent data in their email marketing campaigns to drive better results and build stronger connections with their buyers.

    Download

  • Email Marketing’s Missing Link: Purchase Intent Data

    From A/B testing subject lines to leveraging dynamic content modules, many marketers are already adept at innovating their email campaigns to drive better open and click-through rates. True email effectiveness stems from a marketer’s ability to personalize the messaging to a prospect’s specific technology need. And yet, with email volumes at an all-time high, balancing scale with personalization must be a priority for any GTM team in 2023. Purchase intent data is a missing link in many email marketing playbooks. Join BBD Boom’s Adam Lewis and TechTarget’s Colin Mitchell to learn how intent data can improve the performance of your email campaigns. You’ll hear real examples of how tech companies use intent data in their email marketing campaigns to drive better results and build stronger connections with their buyers.

    Download

  • CRM Deep-dive

    In this educational session, we will be covering the following topics: - Dashboard Customisation - Entering a File Note - Report Generation - Custom folder generation - Segmentation - Tags - Creating Template (File Notes & Emails) - Email Functionality - Creating Model Portfolios The webinar will run for approximately 45 minutes, with 15 minutes for Q + A. We look forward to having you join us! For improved quality, we recommend adjusting the in-screen settings to 1080p.

    Download

  • OpsRamp Platform Fall 2020 Release

    The OpsRamp Fall 2020 Release delivers a frictionless user experience with rapid onboarding of cloud infrastructure, curated dashboards, expanded support for containerized applications, and new process automation functionality. UX Redesign: The OpsRamp platform delivers a transformed user experience to reduce manual configuration efforts and deliver faster time to metrics for IT operations teams. Curated Dashboards: Auto monitoring includes the creation of dashboards, which comes in a brand-new interface and is built on a new dashboarding model based on the Prometheus Query Language (PromQL). Expanded Container and Cloud Monitoring Support: OpsRamp is extending its cloud native monitoring capabilities to support the detection and monitoring of applications running in containerized workloads. Remediation & Automation: OpsRamp introduces powerful new IT process automation capabilities to save time and improve governance including human interaction for automated workflows and automated workflow monitoring.

    Download

  • Abnormal Demo Day: Watch How We Block Socially-Engineered Attacks

    Email security has evolved as more organizations migrate to the cloud. Abnormal Security has been at the forefront of this evolution, and we want to give you a behind-the-scenes look at how our platform blocks the full spectrum of email attacks. Join us for our August “Abnormal Demo Day,” a new monthly series that highlights key platform features and capabilities designed to address today’s toughest security challenges. Register for our first live Abnormal Demo Day on August 30 and learn how to: - Simplify email security. Understand what threats secure email gateways (SEGs) struggle to detect and block. - Streamline operations. Get an overview of the dashboard and learn how to prevent email attacks with the highest efficacy. We'll save time at the end for Q&A, so bring your questions! Register today!

    Download

  • Optimization Masterclass: improving Python-based workloads in HPC

    With the increasing use of Python-based code in HPC, users can often underestimate what impact Python is having on application performance and how through using modules and libraries, inefficiencies are alleviated. In this masterclass, Solution Architect for Arm, Florent Lebeau, presents new capability in Arm Forge for profiling Python to fully optimize HPC workloads. • Latest diagnostic techniques for determining problematic Python-based codes. • Practical tips for targeting rewrite and optimization work • Effective use of libraries and modules for dealing with inefficient code sections.

    Download

  • Focus on Pensions Dashboards

    Pensions dashboards will transform how people engage with their retirement savings, allowing users to view all their pensions information together in one place. The Pensions Dashboards Programme (PDP) is responsible for delivering the technical solution for dashboards and connecting pension providers and schemes in collaboration with the Government, regulators and industry. Chris Curry, PDP’s Principal, will provide an update on progress and discuss what is coming up. He will cover what pension providers and schemes should be doing to prepare to connect. With the programme having a keen focus on collaboration, Chris will also discuss the various ways for industry to get involved in making a success of dashboards. Lucy Stone, TPR’s programme lead, will outline what TPR expects trustees to do to ensure they meet their duties, who they should be engaging with on their journey to compliance and where to go for help and support.

