Hi [[ session.user.profile.firstName ]]
Sort by:
    • NAC-as-a-Service: What, Why and How
      NAC-as-a-Service: What, Why and How Charles Weaver, Chris Rodriguez, Ade Omo, Kurt Buckardt, Dale Tesch, William Chitty Recorded: Oct 18 2012 4:00 pm UTC 62 mins
    • Driven by business requirements for greater network resource accessibility, increased security automation and the demand to secure “bring your own device” (BYOD) and “choose your own device (CYOD), the next IT security service opportunity set for growth is network access control (NAC). What are the real-world reasoning, considerations and opportunity with regards to expanding security managed/hosted services with NAC. This expert/practitioner panel will discuss the value, options and impact of adding NAC to your service portfolio.
      Topics include:
      - What is NAC, why NAC, why now
      - What is the business value for the customer and service provider
      - What are common NAC service, deployment and implementation options
      - What are key SLA development and operational process considerations
      - How to package NAC, price out the service and combine with other security services

      Read more >
    • Getting Through the Compliance Maze with NAC
      Getting Through the Compliance Maze with NAC Diana Kelly, IANS Faculty Advisor and Founder of SecurityCurve; Jeff Bradberry – BrightPoint - Manager, IT Security Recorded: May 22 2012 5:00 pm UTC 41 mins
    • Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NER, FFIEC, HIPAA/HITECH and PCI-DSS are the new normal. To stay in compliance, IT teams need to be able to keep up with updates and changes to existing mandates and be prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement tools that apply and support multiple facets across different compliance specifications. Network Access Control (NAC) supports numerous critical security and protection functions across multiple mandates.

      This interactive expert / user session, led by IANS faculty advisor Diana Kelly of Security curve with end user participant Jeff Bradberry of BrightPoint, will examine NAC and real-world compliance use cases. Using ForeScout CounterACT as an example, attendees will discover:

      - How NAC works
      - Key NAC functions that apply to compliance processes and specifications
      - Real-world use cases; considerations, controls, activities and processes; and
      - How NAC specifically maps to top commercial, regulatory and federal mandates.

      Read more >
    • 通过能见度改变网络安全
      通过能见度改变网络安全 主讲人:王睿 Forescout 系统工程师 Upcoming: Nov 16 2017 2:00 am UTC 60 mins
    • 通过可视性 改变网络安全
      大家是否都觉得黑客们拥有攻无不克的能力呢?尽管我们在网络安全的投入不断增加,然而
      我们还是看到网络攻击和数据泄露事件越来越多。 因此我们必须增强网络安全,如何才能做到呢?欲要加强我们的网络安全,先从可视性开始。在我们的讲座里,您会更加了解我们Forescout如果通过加强公司内网,园区,数据中心,还有云端网络的可视性去实现:

      •100% 可视。在极短的时间内,不依靠终端软件发现所有的网络设备。这些包括: managed devices, BYOD, IoT, OT, 甚至是VM。 当以上设备一接入网络即可发现,并且实时监控。
      •可控。按照公司的网络安全策略及其设备的属性和状态进行自动化准入管控。自动修复高安全风险设备。
      •联动。与您现在已有的安全设备共享实时数据有效监控所有网络设备。

      Read more >
    • Network Access Control 101: Secure the Critical Edge of Your Network
      Network Access Control 101: Secure the Critical Edge of Your Network Tom Murphy, CMO, Bradford Networks Recorded: Jun 2 2015 5:00 pm UTC 41 mins
    • As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."

      As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.

      Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:

      - Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
      - Device Profiling – Identifies and classifies every device on the network to provide greater visibility
      - Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
      - Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
      - Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
      - Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices

      Read more >
    • Transformation für mehr Sicherheit durch Sichtbarkeit
      Transformation für mehr Sicherheit durch Sichtbarkeit Kristian von Mejer, Strategic Account Director – Germany Recorded: Feb 16 2017 3:00 pm UTC 42 mins
    • Kommt es Ihnen so vor, als hätten die Angreifer den Vorteil zunehmend auf ihrer Seite? Es gibt immer öfter Berichte über erfolgreiche Cyberattacken und Datenverluste, obwohl die Ausgaben für Sicherheitsmechanismen ebenfalls steigen. Der Schutz muss verbessert werden und dabei ist der erste Schritt mehr Visibilität.
      In unserem Webinar zum Thema Transformation für mehr Sicherheit durch Sichtbarkeit zeigen wir Ihnen, wie Sie in drei Schritten Ihr Netzwerk sicherer machen:

      • See: Erkennen Sie jedes Endgerät, sobald es sich mit dem Netzwerk verbindet. Dabei spielt es keine Rolle, ob Firmengerät, BYOD oder Endpunkte aus dem Internet der Dinge (IoT) – alle Devices werden ohne den Einsatz von Agenten erkannt
      • Control: Verwalten Sie Netzwerkzugriffsrechte für Gerätegruppen auf Basis von festgelegten Sicherheitsrichtlinien. Zudem können kritische Endpunkte automatisch bewertet und gesichert werden
      • Orchestrate: Teilen Sie Informationen mit bestehenden Sicherheitslösungen und automatisieren Sie Arbeitsprozesse durch die Extended Modules von ForeScout

