For our premium content subscribers

Videos

The End of EA as We Know IT

“Enterprises must become more dynamic and flexible, focusing on enabling disruptive improvements or risk enterprise IT rapidly becoming totally out of alignment with the needs of the business.

– John Mellars, TVR Principal Consulting Analyst

Recorded on July 28, 2016

 

Click to play

1

Banking on Blockchain

“The primary goal for most Bankers these days is regulatory compliance closely followed by cost reduction. And it is in light of both of these that I saw huge potential in Blockchain

– Rhomaios Ram, TVR Principal Consulting Analyst

Recorded on April 25, 2017

 

Click to play

1

The Future of Identity Management

“Identity and Access Management is the lifeblood of digital transformation. If your IAM strategy is not successful, your transformation cannot succeed.” 

– Gary Rowe, TVR CEO / Principal Consulting Analyst

Recorded on May 3, 2018

 

Click to play

1

Zero Trust Networking

“The foundation of great IT security starts at the network. Once the IP network is compromised, malicious actors can use it to discover, identify, and target the digital assets of an organization. With more attacks originating from within organizations while external breaches continue to also expand, TechVision Research recommends enterprises and government agencies consider adopting a Zero Trust Networking (ZTN) approach.

– Sorell Slaymaker, TechVision Principal Consulting Analyst

Recorded on 21 February, 2019

 

Click to play

1

Multi-factor Authentication

“Multi-factor authentication is based on the premise that traditional, single factor authentication schemes (like IDs and passwords) are relatively easy to break and as threats escalate, simply not good enough.

– Doug Simmons, TechVsion Principal Consulting Analyst

Recorded on April 25, 2019

 

Click to play

1

A Multi-cloud Security Reference Architecture

“Organizations need tools to identity their business security context, select and prioritize security-related processes and functional or technical capabilities, and put them into operation. The TechVision Research Security Reference Architecture identifies many security-related processes Security Reference Architecture  and technology capabilities, puts them into a business and IT context. 

– Dan Blum, TechVsion Principal Consulting Analyst

Recorded on August 19, 2021

 

Click to play

1
 

 

© 2016 All Rights Reserved

We can help

If you want to find out more detail, we're happy to help. Just give us your business email so that we can start a conversation.

Thanks, we'll be in touch!

Stay in the know!

Keep informed of new speakers, topics, and activities as they are added. By registering now you are not making a firm commitment to attend.

Congrats! We'll be sending you updates on the progress of the conference.