IBM Experts Present New Industry Strategies at Interop ITX in Las Vegas

ARMONK, NY – 06 May 2017: IBM (NYSE: IBM) will host several sessions and present booth demonstrations at Interop ITX in Las Vegas on May 15-19, 2017. This event will provide technology leaders with the latest developments and strategies for unified endpoint management, cognitive capabilities, IoT, cloud computing, and Big Data.

The Interop ITX Conference offers five days of world-class education, compelling speakers, and unlimited networking opportunities to help technology leaders keep up with the challenges and drive their businesses forward.

IBM MaaS360 will present a cognitive approach to unified endpoint management (UEM) at Booth 238 in the Business Hall on May 16-18.

Individual sessions will include:

Session:Securing Tomorrow’s Data: Cloud, IoT, Big Data & Cognitive

Speaker: Diana Kelley, Global Executive Security Advisor, IBM

Location: Room 112

Timing: Monday, May 15, 1:00-1:45pm

Session:Build Higher Value in your Business and Solutions with IBM Cloud

Speaker: Jorge Ros, Global Bluemix Commercial & CSP Leader, IBM Hybrid Cloud

Location: Room 106

Timing: Wednesday, May 17, 10:30-11:30am

Session:Introducing a Cognitive Approach to Unified Endpoint Management

Speaker: Brandon Carter, Major Accounts Specialist, IBM MaaS360

Location: Interop ITX Theater

Timing: Thursday, May 18, 11:00-11:15am

Location: MGM Grand, 3799 S Las Vegas Blvd, Las Vegas, NV, 89109

Those interested in attending can visit the Interop ITX site for more details.

About IBM Security

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 35 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

Leave a Reply

Your email address will not be published.