IoT Challenges: How to Find the Answers on Your Network

Presented by

Shaun Henderson & Peter Connolly, ExtraHop Networks

About this talk

Whether they are ready for it or not, IT Operations teams have the Internet of Things (IoT), including BYOD devices such as smart watches, added to their growing list of responsibilities. With employees bringing in potentially compromised devices holding malicious malware, it's time for enterprise IT to understand the environment and not just tick the security compliance box. On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence and enterprise architecture. A new network monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents! This webinar is ideal for any networking, architecture or security professional looking to improve visibility across their network, to reduce threats and vulnerabilities and especially those with a focus on the Internet of Things (IoT).

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13361)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more