06 May, 2017, 13:07 ET
ARMONK, N.Y., May 6, 2017 /PRNewswire/ -- IBM (NYSE: IBM) will host several sessions and present booth demonstrations at Interop ITX in Las Vegas on May 15-19, 2017. This event will provide technology leaders with the latest developments and strategies for unified endpoint management, cognitive capabilities, IoT, cloud computing, and Big Data.
The Interop ITX Conference offers five days of world-class education, compelling speakers, and unlimited networking opportunities to help technology leaders keep up with the challenges and drive their businesses forward.
IBM MaaS360 will present a cognitive approach to unified endpoint management (UEM) at Booth 238 in the Business Hall on May 16-18.
Individual sessions will include:
Session: "Securing Tomorrow's Data: Cloud, IoT, Big Data & Cognitive"
Speaker: Diana Kelley, Global Executive Security Advisor, IBM
Location: Room 112
Timing: Monday, May 15, 1:00-1:45pm
Session: "Build Higher Value in your Business and Solutions with IBM Cloud"
Speaker: Jorge Ros, Global Bluemix Commercial & CSP Leader, IBM Hybrid Cloud
Location: Room 106
Timing: Wednesday, May 17, 10:30-11:30am
Session: "Introducing a Cognitive Approach to Unified Endpoint Management"
Speaker: Brandon Carter, Major Accounts Specialist, IBM MaaS360
Location: Interop ITX Theater
Timing: Thursday, May 18, 11:00-11:15am
Location: MGM Grand, 3799 S Las Vegas Blvd, Las Vegas, NV, 89109
Those interested in attending can visit the Interop ITX site for more details.
About IBM Security
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world's broadest security research, development and delivery organizations, monitors 35 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.
Share this article