Defending Against the Rogue: Technology Solutions to Address unwanted Users, Devices and Applications

Click here to register

Date: 14th October 2014 
Time: 2:00 p.m. - 3:00 p.m. BST

Securing your network against unwanted and unknown threats has become mission critical. Many organisations, however are in the dark as to what is on their network – making it impossible to control access and mitigate risk. This webinar will feature new research in a Bloor Research report by Fran Howarth, which looks at how next-generation NAC technologies have become essential tools in the security arsenal for preempting rogue user, device and application riska and ensuring that sensitive data is kept safe. Fran will be joined by ForeScout Systems Engineer Manager, Toni Buhrke, who will demonstrate how next-generation NAC provides the visibility and controls required to secure corporate networks secure against rogue devices.

Attendees will learn how:

  • Next-generation NAC technologies provide visibility across the network to ensure that rogue devices, applications and users are brought under control and security issues efficiently resoled.
  • Continuous monitoring allows organizations to ensure network access and endpoint compliance policies are always enforced
  • Integration with other security tools – wireless, MDM, security, SIEM, and advanced threat detection provide actionable security intelligence.
  • Centralized management ensures implementations can be effectively manage and policies enforced.

Speakers:  

Fran Howarth, Senior Analyst, Security, Bloor Research

Toni Buhrke, MBA CISSP, Systems Engineer Manager, Forescout 


Sponsor: 

Sign up to our newsletters