    Download

  • Application of Data Security in Daily Life

    In this talk, my focus is on the application of data security in our data today's life. Attendees get to learn the security perspective of data and how they can pursue a career in security while continuing their passion for data security. Additionally, we will discuss the different perspectives of data security solutions such as Cloud data security, Web Browser Security, eMail Security, Payments Security, Enterprise Data Protection, Hardware security module, Key management, etc.

    Download

  • Demo - Cymulate Breach and Attack Simulation. Part 2

    Extended BAS modules: WAF, Full Kill-Chain Scenarios, Data Exfiltration, and an overview of custom templates for all modules

    Download

  • New mPulse UI: Creating Dashboards and Widgets

    Akamai's mPulse has a new user interface (UI). You should check it out! It is the beginning of your hassle free experience, customizing dashboards with web performance statistics that you need.

    Download

  • New mPulse UI: Creating Dashboards and Widgets

    Akamai's mPulse has a new user interface (UI). You should check it out! It is the beginning of your hassle free experience, customizing dashboards with web performance statistics that you need.

    Download

  • Abnormal Demo Day: A Red-Hot Recap of 2022

    Cyber threats continue to rise year over year and 2022 was no exception. In fact, cybersecurity remains a top priority for many organizations as increasingly sophisticated security breaches continue to make headlines. Now more than ever, companies are seeking innovative security solutions to protect their sensitive data. Abnormal Security continues to lead the way, developing new features and capabilities to deliver the security that your organization, employees, customers, and supply chain need and deserve. Join us, as we recap the key updates and releases Abnormal delivered in 2022, from technical enhancements to entirely new solutions and partnerships. Some topics we'll cover include: * Email Productivity, an add-on module that helps end-users and administrators manage graymail messages.    * Three Knowledge Bases and Security Posture Management, an add-on to increase visibility into misconfigurations. * Abnormal Intelligence, a go-to resource for expert insights into emerging cyber threats and email attack trends. ...as well as insightful customer feedback and lessons learned directly from the Abnormal community. Register now to hear about our year's incredible highlights!

    Download

  • Quantifying the impact of marketing campaigns on your business using Real Impact

    Your marketing is only as good as you measure. With Real Impact, our measurement dashboard, we show you exactly how and to what extent your marketing campaigns have impacted your business – everything from revenue generated to users retained.

    Download

  • Data Disruptors: Build augmented analytics with NLQ and the power of a question

    With Lumenore’s “Ask Me” Natural Language Query (NLQ) feature, you can ask your data questions in your own language and get clear answers, whether in a dashboard, a chart, an email, or the response of your choice. This powerful augmented analytics capability puts a lot of demands on the underlying infrastructure. Come learn what it does, how it works, how it can democratize analytics in your business, and why Lumenore uses Vertica to power this cutting-edge capability.

    Download

  • Data Disruptors: Build augmented analytics with NLQ &n the power of automation?

    With Lumenore’s “Ask Me” Natural Language Query (NLQ) feature, you can ask your data questions in your own language and get clear answers, whether in a dashboard, a chart, an email, or the response of your choice. This powerful augmented analytics capability puts a lot of demands on the underlying infrastructure. Come learn what it does, how it works, how it can democratize analytics in your business, and why Lumenore uses Vertica to power this cutting-edge capability.

    Download

  • How Cisco Visualizes the Value of Alation with Tableau

    Join experts from Cisco, Tableau, and Tredence to learn how they integrated the Alation Data Catalog with key systems to deliver Tableau dashboards offering insights like: - User engagement, curation progress, and user sentiment - Catalog gaps and user pain points - New ways for Cisco users to find and use the catalog

    Download

  • Exploring Operational Reporting with Opentext's SMAX & iOCO Solutions

    With this being a Dashboards and Reporting Tool Demo Day, iOCO Solutions, being a Platinum partner of Opentext with a number of customer running SMAX as their Service Management Platform, our aim will be to showcase the operational reporting features within the tool itself, with a specific focus on the OData features and capabilities. This tool enables a user to open up their Operational Data to industry leading BI and Dashboarding tools like PowerBI. We will show you how easy it is to extract data out of SMAX and review operational statistics as well as perform trend analysis and dashboarding and distribute to a management level within the organisation. We will also show how easy it is to combine external data sources with SMAX data to add more meaningful insights to your operational data.

