Hi [[ session.user.profile.firstName ]]

Detecting Rogue Wired and Wireless Devices on your PCI DSS Network

Retail organizations, even when PCI DSS compliant, must remain diligent about safeguarding their networks and access to cardholder data. Given that retail networks are public facing with wired and wireless network access within reach of the general public as well as employees, retail IT professionals must ensure the integrity of their cardholder networks and the devices that are connected to them.

This webinar will cover:

PCI DSS Network Monitoring
- Know and verify every switch, router, and access point within your network
- Detect and prevent any rogue or unauthorized network gear that attempts to access the network

PCI DSS Device Monitoring
- Know and verify every device on your network at all times
- Detect and prevent any rogue and unauthorized wired and wireless devices

PCI DSS Reporting
- Get historical reporting on all connections made to your network
- Demonstrate compliance
Recorded Oct 28 2014 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tom Murphy, CMO, Bradford Networks
Presentation preview: Detecting Rogue Wired and Wireless Devices on your PCI DSS Network

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Reduce the Mean Time to Incident Response Recorded: Jun 17 2015 24 mins
    Tom Murphy, CMO, Bradford Networks
    Incident Response has always been a complex and time consuming process. It requires Incident Responders to aggregate security, network and endpoint information to find the threat’s presence and reconstruct an accurate picture of its foothold. To minimize Incident Response time, high-fidelity security alerts, are now being augmented with a new warehouse of context providing the responder with unprecedented traceability during triage. In addition, network access controls are being leveraged to monitor, isolate, or block a compromised endpoint from the network in real time. By automatically correlating a live inventory of network and endpoint information with high-fidelity security alerts, Incident Responders now have:

    Autonomy - No longer need to engage the Network and Endpoint teams to get the information the infrastructure details they need

    Traceability - Can easily trace a security alert to the point of network connection and identify the compromised endpoints

    Confidence - Leverage a new level of confidence enable faster responses

    Priority - Understand the business impact on all security alerts creating clear priority

    Acceleration - Minimize the mean time to contain cyber threats
  • Network Access Control 101: Secure the Critical Edge of Your Network Recorded: Jun 2 2015 41 mins
    Tom Murphy, CMO, Bradford Networks
    As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."

    As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.

    Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:

    - Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
    - Device Profiling – Identifies and classifies every device on the network to provide greater visibility
    - Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
    - Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
    - Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
    - Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices
  • Rapid Threat Response 101: An Introduction to Network Sentry/RTR Recorded: May 20 2015 37 mins
    Everett Andrus, James Hicks
    Today’s cyber threats are targeted, difficult to detect, and require expertise to contain. They traverse various domains of IT management — making incident response a time consuming and cross-functional challenge. Silos of security and network information require correlation to trace the security events to the compromised endpoints. Moreover, the increasing volume of security events makes it impractical to prioritize, respond and contain threats manually.

    This webinar is an introduction to Network Sentry/RTR -- a solution that can correlate high fidelity security events with new contextual information to prioritize, simplify, and accelerate incident response.

    Learn how you can leverage:

    • Context: Add contextual information to security events to gauge business criticality
    • Automation: Automate workflows to empower the SOC with NOC-related information
    • Containment: Isolate, restrict or block compromised endpoints from the network in seconds
  • Reduce Critical Threat Containment Time from 7 Days to 7 Seconds with Fortinet Recorded: May 12 2015 25 mins
    Tom Murphy, CMO, Bradford Networks
    Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management — making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

    Join this session to understand how to reduce threat response time from 7 days to 7 seconds. Fortinet and Bradford Networks have partnered together with a solution that correlates high fidelity security alerts with contextual information on threats on compromised end-points in real-time, reducing threat containment time from days to seconds.
  • BYOD 101: Avoid the 5 Most Common Mistakes Recorded: Mar 26 2015 33 mins
    Tom Murphy, CMO, Bradford Networks
    This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Securing the “Internet of Things” When Everything has an IP Address Recorded: Mar 17 2015 32 mins
    Tom Murphy, CMO, Bradford Networks
    Endpoints are primary targets for cyber criminals. Traditional endpoints such as laptops, tablets, and smartphones support agents and can be centrally managed, configured, and protected. The Internet of Things will drive 4 times the volume of unmanaged devices on a network increasing the attack surface and creating welcome mats for unwanted threats. These unmanaged IP-based devices will be difficult to identify, unable to support an agent, and look like black boxes to security professionals. Without knowing the device type and its business criticality, containing a compromised endpoint will be challenging and time consuming.

