Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
As large and heterogeneous enterprises reach greater SOA maturity, Enterprise Architecture professionals often find that different business areas or domains need different things from an enterprise-level SOA platform. Accommodating these requirements may require architects to segment their SOA platform strategy and build in an extra level of interoperability and federation between different SOA domains. SOA platform federation may be driven by heterogeneity of SOA infrastructure and products across domains but can also occur in a homogeneous platform that is configured differently for each domain. Enterprise Architecture professionals should separate true business requirements from accidents of history that may reflect weak architectural governance, decide which patterns of interoperability and federation are truly necessary, and then expand the SOA platform strategy to accommodate these requirements.
Agenda:
Vendors mentioned: IBM, HP, Microsoft, Oracle/BEA, Progress Software, Software AG, and TIBCO
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
Enterprise architecture is an important organizational interlock for security teams. To help better understand this, Vice President, Research Director Charlie Betz and Senior Analyst Carlos Rivera walk us through their research on the opportunities for collaboration between enterprise architecture and security to help security professionals better understand what the crossover is and what CISOs need to know to have a collaborative partnership. In this fireside chat, we identify links between Charlie’s research on enterprise architecture with the priorities of the security organization.Key takeaways:How enterprise architecture can help support the security teamHow security can help support enterprise architectureHow enterprise architecture can be an important stakeholder in Zero TrustTarget audience level: intermediate
So, your enterprise wants to become data-driven. You can implement the best data platforms, hire great people, and use the most sophisticated analysis techniques, but it’s all for naught if faulty analysis and human cognitive biases get in the way. The result? Poor business insights and data-driven decisions. Join this webinar to learn about seven data analysis failures to avoid. How many of these seven do you and/or your organization succumb to?Key takeaways: How human cognitive biases can lead to poor data analysis Seven data analysis failures to avoid (or exploit) Target level audience: beginner and intermediate
Cloud workload security (CWS) — including cloud security posture management, container security, and cloud workload protection — plays a very important role in migrating and maintaining security for cloud workloads. This webinar provides a market overview and high-level best practices for CWS deployment. Key takeaways: Get an overview of Forrester's cloud workload security evaluation. Review vendor profiles. Learn best practices. Discover Forrester’s predictions. Target audience level: beginner and intermediate