      Read more >
    • The Internet of Things Requires a Security Rethink
      The Internet of Things Requires a Security Rethink Zeus Kerravala, Founder and Principal Analyst at ZK Research Recorded: Sep 6 2016 6:00 pm UTC 44 mins
    • The IoT Is Making Status Quo Network Security Obsolete

      The number of devices in the Internet of Things (IoT) category is exploding—adding billions of devices to networks every year that lack native security capabilities. Please join us as ZK Research Founder and Principal Analyst Zeus Kerravala discusses the Internet of Things and suggests ways to deal with IoT-related security challenges, including:
      • Why traditional perimeter defenses are no longer relevant and how IoT devices can circumvent conventional firewalls
      • The lack of IT and OT alignment—a major issue given that the IoT connects everything to a common network
      • The role agentless visibility and control play in finding, classifying and securing network-attached IoT devices

      Read more >
    • Resolving IT-GRC control challenges in the frenetic enterprise
      Resolving IT-GRC control challenges in the frenetic enterprise David King, OMG; Ritesh Patel, BP Intl; & Scott Gordon, ForeScout Technologies Recorded: Feb 19 2013 4:00 pm UTC 74 mins
    • Security and governance are not natural bedfellows - but they need to be drawn together to achieve best practice standards, and, of course, regulatory compliance.

      The reality is that modern network, device, user, application and access dynamics are challenge for any IT security professional.

      You've probably built-out process and controls to address these issues - you also invested heavily in network and host-based security, systems management, SIEM and other security mechanisms. But the reality is that new threats and state changes will cause you security headaches.

      This Webinar can help you...

      During this 60-minute expert session, you'll:

      Learn where Network Access Control (NAC) sits in the enterprise security mix...

      Understand how NAC can help you close real-time security and compliance gaps - and automate IT responses...

      Gain an insight into common IT Governance Risk & Compliance (GRC) assumptions and exposures...

      Develop a strategy to reduce access and endpoint integrity exposures...

      Learn about real-world NAC implementations...

      Read more >
    • How to improve network visibility and ease IT frustration
      How to improve network visibility and ease IT frustration Neela Sambandam Recorded: Aug 31 2016 6:00 pm UTC 43 mins
    • Today’s new generation of mobile-centric users and the sheer number of authentications due to mobility is driving the need for better visibility into who and what is on the network.

      Join Neela Sambandam, ClearPass Product Manager, to learn how the Insight reporting package within the ClearPass solution gives you:
      •Unsurpassed views into the users, devices and connections on your network
      •An easy-to-use dashboard and analytics engine
      •Triggered alerts based on pre-defined metrics
      •Improved reporting with pre-configured templates

      Learn how ClearPass Insights can improve network performance and user experience, as well as about future enhancements.

      Read more >
    • Supporting CIS Critical Security Controls with ForeScout
      Supporting CIS Critical Security Controls with ForeScout Darrell Kesti, Account Manager & Dean Kratzer, Senior Product Marketing Manager, ForeScout Technologies Recorded: Sep 7 2016 6:00 pm UTC 33 mins
    • The Center for Internet Security has defined required controls for effective cyber defense (CIS Critical Security Controls). How do they relate to your security initiatives? Why is endpoint security and control such a major focal point of SANS security? How does the Internet of Things (IoT) impact you cybersecurity strategy?

      Join ForeScout's Darrell Kesti, and Dean Kratzer, ForeScout’s Senior Product Marketing Manager, as they discuss how ForeScout CounterACT® can help you create an effective cyber defense system. Discover how agentless cybersecurity technology and ForeScout’s See, Control and Orchestrate solution can accelerate this process with quick wins in the first 4 steps of this multistep process:

      1. Inventory of authorized and unauthorized devices
      2. Inventory of authorized and unauthorized software
      3. Secure configurations for hardware and software on mobile devices, laptops, workstations and servers
      4. Continuous vulnerability assessment and remediation

      Read more >
    • An Unvarnished Assessment of ForeScout Visibility
      An Unvarnished Assessment of ForeScout Visibility Robert Smithers, Miercom President and CEO Recorded: Aug 4 2016 6:00 pm UTC 50 mins
    • When a disruptive technology emerges, it is often met with skepticism. A good case in point is ForeScout CounterACT®. It’s gaining a lot of traction in cybersecurity circles, with more than 2,000 large and medium enterprises and government agencies worldwide using the product as of April 2016. But for those IT professionals who might think its capabilities are too good to be true, ForeScout enlisted Miercom, a leading independent testing and consultancy, to provide unbiased, hands-on testing of CounterACT capabilities. Miercom’s findings are what this webinar is all about.
      Please join us as Miercom President and CEO Rob Smithers talks about his lab’s findings with regard to CounterACT’s:

      • Visibility (discovery, classification and compliance assessment) of network-connected corporate, BYOD, guest and IoT endpoints without use of agents or previous device knowledge
      • Detection and full classification of hundreds of endpoints in seconds
      • Policy-based control of devices by enabling IT staff to grant the appropriate level of network access to people, applications and devices
      • Ability to integrate with leading network infrastructure and endpoint protection technologies

      Read more >