Purchase Webinar
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Get access to a single webinar that is currently outside of your subscription.
Price: $250 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
As enterprises try to compete more effectively in an increasingly competitive marketplace, they face a complex set of requirements for supporting their integration needs. The traditional approach to meeting these needs has been to assemble a set of best-of-breed products. However, comprehensive products like integration-centric BPM tools (IC-BPMS's) provide extensive integration features that cover enterprise application integration (EAI), B2B integration (B2Bi), business process management (BPM), and service-oriented architecture (SOA). And many have pre-integrated components out of the box, thereby reducing implementation and on-going maintenance expenses.
Evaluation of the competing IC-BPMS products is a complicated endeavor in its own right because the products have varying capabilities in each of the key functional areas. This session explores the key features that Forrester has identified as being critical to effectively comparing products in this category and provides guidance to clients on how to select the specific tool that is the most appropriate for their situation.
Agenda:
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
This webinar shows attendees how to optimize Forrester’s research and resources when evaluating and selecting a value stream management (VSM) platform.Key takeaways:Explore a list of the key players in the VSM market.Learn how to maximize Forrester’s research and resources, particularly the recent VSM Wave, to identify the right VSM platform for your organization.Vendors: Atlassian, Broadcom, CloudBees, ConnectALL, Digital.ai, GitLab, Harness, HCLSoftware/IBM, Jellyfish, Micro Focus, Planview, Plutora, ServiceNow, ZenhubTarget audience level: all levels
Enterprise architecture is an important organizational interlock for security teams. To help better understand this, Vice President, Research Director Charlie Betz and Senior Analyst Carlos Rivera walk us through their research on the opportunities for collaboration between enterprise architecture and security to help security professionals better understand what the crossover is and what CISOs need to know to have a collaborative partnership. In this fireside chat, we identify links between Charlie’s research on enterprise architecture with the priorities of the security organization.Key takeaways:How enterprise architecture can help support the security teamHow security can help support enterprise architectureHow enterprise architecture can be an important stakeholder in Zero TrustTarget audience level: intermediate
In 2022, Web3 frequently dominated the headlines for all the wrong reasons. Leaving aside the travails of centrally controlled entities, hardly a day went by without some form of exploit that resulted in (sometimes considerable) funds being exfiltrated from protocols and services running on public blockchains. Fundamental Web3 design and governance issues also had unwanted side effects. This matters, even if Web3 or decentralized finance (DeFi) as such aren't on your agenda for 2023: Any enterprise engaged in, or planning, NFT-related activities may end up suffering the consequences of basic security deficiencies.Key takeaways:Hear about the most serious security breaches of 2022 and what caused them.Learn what you can do to prevent such incidents, or at least mitigate the consequences.Understand why Web3 won’t succeed unless there's a step change in how process designers and developers approach security. Target audience level: beginner and intermediate