Hi [[ session.user.profile.firstName ]]
Sort by:
    • NAC-as-a-Service: What, Why and How NAC-as-a-Service: What, Why and How Charles Weaver, Chris Rodriguez, Ade Omo, Kurt Buckardt, Dale Tesch, William Chitty Recorded: Oct 18 2012 4:00 pm UTC 62 mins
    • Driven by business requirements for greater network resource accessibility, increased security automation and the demand to secure “bring your own device” (BYOD) and “choose your own device (CYOD), the next IT security service opportunity set for growth is network access control (NAC). What are the real-world reasoning, considerations and opportunity with regards to expanding security managed/hosted services with NAC. This expert/practitioner panel will discuss the value, options and impact of adding NAC to your service portfolio.
      Topics include:
      - What is NAC, why NAC, why now
      - What is the business value for the customer and service provider
      - What are common NAC service, deployment and implementation options
      - What are key SLA development and operational process considerations
      - How to package NAC, price out the service and combine with other security services

      Read more >
    • Getting Through the Compliance Maze with NAC Getting Through the Compliance Maze with NAC Diana Kelly, IANS Faculty Advisor and Founder of SecurityCurve; Jeff Bradberry – BrightPoint - Manager, IT Security Recorded: May 22 2012 5:00 pm UTC 41 mins
    • Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NER, FFIEC, HIPAA/HITECH and PCI-DSS are the new normal. To stay in compliance, IT teams need to be able to keep up with updates and changes to existing mandates and be prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement tools that apply and support multiple facets across different compliance specifications. Network Access Control (NAC) supports numerous critical security and protection functions across multiple mandates.

      This interactive expert / user session, led by IANS faculty advisor Diana Kelly of Security curve with end user participant Jeff Bradberry of BrightPoint, will examine NAC and real-world compliance use cases. Using ForeScout CounterACT as an example, attendees will discover:

      - How NAC works
      - Key NAC functions that apply to compliance processes and specifications
      - Real-world use cases; considerations, controls, activities and processes; and
      - How NAC specifically maps to top commercial, regulatory and federal mandates.

      Read more >
    • Network Access Control 101: Secure the Critical Edge of Your Network Network Access Control 101: Secure the Critical Edge of Your Network Tom Murphy, CMO, Bradford Networks Recorded: Jun 2 2015 5:00 pm UTC 41 mins
    • As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."

      As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.

      Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:

      - Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
      - Device Profiling – Identifies and classifies every device on the network to provide greater visibility
      - Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
      - Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
      - Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
      - Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices

      Read more >
    • Resolving IT-GRC control challenges in the frenetic enterprise Resolving IT-GRC control challenges in the frenetic enterprise David King, OMG; Ritesh Patel, BP Intl; & Scott Gordon, ForeScout Technologies Recorded: Feb 19 2013 4:00 pm UTC 74 mins
    • Security and governance are not natural bedfellows - but they need to be drawn together to achieve best practice standards, and, of course, regulatory compliance.

      The reality is that modern network, device, user, application and access dynamics are challenge for any IT security professional.

      You've probably built-out process and controls to address these issues - you also invested heavily in network and host-based security, systems management, SIEM and other security mechanisms. But the reality is that new threats and state changes will cause you security headaches.

      This Webinar can help you...

      During this 60-minute expert session, you'll:

      Learn where Network Access Control (NAC) sits in the enterprise security mix...

      Understand how NAC can help you close real-time security and compliance gaps - and automate IT responses...

      Gain an insight into common IT Governance Risk & Compliance (GRC) assumptions and exposures...

      Develop a strategy to reduce access and endpoint integrity exposures...

      Learn about real-world NAC implementations...

