Webinars

Upcoming Webinars

Date
Topic Time Registration
11/12 Critical Timing: Secure compromised endpoints in minutes with Palo Alto Networks 11 AM EST Sign Up Now
12/11 When Timing is Critical: Securing compromised endpoints in minutes with FireEye 11 AM EST Sign Up Now

 

On Demand Webinars

a_edu-21 Simple, Self-Service Onboarding Portal for 100,000 Students

Each year, thousands of students, faculty, and staff converge on your campus network bringing their laptops, iPads, smartphones and other mobile devices with them, and they all want wired and wireless network access. How can you provide them the right level of network access while ensuring security and without crushing your helpdesk staff? Learn how you can:

  • Gain 100% visibility into all mobile devices connecting to your network, including laptops, iPads, smartphones, gaming consoles, IP TVs and other mobile devices
  • Enable an automated, self-service registration process for thousands of personally-owned devices
  • Automatically detect and isolate non-compliant or infected devices on your wireless and wired networks
  • Dynamically provision and control the appropriate level of network access for your students, staff, and guests
  • Automatically remove infected or compromised devices that act as unsuspecting backdoors to your network

Watch Now or Download PDF

a_k12-41 Enabling Secure BYOD and 1 to 1 Initiatives

Primary and secondary schools are embracing personal mobile devices to enhance the learning process. Some schools allow students to bring their own device (BYOD) while others fund the device for each student (1-to-1). To avoid a barrage of help desk calls, IT staff are looking for simple, secure, and cost effective ways to embrace BYOD. The goal is to ensure students, faculty, and staff get to use their device of choice while access to sensitive information and the internet is carefully managed.
Watch this webinar to learn about:

  • Scalable, secure onboarding
  • How to allow only safe and trusted devices onto the network
  • Provisioning granular network access for students, staff and guests

Watch Now or Download PDF

Network Access Control 101: Securing the Critical Edge of Your Network

This webinar draws on Bradford Networks’ extensive experience to provide you with key advice on how to secure the critical edge of your network. You will learn how to:

  • Get 100% visibility into all the devices connecting to your wired and/or wireless network
  • Identify vulnerable devices connecting to your secure network
  • Enable flexible network access without compromising security

Watch Now or Download PDF

image0041 Developing A Five Step Plan to Reduce Critical Threat Containment

The cyber world is so vast and interconnected, and cyber criminals are so cunning in finding weaknesses to exploit it, that you’re almost certain to get hacked at some point. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

Join this webinar to learn about building a five-step process to identify and contain threats on compromised end-points – and cut the threat response time from days to seconds and lessen a threat’s impact. When the unthinkable happens, knowing how to leverage the inherent intelligence in your network and a high degree of automation will let you respond quickly and effectively to minimize the damage.

Attend this session to hear how you can take your threat response strategy to the next level, including how to:

– Utilize 100% real-time visibility into every network connection including users, devices and applications accessing your wired, wireless and VPN network
– Get more context around network security alerts, including users, devices and applications involved in a breech
– Block, restrict or contain non-compliant or compromised devices attempting to access the network
– Dynamically control the network access level of every user and device based on security posture and business criticality

Watch Now or Download PDF

rtr-fireeye1 Reduce Critical Threat Containment Time from 7 Days to 7 Minutes with FireEye

Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management — making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

Join this session to understand how to reduce threat response time from 7 days to 7 seconds. Leveraging integration with FireEye, Bradford Networks correlates high fidelity security alerts to identify and contain threats on compromised end-points in real-time.

Watch Now or Download PDF

rtr-palo1 Reduce Critical Threat Containment Time from 7 Days to 7 Minutes with Palo Alto Networks

Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management — making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

Join this session to understand how to reduce threat response time from 7 days to 7 seconds. Leveraging integration with Palo Alto Networks, Bradford Networks correlates high fidelity security alerts to identify and contain threats on compromised end-points in real-time.