    Attend this webinar to learn how to:
    • Identify and classify every IP device on your network without an agent
    • Correlate high fidelity security alerts with device context
    • Minimize the time from threat detection to containment
    • Secure the Internet of Things
  • Durham University: Expanding NAC BYOD to Incorporate Campus Wide Wireless Recorded: Mar 17 2015 50 mins
    Andrew Crowe, Technical Specialist, Durham; Everett Andrus, Dir. Product Support, & James Hicks, Technical Trainer, Bradford
    As part of the campus wide wireless expansion project, Durham University extended their NAC BYOD solution to support the new wireless environment consisting of thousands of mobile users and devices. Learn how they incorporated BYOD wireless access policies into their existing NAC solution, providing real-time wireless network visibility and security automation. This webinar will discuss the NAC BYOD wireless expansion project and how the university now benefits from:

    • Fast, easy and secure network access for thousands of students
    • The ability to identify and block compromised devices and provide self-service remediation
    • Enhanced student preparedness, through improved communications and procedures reducing helpdesk burden
    • Automated provisioning to leverage network segmentation
  • Columbus State University: From Guest Management to a Complete NAC BYOD Solution Recorded: Feb 18 2015 58 mins
    Casey Hergett, Senior Manager of Infrastructure and Database Services, Columbus Statue University
    With evolving BYOD requirements in a large wireless network of thousands of varied users and devices, Columbus State University required a comprehensive NAC BYOD solution. Learn how they transitioned from a guest management solution to a secure NAC environment that will provide real-time network visibility and security automation. This webinar will discuss the process of their transition to NAC BYOD and how the university benefits from:

    • Fast, easy and secure network access for thousands of students, faculty and guests
    • Automated network provisioning for this campus wide mobile wireless environment
    • A reduction in support calls to a burdened IT staff
    • A network-wide visibility of all connections to help eliminate blind spots
  • Securing Compromised Endpoints in Seconds with Check Point and Bradford Networks Recorded: Feb 11 2015 30 mins
    Sanjit Shah, VP, Business Development
    Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management — making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

    Join this webinar to understand how to reduce threat response time from days to seconds. Bradford Network's Network Sentry/RTR correlates high fidelity security alerts from Check Point Software's Next Generation Firewall and Threat Prevention solutions to identify and contain threats on compromised end-points in real-time. In this webinar, you will learn about the integration between the two solutions and how it’s used to contain compromised endpoints.
  • Electronic Medical Records, Mobile Devices, and HIPAA Compliance Recorded: Feb 3 2015 29 mins
    Tom Murphy, Bradford Networks
    Many hospitals and medical centers are embracing tablets to improve the quality of patient care. With this new mobility, securing Electronic Medical Records (EMR) and demonstrating HIPAA compliance has created new challenges.

    This high-impact webcast will present a proven approach to enabling medical staff to leverage their mobile device of choice while protecting EMR and maintaining compliance.

    Attend this webinar to:

    • Understand the basics of the HIPAA Security Rule
    • Construct a checklist to safely embrace mobile devices
    • Provide the appropriate staff access to EMR
    • Hear how a medical institution embraced NAC and MDM to safely embrace tablets
  • When Timing is Critical: Securing compromised endpoints in minutes with FireEye Recorded: Dec 11 2014 29 mins
    Tom Murphy, CMO, Bradford Networks
    Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management -- making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

    Join this session to understand how to reduce threat response time from 7 days to 7 seconds. Leveraging integration with FireEye, Bradford Networks correlates high fidelity security alerts to identify and contain threats on compromised end-points in real-time.

    Key Topics Covered:

    - Get 100% real-time visibility into every network connection -- including users, devices, applications accessing your wired, wireless, and VPN network
    - Automatically correlate high fidelity network security alerts from FireEye to contextual information such as users, devices and applications
    - Automatically block, restrict, or remediate non-compliant or infected devices trying to gain access to the network
    - Dynamically control every user and device’s level of network access based on its security posture and business-criticality
  • Compliance & Network Security Best Practices: State Agencies & Local Governments Recorded: Nov 20 2014 34 mins
    Tom Murphy, CMO, Bradford Networks
    Knowing what’s connecting to your network is fundamental to regulatory compliance as well as security best practices. The right Network Access Control solution can provide state agencies and local governments with real-time visibility and automated control over every attempted connection to the network. Please join us for this webinar that will provide best practices for securing a network and addressing compliance within state agencies and local governments.