      Read more >
    • An Unvarnished Assessment of ForeScout Visibility An Unvarnished Assessment of ForeScout Visibility Robert Smithers, Miercom President and CEO Upcoming: Aug 4 2016 6:00 pm UTC 60 mins
    • When a disruptive technology emerges, it is often met with skepticism. A good case in point is ForeScout CounterACT®. It’s gaining a lot of traction in cybersecurity circles, with more than 2,000 large and medium enterprises and government agencies worldwide using the product as of April 2016. But for those IT professionals who might think its capabilities are too good to be true, ForeScout enlisted Miercom, a leading independent testing and consultancy, to provide unbiased, hands-on testing of CounterACT capabilities. Miercom’s findings are what this webinar is all about.
      Please join us as Miercom President and CEO Rob Smithers talks about his lab’s findings with regard to CounterACT’s:

      • Visibility (discovery, classification and compliance assessment) of network-connected corporate, BYOD, guest and IoT endpoints without use of agents or previous device knowledge
      • Detection and full classification of hundreds of endpoints in seconds
      • Policy-based control of devices by enabling IT staff to grant the appropriate level of network access to people, applications and devices
      • Ability to integrate with leading network infrastructure and endpoint protection technologies

      Read more >
    • Network Access Control 101: Securing the Critical Edge of Your Network Network Access Control 101: Securing the Critical Edge of Your Network Tom Murphy, CMO, Bradford Networks Recorded: Oct 7 2014 3:00 pm UTC 31 mins
    • As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."

      As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.

      Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:

      - Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
      - Device Profiling – Identifies and classifies every device on the network to provide greater visibility
      - Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
      - Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
      - Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
      - Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices

      Read more >
    • Making the GRC Grade – How to Realize Continuous Compliance Making the GRC Grade – How to Realize Continuous Compliance McAfee and ForeScout Recorded: Dec 11 2012 6:00 pm UTC 34 mins
    • All compliance frameworks reference endpoint integrity, host defenses, and access control. You’ve invested in host-based security, systems management, and SIEM in order to reduce malware, data leakage, and other security exposures. But what innovative approaches can you use to not only improve your organization’s GRC grade but also achieve continuous compliance?

      This session shares a reference solution for continuous compliance based on smart integrations between McAfee security management and ForeScout’s automated security control platform. This expert / practitioner session will cover:

      • Common endpoint compliance gaps
      • NAC integration with host-based security and policy management systems
      • Extending correlation rules to enable endpoint remediation
      • How to create a closed-loop endpoint security and compliance program

      Read more >
    • Implementing the 3 Cs of Enterprise Mobility Implementing the 3 Cs of Enterprise Mobility David Goldschlag - SVP, Strategy Recorded: May 28 2015 4:00 pm UTC 36 mins
    • Today’s corporate worker is a mobile worker and requires anywhere access to enterprise services and applications. The evolution of mobile devices in the workplace has gone from a laptop and BlackBerry per user to a mix of three to five devices per user including laptops, smartphones and tablets that may be owned by the worker or enterprise.

      Join David Goldschlag, SVP of Strategy for Pulse Secure, as he discusses how enterprises can cope with this explosion of mobile devices using the three C’s of enterprise mobility – Connectivity, Compliance and Containers. In this webinar you will learn:

      1. How to use your PC security know-how to manage devices, provide VPN connectivity, and network access control
      2. How you can leverage existing compliance enforcement for BYOD and corporate-owned mobile devices
      3. How you can evaluate security containers to best meet your mobile application needs

      Read more >
    • Governance, Risk and Compliance (GRC) Automation Governance, Risk and Compliance (GRC) Automation Dale Tesch Recorded: Oct 23 2013 6:00 pm UTC 22 mins
    • Integrating SIEM with Network Access Control
      Compliance is always top of mind for today’s CISOs. Finding the balance between reducing costs while effectively managing risks is a challenge; failing it can mean damaged bottom lines, reputations, and information put at risk. However, by automating your Risk Management, many of these hazards can be avoided. Leveraging a combination of SIEM and NAC provides greater visibility across the network, alerting you to potential intrusions while simultaneously providing more secure guest access to the network. Risk management strategies fall more easily in line with those of the board, while CISOs can rest assured that their decisions are based off of real time information provided by the system. Expand your risk management and reach across lines of business, all while maintaining full security with an automated system.

      Read more >
    • BYOD 101: Avoid the 5 Most Common Mistakes BYOD 101: Avoid the 5 Most Common Mistakes Tom Murphy, CMO, Bradford Networks Recorded: Mar 26 2015 5:00 pm UTC 33 mins
    • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

      Attend this webinar and you will learn how to avoid:
      • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
      • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
      • User Frustration - Implement ultra flexible BYOD policies without compromising security
      • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
      • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant

      Read more >