Bradford Blog

Monday, March 24th, 2014
Topics: Analytics, Endpoint Compliance, Network Security, Network Visibility

R.I.P. XP… Gone But Not Forgotten… by the Cyber Criminals

After April 8, 2014, Microsoft will no longer provide support for Windows XP. The end of automated patching and security fixes for Windows XP means that machines running this Operating System will now become much… Read More »

Thursday, March 20th, 2014
Topics: Cyber Threats, Endpoint Compliance, Network Access Control, Network Infrastructure, Network Security, Network Visibility, Rapid Threat Response, Security Automation

Pre-Connect Compliance Check or Not?

As we all know, one of the biggest security concerns of organizations today is how to detect and stop “Day Zero” attacks —- breaches that occur without warning, capturing sensitive information such as credit card… Read More »

Thursday, March 6th, 2014
Topics: Network Access Control, Network Infrastructure, Network Security, Security Automation

RSA Recap: Automated Threat Response Takes Center Stage

Like many of you, we just returned from the annual RSA Conference. In the lead up to the conference much of the press focused on the NSA revelations and the alleged role companies like RSA… Read More »

Friday, February 7th, 2014
Topics: Bradford Blog, Cyber Threats, Endpoint Compliance, Network Infrastructure, Network Security, Rapid Threat Response, Security Automation

Don’t Expect What You Don’t Inspect

Businesses integrate their networks so they can streamline business processes.  The goal is to lower operating costs and achieve higher operating efficiency.  But in addition to the benefits, there is a significant level of risk… Read More »

Wednesday, January 22nd, 2014
Topics: Bradford Blog, Mobile Device Management, Network Access Control, Network Infrastructure, Network Security, Network Visibility

VMware’s Acquisition of AirWatch Reinforces Demand for Securing Mobile Devices

Organizations welcome the productivity gains of mobile devices but their two biggest challenges have been manageability and security. To maximize the leverage from these devices, they need to have the right configurations, applications, and content…. Read More »

Monday, January 20th, 2014
Topics: Bradford Blog, Network Access Control, Network Infrastructure, Network Security, Network Visibility

Software Defined Networking (SDN): Hype or Reality?

There’s been a wave of industry buzz recently about Software-Defined Networking (SDN) and how it’s going to transform the way networks are built, managed used and accessed. Some articles and vendor announcements suggest that SDN… Read More »

Thursday, January 2nd, 2014
Topics: 802.1x, BYOD, Endpoint Compliance, Network Access Control, Network Infrastructure, Network Security, Network Visibility, Security Automation

What’s Next for NAC? Five Predictions for 2014

Happy New Year! As we look ahead to 2014, I see some general themes emerging across the industry around threat detection and remediation which I’d like to share with you. Here are some key developments… Read More »

Wednesday, December 18th, 2013
Topics: Mobile Device Management, Network Access Control, Network Security

Is Your Network Ready for the Holidays?

Every year at holiday time, publications like CNET, Network World, PC World and others produce their annual “gift guide for geeks.” Those guides often include a range of digital devices, including smart phones, tablets, gaming… Read More »

Sunday, December 8th, 2013
Topics: Bradford Blog, BYOD, Network Access Control, Network Infrastructure, Network Security, Network Visibility

DNS Hijacking in BYOD: Why Hackers Love It

It’s a challenge that’s fundamental to BYOD:  how to redirect unknown devices and users to a portal, in order to determine the appropriate level of network access to provision. There’s a safe, proven way to… Read More »

Monday, December 2nd, 2013
Topics: BYOD, Network Access Control, Network Security

Head in the Sand: Why companies have been slow to adopt network access control policies for mobile devices

More and more employees are bringing their personal mobile devices to work, yet many companies are slow to respond to the trend.
Without a policy in place, it’s “anything goes” — where all kinds of… Read More »