
Diverse Hybrid Microservice Patterns Will Drive Service Mesh Specialization
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
Distributed systems are hard to do well, and microservices are even harder. As an important step toward enabling mainstream developers to be successful, service mesh technology has carved out a place in the microservices landscape. There’s a lot of dust covering the service mesh landscape, and there are more enterprises trying one out than using one in production, but sooner or later, you’ll need a service mesh for your microservices platform. In this webinar, Forrester lays out what a service mesh can and cannot do, walks through the developing technology, and sets a foundation for planning when and how to use a service mesh.
Key takeaways:
Vendors mentioned: Amazon Web Services, Buoyant, Containous, Decipher Technology Studios, F5 Networks, Google, HashiCorp, IBM, Kong, Layer5.io, Pivotal, Red Hat, Solo.io, and VMware
Target audience level: intermediate and advanced
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
Customer-obsessed organizations have a future fit technology strategy that enables adaptivity, creativity, and resilience — and cybersecurity is a critical part of that strategy. It’s impossible to have a great technology organization without a great security organization, and future fit tech firms demonstrate this by scoring higher on Forrester’s cybersecurity and privacy maturity assessment than their less-tech-mature peers.Join us as we talk about the relationship between future fit tech organizations and their security teams. In this moderated discussion, we’ll cover security maturity, the evolution of security priorities, and characteristics of future fit CISOs.Key takeaways:Explore the relationship between future fit tech maturity and cybersecurity maturity.Learn about security priorities that are particularly important to traditional tech, modern tech, and future fit firms.Understand how the customer-facing CISO aligns with future fit tech maturity.Target audience level: beginner
This webinar was originally scheduled for March 7, 2023.In this webinar, we look at how to develop a more impactful knowledge management (KM) practice that will help your organization drive innovation and learning through both explicit (easy to document) and tacit (experience-based) knowledge. We cover agile knowledge management model, knowledge capacity building model, and storytelling with practical advice on developing and leading knowledge-sharing change.Key takeaways:Understand agile vs. waterfall knowledge management practices.Gain a holistic view of what it takes to make KM successful.Target audience level: intermediate
This webinar shows attendees how to optimize Forrester’s research and resources when evaluating and selecting a value stream management (VSM) platform.Key takeaways:Explore a list of the key players in the VSM market.Learn how to maximize Forrester’s research and resources, particularly the recent VSM Wave, to identify the right VSM platform for your organization.Vendors: Atlassian, Broadcom, CloudBees, ConnectALL, Digital.ai, GitLab, Harness, HCLSoftware/IBM, Jellyfish, Micro Focus, Planview, Plutora, ServiceNow, ZenhubTarget audience level: all levels
Identity verification (IDV) is becoming the key building block of customer identity and access management (IAM). Checking the veracity of onboarded customers helps avoid regulatory fines and sanctions as well as fraud losses.Key takeaways:High-growth areas in IDVNew trends in IDVBest practices in implementing IDVTarget audience level: intermediate and advanced
Enterprise architecture is an important organizational interlock for security teams. To help better understand this, Vice President, Research Director Charlie Betz and Senior Analyst Carlos Rivera walk us through their research on the opportunities for collaboration between enterprise architecture and security to help security professionals better understand what the crossover is and what CISOs need to know to have a collaborative partnership. In this fireside chat, we identify links between Charlie’s research on enterprise architecture with the priorities of the security organization.Key takeaways:How enterprise architecture can help support the security teamHow security can help support enterprise architectureHow enterprise architecture can be an important stakeholder in Zero TrustTarget audience level: intermediate
Service meshes and API management seem similar at first glance — what’s the difference? This webinar explains the different problems they solve and how each fulfills a different role in your IT architecture.Key takeaways:Learn what a service mesh is.Understand how service mesh differs from API management.Learn the value proposition that service mesh offers and its most valuable use case.Hear some future developments for service mesh.Target audience level: beginner