    Download

  • Small Bytes: How to create custom network delivery exp dashboards for your NOC

    Small Bytes Episode #11 - The DX NetOps console provides best in breed flexible dashboards and workflows drive world-class Operational usability across networks both big and small. With the recent addition of AppNeta Network Path data, NetOps custom dashboards now provide customizable views into how your networks are connecting your users and applications. Learn how to take advantage of the NetOps custom dashboarding to create Network delivery experience dashboards tailored to your specific needs and use cases. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

    Download

  • Streamline your patient outcomes program with the right approach

    Launching an integrated outcomes program requires seamless integration of EHR modules, IT systems, and clinical workflows. This e-book outlines the technical requirements, workflow engine, and population health management capabilities needed to successfully implement an effective outcomes program. Read the full e-book to learn more.

    Download

  • What is a Hardware Security Module?

    A hardware security module is a dedicated crypto processor, designed to protect the crypto key lifecycle, validated for security by third parties (FIPS 140-2, Common Criteria, PCI HSM, FIPS 201). A hardware security module is a trust anchor. A trust anchor that protects the services we use every day. Things like SSL, DNS, banking and websites. Mobile devices. Smart meters. IoT devices. National identity cards. Credit card data and PINs. Mobile payments. Digital documents. Passports. Blockchain. 5G networks And so much more. Hardware security modules typically are hardware-based or cloud-based. HSMs ensure compliance. Simplify audits. Improve performance. Securely generate and store keys. Hardware security modules are trusted by the most security-conscious companies, agencies, banks, and service providers in the world. Thales Hardware Security Modules are the Foundation of Digital Trust. For more information, visit https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms

    Download

  • Coder Community Call: What's New with Coder January Edition

    Join us for our first Community Call of 2024. We'll dive into the latest Coder news, showcase live demos and more. Don't miss out! We'll talk about: - Tutorial on using modules from the Coder registry - Overview of slackme module and demo - And much more!

    Download

  • Ensuring Sustainable Compliance in a Changing Regulatory Environment - Oracle

    Thales e-Security and Oracle will discuss database security solutions levering encryption and key management for users of Oracle 11g R2. You'll learn about the "standards of due care" and why HSMs (hardware security modules) play an important role in meeting compliance and auditing requirements.

    Download

  • Advance your Power Design with Isolated Current Sensing

    Learn the benefits and practical applications of galvanic isolation amplifier current sensors and modulators. This webinar explains the operating principles with key design considerations, recommendations and electrical parameters in power design systems. Broadcom will introduce its isolation amplifiers and modulators.

    Download

  • Exploring the Essentials: A Guide to Observability Components and Tools

    In this module, Professor Correll discusses Observability Components and Tools. This segment touches on agents and sources, with the general principle being that each source typically associates with one or more dedicated agents. Additionally, the module will explore the significance of logging and monitoring as crucial elements for sustaining peak application performance. The module also addresses topics such as analytics, infrastructure, and concluding with a focus on pipelines and integration. Want to learn more? Download a copy of "Searching Observability Data for Dummies" here: https://cribl.io/resources/searching-observability-data-for-dummies/

    Download

  • UNEP FI Portfolio Impact Analysis Tool for Banks (V3)│Assessment Modules

    During this webinar, we will walk you through the Assessment Modules of the UNEP FI Portfolio Impact Analysis Tool for Banks (V3). Join us to learn how to use the different Modules depending on the scope of your impact analysis and on the year of implementation of your Principles for Responsible Banking (PRB) journey.

    Download

  • UNEP FI Portfolio Impact Analysis Tool for Banks (V3)│Assessment Modules

    During this webinar, we will walk you through the Assessment Modules of the UNEP FI Portfolio Impact Analysis Tool for Banks (V3). Join us to learn how to use the different Modules depending on the scope of your impact analysis and on the year of implementation of your Principles for Responsible Banking (PRB) journey.