    • Criminal Justice Information Service (CJIS) Compliance - Address 6 of the 12 requirements
    • Protect Personally Identifiable Information (PII) - Comply with state PII data protection regulations
    • Payment Card Industry Data Security Standard (PCI DSS) – Achieve PCI DSS compliance
    • Incident Response – Build and demonstrate a rapid threat response plan
    • BYOD – Enable safe onboarding for employees and guests on government networks
  • Critical Timing: Secure compromised endpoints in minutes with Palo Alto Networks Recorded: Nov 12 2014 26 mins
    Tom Murphy, CMO, Bradford Networks
    Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management -- making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

    Join this session to understand how to reduce threat response time from 7 days to 7 seconds. Leveraging integration with Palo Alto Networks, Bradford Networks correlates high fidelity security alerts to identify and contain threats on compromised end-points in real-time.

    Key Topics Covered:

    - Get 100% real-time visibility into every network connection -- including users, devices, applications accessing your wired, wireless, and VPN network
    - Automatically correlate high fidelity network security alerts from Palo Alto Networks to contextual information such as users, devices and applications
    - Automatically block, restrict, or remediate non-compliant or infected devices trying to gain access to the network
    - Dynamically control every user and device’s level of network access based on its security posture and business-criticality
  • Detecting Rogue Wired and Wireless Devices on your PCI DSS Network Recorded: Oct 28 2014 38 mins
    Tom Murphy, CMO, Bradford Networks
    Retail organizations, even when PCI DSS compliant, must remain diligent about safeguarding their networks and access to cardholder data. Given that retail networks are public facing with wired and wireless network access within reach of the general public as well as employees, retail IT professionals must ensure the integrity of their cardholder networks and the devices that are connected to them.

    This webinar will cover:

    PCI DSS Network Monitoring
    - Know and verify every switch, router, and access point within your network
    - Detect and prevent any rogue or unauthorized network gear that attempts to access the network

    PCI DSS Device Monitoring
    - Know and verify every device on your network at all times
    - Detect and prevent any rogue and unauthorized wired and wireless devices

    PCI DSS Reporting
    - Get historical reporting on all connections made to your network
    - Demonstrate compliance
  • Developing A Five Step Plan to Reduce Critical Threat Containment Time Recorded: Oct 20 2014 24 mins
    Tom Murphy, CMO, Bradford Networks
    The cyber world is so vast and interconnected, and cyber criminals are so cunning in finding weaknesses to exploit it, that you’re almost certain to get hacked at some point. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

    Join this webinar to learn about building a five-step process to identify and contain threats on compromised end-points – and cut the threat response time from days to seconds and lessen a threat’s impact. When the unthinkable happens, knowing how to leverage the inherent intelligence in your network and a high degree of automation will let you respond quickly and effectively to minimize the damage.

    Attend this session to hear how you can take your threat response strategy to the next level, including how to:

    - Utilize 100% real-time visibility into every network connection including users, devices and applications accessing your wired, wireless and VPN network
    - Get more context around network security alerts, including users, devices and applications involved in a breech
    - Block, restrict or contain non-compliant or compromised devices attempting to access the network
    - Dynamically control the network access level of every user and device based on security posture and business criticality
  • Simple, Self-Service Onboarding Portal for 100,000 Students Recorded: Oct 14 2014 20 mins
    Tom Murphy, CMO, Bradford Networks
    Each year, thousands of students, faculty, and staff converge on your campus network bringing their laptops, iPads, smartphones and other mobile devices with them, and they all want wired and wireless network access.

