Bradford Blog

Friday, May 8th, 2015

Union College Selects Bradford Networks’ Rapid Threat Response Solution to Contain Cyber Threats in Real Time

Organization Graduates from Incident Response to Continuous Response Minimizing the Impact of Advanced Cyber Threats Boston, MA, Jan 12, 2015 — Bradford Networks™, the leading provider of rapid threat response solutions, today announced that Union College, one of the oldest and highest-ranked institutions of higher learning in the United States, has selected Network Sentry/RTR to enable a rapid threat response to cyber threats. Read More »

Topics: Bradford Blog

FireEye on 60 Minutes

Tuesday, December 9th, 2014

FireEye on 60 Minutes — and Why They Partner with Bradford Networks

If you watch 60 Minutes, you may have seen “What Happens When You Swipe Your Card” that aired on November 26. The piece examined recent security breaches where cybercriminals stole tens of millions of customer credit card numbers from major retailers including Target, Home Depot and Michaels Stores. Read More »

Topics: Cyber Threats, Network Security, Rapid Threat Response, Security Automation


Tuesday, June 10th, 2014

New Whitepaper from ESG Highlights Need to Shift from Prevention to Detection and Remediation to Improve Cyber Security

According to ESG, after years of settling for “good enough” IT security, enterprise organizations are now finally realizing that this is no longer an adequate approach. This change of heart is directly linked to the recent wave of sophisticated malware, targeted attacks, advanced persistent threats (APTs), and visible security breaches occurring over the last few years. Read More »

Topics: Cyber Threats, Network Security, Rapid Threat Response, Security Automation


Wednesday, June 4th, 2014

What You Do and Don’t Know Will Hurt You

Last week Zero Day Initiative (ZDI) published an advisory for a remote code execution vulnerability on Internet Explorer 8 (IE8) that has been left unpatched for over six months since ZDI reported it to Microsoft. The vulnerability allows an attacker to gain user access rights to a system after a user visits a malicious page or opens a malicious file. Read More »

Topics: Cyber Threats, Network Security, Rapid Threat Response, Security Automation


Tuesday, May 27th, 2014

The eBay Breach — Here We Go Again

By now you’ve probably heard that eBay was recently the victim of a massive cyber attack, with the personal details of some 145 million users falling into the hands of hackers. After the Target breach late last year, many organizations are now wondering if they will be next — and what, if anything, they can do about it. Read More »

Topics: Cyber Threats, Network Security, Rapid Threat Response, Security Automation

Thank You Windows XP

Thursday, May 1st, 2014

Someone’s Left the Windows Wide Open

** BREAKING NEWS….Microsoft has reversed its previous decision and will now provide a patch for Windows XP despite the fact that it no longer supports this operating system. Read more here.** After 13 years, Microsoft terminated support for Windows XP.   Read More »

Topics: Cyber Threats, Endpoint Compliance, Network Access Control, Network Infrastructure, Network Security, Network Visibility, Windows XP

Windows XP EOL

Monday, March 24th, 2014

R.I.P. XP… Gone But Not Forgotten… by the Cyber Criminals

After April 8, 2014, Microsoft will no longer provide support for Windows XP. The end of automated patching and security fixes for Windows XP means that machines running this Operating System will now become much more vulnerable to viruses and other malware, and a tempting target for cyber criminals. Read More »

Topics: Analytics, Endpoint Compliance, Network Security, Network Visibility, Windows XP

compliance checks

Thursday, March 20th, 2014

Pre-Connect Compliance Check or Not?

As we all know, one of the biggest security concerns of organizations today is how to detect and stop “Day Zero” attacks —- breaches that occur without warning, capturing sensitive information such as credit card data, intellectual property, personal identity details, or military secrets and sending it to Uzbekistan. Read More »

Topics: Cyber Threats, Endpoint Compliance, Network Access Control, Network Infrastructure, Network Security, Network Visibility, Rapid Threat Response, Security Automation


Thursday, March 6th, 2014

RSA Recap: Automated Threat Response Takes Center Stage

Like many of you, we just returned from the annual RSA Conference. In the lead up to the conference much of the press focused on the NSA revelations and the alleged role companies like RSA had in aiding the NSA surveillance program, but the buzz on the show floor was different. Read More »

Topics: Network Access Control, Network Infrastructure, Network Security, Security Automation

Bradford Networks - BYOD

Bradford Networks offers the best solution to enable secure network access for corporate issued and personal mobile devices. The company's flexible Network Sentry platform is the first network security offering that can automatically identify and profile all devices and all users on a network, providing complete visibility and control. Unlike vendor-specific network security products, Network Sentry provides a view across all brands of network equipment and connecting devices eliminating the network blind spots that can introduce risk.

Bradford Networks - Network Sentry/RTR

Network Sentry/RTR minimizes a threat's impact and the response time for remediation. Network Sentry/RTR leverages its unique Live Inventory of Network Connections (LINC) to automatically correlate high fidelity security alerts from the leading firewall and Advanced Threat Detection solutions, including FireEye, Fortinet, and Palo Alto Networks, with detailed contextual information on compromised endpoints, users and applications. Once identified, Network Sentry/RTR triggers an automated response, based on the severity and business criticality of the incident, to contain compromised devices in real time. Network Sentry/RTR also provides detailed historical information on all network connections, giving security experts unprecedented forensics to help fully understand and investigate the threat's methodology, lifecycle and scope.

Bradford Networks Pitches a Perfect Game for the Miami Marlins

Marlins Park is the spectacular new home of the Miami Marlins baseball team.

Throughout the ballpark there are thousands of different IP devices that are used to run the facility and venue events - including ATM machines, televisions and menu boards, LED display boards, point of sale terminals, sound systems, as well as PCs and laptops used by Marlins staff. For each game there can also be anywhere from 20 to 80 radio and television station personnel who need network access in order to broadcast the games. In addition to the sheer volume and variety, equipment is constantly being added and moved around the ballpark.

Hear how Bradford Networks' Networks Sentry secures the Miami Marlin's ballpark, providing secure, automated networks provisioning for thousands of infrastructure devices.