    Download

  • UNEP FI Portfolio Impact Analysis Tool for Banks (V3)│Context and Identification

    During this webinar, we will walk you through the Context and Identification Modules of the UNEP FI Portfolio Impact Analysis Tool for Banks (V3). Join us to learn how to use the different Modules depending on the scope of your impact analysis and on the year of implementation of your Principles for Responsible Banking (PRB) journey.

    Download

  • HSMs Decoded: A Complete Guide to Hardware Security Modules and Their Deployment

    Hardware Security Modules (HSMs) are the root of trust for digital applications - get a better understanding of these devices and their deployment strategies. Join this webinar if you want to learn more about the basics of HSMs, the cloud, and how they can become a joint reality! Our speakers Fabian Eidens and Eike Vomberg are looking forward to talking about the use cases of HSMs and answering your questions. Join the session to learn more about: - What are Hardware Security Modules - Use cases for Hardware Security Modules - How HSMs can secure cloud applications - How to deploy HSMs as a service This webinar is for those who want to learn the basics of Hardware Security Modules, as well as HSM enthusiasts who want to learn more about alternative deployment options for HSMs and ways to protect data in the cloud. Discover how you can benefit from the advantages of the cloud, such as flexibility, scalability, and high availability, while still having full control over your cryptographic keys and applications.

    Download

  • CPD: Diversifying income risk

    The objective of this CPD module is to explore ways of diversifying income risk. By completing, this CPD module, you should be able to: A. Explain the definitions of income risk B. Consider the options for mitigating income risk using bonds C. Consider the options for mitigating income risk using equities

    Download

  • CPD: Diversifying income risk

    The objective of this CPD module is to explore ways of diversifying income risk. By completing, this CPD module, you should be able to: A. Explain the definitions of income risk B. Consider the options for mitigating income risk using bonds C. Consider the options for mitigating income risk using equities

    Download

  • Emotet Exposed: Inside the Cybercriminals’ Supply Chain

    In this new analysis, we’ll delve deep into the most recent waves of the Emotet botnet, providing never-before-seen insights into the malware delivery mechanism’s malicious components and modules, its execution chains and its software development lifecycle.   In this webcast, we will reveal: • Emotet’s infection chain process • Its command-and-control network infrastructure and software development life cycle • How to create Emotet sock puppets for fetching modules and extracting its recently updated configuration • An analysis of two recently updated modules that differ from previous Emotet attacks • Tips and recommendations for mounting a more ironclad defense

    Download

  • Simplifying IT Dashboards & Reporting with NinjaOne: Empowering IT Management

    Join York at the SDI Dashboards and Reporting Day as he unveils the transformative capabilities of intelligent dashboards. With a focus on enhancing visibility, streamlining helpdesk operations, enabling proactive management, and bolstering cybersecurity, York's session will demonstrate how these dashboards empower IT teams to react swiftly, optimize efficiency, and drive impactful decision-making. Gain insights into the synergy of dashboards and remediation, and discover how this integration can further amplify operational efficiency and problem resolution. Don't miss this opportunity to harness the potential of intelligent dashboards and revolutionize your organization's approach to data-driven insights.

    Download

  • Automating Remediation, Qualys Patch Management Best Practices

    Join us for our regularly scheduled Qualys Technical Series. With the introduction of Patch Management a few years ago, Qualys customers were presented with the opportunity to not only continuously detect vulnerabilities on their assets, but then to automatically remediate them as well. However, as new features have been added, some customers may not be leveraging these to their full extent, and are still performing manual tasks that could be automated. In this Qualys Technical Series, we'll cover key themes around using Patch Management efficiently, followed by a live demo, including: • The various different entry points for using patch management according to your workflow. • QQL examples to automatically select and apply patches to match policy, over current practices • Fitting Patch Management into existing workflows, including how to build exceptions into these • Examples of useful, actionable dashboards that you can employ for efficiently tracking patch progress • Other applications for the Patch Management module, such as custom scripting and software installation • Addressing 0days when no patch is available We hope you join us!