    So how can you provide them the right level of network access while ensuring security and without crushing your helpdesk staff? Attend this webinar and learn how your educational institution can:

    - Gain 100% visibility into all mobile devices connecting to your network, including laptops, iPads, smartphones, gaming consoles, IP TVs and other mobile devices
    - Enable an automated, self-service registration process for thousands of personally-owned devices
    - Automatically detect and isolate non-compliant or infected devices on your wireless and wired networks
    - Dynamically provision and control the appropriate level of network access for your students, staff, and guests
    - Automatically remove infected or compromised devices that act as unsuspecting backdoors to your network
  • Enabling Secure BYOD and 1-to-1 Initiatives in Schools Recorded: Oct 14 2014 21 mins
    Tom Murphy, CMO, Bradford Networks
    Primary and secondary schools are embracing personal mobile devices to enhance the learning process. Some schools allow students to bring their own device (BYOD) while others fund the device for each student (1-to-1). To avoid a barrage of help desk calls, IT staff are looking for simple, secure, and cost effective ways to embrace BYOD. The goal is to ensure students, faculty, and staff get to use their device of choice while access to sensitive information and the internet is carefully managed.

    Scalable, secure onboarding
    - Enable students, faculty, and staff to register their own devices
    - Delegate the approval process for safe onboarding to a local school sponsor

    How to allow only safe and trusted devices onto the network
    - Ensure devices are compliant and safe enough to join the school’s network
    - Restrict network access to only school issued devices such as Apple iPads

    Provisioning granular network access for students, staff and guests
    - Ensure network access to the appropriate systems, applications, and sensitive data
    - Restrict network access to the appropriate times for each student, class, grade, or the entire school
  • Network Access Control 101: Securing the Critical Edge of Your Network Recorded: Oct 7 2014 31 mins
    Tom Murphy, CMO, Bradford Networks
    As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."

    As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.

    Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:

    - Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
    - Device Profiling – Identifies and classifies every device on the network to provide greater visibility
    - Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
    - Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
    - Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
    - Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices
  • Developing A Five Step Plan to Reduce Critical Threat Containment Time Recorded: Sep 10 2014 24 mins
    Tom Murphy, CMO, Bradford Networks
    The cyber world is so vast and interconnected, and cyber criminals are so cunning in finding weaknesses to exploit it, that you’re almost certain to get hacked at some point. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

    Join this webinar to learn about building a five-step process to identify and contain threats on compromised end-points – and cut the threat response time from days to seconds and lessen a threat’s impact. When the unthinkable happens, knowing how to leverage the inherent intelligence in your network and a high degree of automation will let you respond quickly and effectively to minimize the damage.

    Attend this session to hear how you can take your threat response strategy to the next level, including how to:

    - Utilize 100% real-time visibility into every network connection including users, devices and applications accessing your wired, wireless and VPN network
    - Get more context around network security alerts, including users, devices and applications involved in a breech
    - Block, restrict or contain non-compliant or compromised devices attempting to access the network
    - Dynamically control the network access level of every user and device based on security posture and business criticality
  • Reduce Threat Containment Time from 7 Days to 7 Minutes with Palo Alto Networks Recorded: Aug 19 2014 26 mins
    Tom Murphy, CMO, Bradford Networks
    Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management -- making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

    Join this session to understand how to reduce threat response time from 7 days to 7 seconds. Leveraging integration with Palo Alto Networks, Bradford Networks correlates high fidelity security alerts to identify and contain threats on compromised end-points in real-time.

    Key Topics Covered:

    - Get 100% real-time visibility into every network connection -- including users, devices, applications accessing your wired, wireless, and VPN network
    - Automatically correlate high fidelity network security alerts from Palo Alto Networks to contextual information such as users, devices and applications
    - Automatically block, restrict, or remediate non-compliant or infected devices trying to gain access to the network
    - Dynamically control every user and device’s level of network access based on its security posture and business-criticality
Rapid Threat Response
Bradford Networks is the leading provider of rapid threat response solutions that minimize the risk and impact of cyber threats. The Company’s patented Network Sentry solution enables Cyber Security Teams to continuously assess the risk of every user and endpoint on the network, and automatically remove vulnerable and compromised devices that act as backdoors for cyber criminals.

Our channel provides you with the latest information about how to minimize the risk and impact of cyber threats. Our webcasts include industry news and trends, as well as information about products and services from Bradford Networks and our technology partners.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Detecting Rogue Wired and Wireless Devices on your PCI DSS Network
  • Live at: Oct 28 2014 3:00 pm
  • Presented by: Tom Murphy, CMO, Bradford Networks
  • From:
Your email has been sent.
or close