Deploying Meraki? Be Sure Your Devices Are Securely Connected

Presented by

Noam Syrkin, RedSeal Senior Tech Marketing Engineer and Brad Schwab, RedSeal Senior Solutions Consultant

About this talk

Are your corporate assets and remote workforce protected as you deploy Meraki devices? A misconfiguration in any one of your Meraki devices can unintentionally expose corporate assets to unauthorized users – or provide an unmonitored path for data exfiltration. Join us to see how you can have visibility into Meraki devices and their connections -- across hybrid cloud and on-premise environments — from each device to your data centers. We’ll provide practitioner examples of misconfigurations, the risk they created, and how to remediate them quickly. You’ll learn how you can: - Discover new and existing Meraki devices - Investigate to determine if they’re securely configured and comply with organizational policies - Act to remediate and mitigate risks

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (26)
Subscribers (2519)
By focusing on cybersecurity fundamentals, RedSeal helps government agencies and Global 2000 companies measurably reduce their cyber risk. With RedSeal’s cyber terrain analytics platform and professional services, enterprises improve their resilience to security events by understanding what’s on their networks and how it’s all connected. RedSeal verifies that network devices are securely configured; validates network segmentation policies; and continuously monitors compliance with policies and regulations. It also prioritizes mitigation based on each vulnerability’s associated risk.