    Download

  • How to build Kibana Dashboards in a few minutes

    Build beautiful and interactive Kibana Dashboards in just minutes. Learn how to rapidly analyze data using Kibana Lens and then iterate and expand on existing visualizations to build out robust analyses - all with just a mouse. Highlights: - Live demonstration of Kibana and building both charts and dashboards - Quickly and easily create meaningful visualizations in Kibana Lens - Tips and tricks for improving dashboard interactivity - Navigating between dashboards with drill-downs

    Download

  • Updated Subscription Health Dashboard: Tracking Deployments and Ensuring Best Practices in Qualys

    In today’s rapidly evolving cybersecurity landscape, maintaining the health of your Qualys deployments is more critical than ever. Issues such as duplicate asset entries, potential ghost hosts, and decommissioned devices get in the way. Ensuring clean and reliable asset data is paramount for robust security and compliance.   On November 21st , join Colton Pepper and Anthony Williams, VMDR Subject Matter Expert, as we unveil the latest updates to the Qualys Subscription Health Dashboard. This enhanced tool is designed not only to optimize your Vulnerability Management (VM) deployments but also streamlines operations across other Qualys capabilities, including Policy Compliance, File Integrity Monitoring, Endpoint Detection Response, general Cloud Agent tracking, and more!   Learn how these updates empower your teams to quickly identify and resolve issues that can hinder data cleanliness and operational efficiency in the Qualys Enterprise TruRisk Platform!   Join this live event to gain insights on: 1. The latest advancements in the Subscription Health Dashboard for optimizing your Qualys deployments across multiple modules. 2. How to quickly pinpoint and resolve issues like ghost hosts and duplicate entries to enhance data integrity. 3. Best practices for maintaining clean, reliable, and scalable asset data to ensure robust security and compliance across your Qualys Platform ecosystem.   Don’t miss this opportunity to elevate your Qualys deployment-game! Register now!

    Download

  • Streamsheets and Apache Kafka – Interactively build real-time Dashboards and Str

    A powerful stream processing platform and an end-user friendly spreadsheet-interface, if this combination rings a bell, you should definitely attend our 'Streamsheets and Apache Kafka' webinar. While development is interactive with a web user interface, Streamsheets applications can run as mission-critical applications. They directly consume and produce event streams in Apache Kafka. One popular option is to run everything in the cloud leveraging the fully managed Confluent Cloud service on AWS, GCP or Azure. Without any coding or scripting, end-users leverage their existing spreadsheet skills to build customized streaming apps for analysis, dashboarding, condition monitoring or any kind of real-time pre-and post-processing of Kafka or KsqlDB streams and tables. Hear Kai Waehner of Confluent and Kristian Raue of Cedalo on these topics: • Where Apache Kafka and Streamsheets fit in the data ecosystem (Industrial IoT, Smart Energy, Clinical Applications, Finance Applications) • Customer Story: How the Freiburg University Hospital uses Kafka and Streamsheets for dashboarding the utilization of clinical assets • 15-Minutes Live Demonstration: Building a financial fraud detection dashboard based on Confluent Cloud, ksqlDB and Cedalo Cloud Streamsheets just using spreadsheet formulas.

    Download

  • Streamsheets and Apache Kafka – Interactively build real-time Dashboards and Str

    A powerful stream processing platform and an end-user friendly spreadsheet-interface, if this combination rings a bell, you should definitely attend our 'Streamsheets and Apache Kafka' webinar. While development is interactive with a web user interface, Streamsheets applications can run as mission-critical applications. They directly consume and produce event streams in Apache Kafka. One popular option is to run everything in the cloud leveraging the fully managed Confluent Cloud service on AWS, GCP or Azure. Without any coding or scripting, end-users leverage their existing spreadsheet skills to build customized streaming apps for analysis, dashboarding, condition monitoring or any kind of real-time pre-and post-processing of Kafka or KsqlDB streams and tables. Hear Kai Waehner of Confluent and Kristian Raue of Cedalo on these topics: • Where Apache Kafka and Streamsheets fit in the data ecosystem (Industrial IoT, Smart Energy, Clinical Applications, Finance Applications) • Customer Story: How the Freiburg University Hospital uses Kafka and Streamsheets for dashboarding the utilization of clinical assets • 15-Minutes Live Demonstration: Building a financial fraud detection dashboard based on Confluent Cloud, ksqlDB and Cedalo Cloud Streamsheets just using spreadsheet formulas.

    Download