Watch Now or Download PDF

14182_XP_EO_180x1801 Windows XP End of Life: Five Steps for Keeping Your Network Safe from Vulnerable Endpoints

As of April 8, 2014 Microsoft no longer provides support for Windows XP. With the end of automated patching and security fixes, endpoints running Windows XP will now become backdoors to your network and a tempting target for cyber criminals.

This webinar will present 5 steps to effectively manage and accelerate the transition from Windows XP, and protect your organization from these increasingly vulnerable endpoints. Attend this webinar and learn how you can:

  • Create an inventory of all endpoints, users, groups, and locations running Windows XP
  • Report on the OS patch levels, installed Antivirus products, and signature file versions
  • Direct Windows XP users to a captive portal to educate them on policy, timeframes, and how best to transition
  • Action Windows XP users with real-time notifications, network limitations, or prevent network access altogether
  • Trend the decline of Windows XP endpoints and the growth of other operating systems

Watch Now | Download PDF

image0041 Advanced Cyber Threats: 6 Steps to Prevent and Remove a Threats’ Foothold

Over the past few years the security industry has evolved its posture from pure prevention to include rapid detection, investigation, and remediation. It is now no longer a matter of if a threat will penetrate your defenses — but when. With this shift from preventative to responsive, it is critical to minimize the think time and overall impact of a threat by finding and removing its electronic foothold as fast as possible. To reduce risk and minimize incident response time, Security Automation is being used to harden the network’s attack surface and address complexity. This webinar will take you through a 6 step process that uses Security Automation to help prevent threats and reduce remediation from days to minutes.

Watch Now | Download Presentation

14122_WOD_Enterprise1 The BYOD Blueprint with MobileIron and Bradford Networks

This joint MobileIron and Bradford Networks webinar explains and demonstrates how our NAC and MDM solutions integrate and complement each other to deliver a BYOD Blueprint that ensures full visibility and control of the network and mobile devices.

View this recording to see how joint customers are using the integrated solution to:

  • Detect managed and unmanaged mobile devices attempting to connect to the network
  • Automatically determine if a device is compliant with an organization’s policies
  • Enforce device and network security and compliance policies
  • Dynamically provision network access based on pre-defined policies
  • Configure and update device settings over-the-air, and remotely lock and/or wipe devices if they are compromised
  • Register unmanaged/unknown devices for guest access
  • Know and verify every switch, router, and access point on the network

Watch Now | Download Presentation

a_nac21 Network Access Control 101: Securing the Critical Edge of Your Network

This webinar draws on Bradford Networks’ extensive experience to provide you with key advice on how to secure the critical edge of your network. You will learn how to:

  • Get 100% visibility into all the devices connecting to your wired and/or wireless network
  • Identify vulnerable devices connecting to your secure network
  • Enable flexible network access without compromising security

Watch Now | Download Presentation

13216_BAX_radius1 Successful BYOD: Scalable, Secure, Simple

BYOD is getting more complex by the day and security concerns are a top priority for organizations of any size and across all industries. And when it comes to implementation, simplicity and scalability are top-of-mind.Hear how AirWatch, Bradford Networks and Xirrus address the key factors needed to ensure a successful, scalable and secure BYOD rollout.

Watch Now | Download Presentation

healthcare-byod1 Embracing the Use of Mobile Devices at Hospitals While Complying with HIPAA

Many hospitals and medical centers are embracing the use of hospital owned and/or personally owned tablets and other mobile devices in order to improve responsiveness and the quality of patient care. Hand in hand with these advances access to Electronic Medical Records (EMR) needs to be secure and meet HIPAA compliance regulation.

This webinar will present a step-by-step, proven approach to enabling doctors and medical staff to use their mobile device of choice while maintaining sufficient visibility and control over each and every device joining your network.

Watch Now or Download PDF

a_pci41 Detecting Rogue Wired and Wireless Devices on Your PCI DSS Network

Retail organizations, even when PCI DSS compliant, must remain diligent about safeguarding their networks and access to cardholder data. Given that retail networks are public facing with wired and wireless network access within reach of the general public as well as employees, retail IT professionals must ensure the integrity of their cardholder networks and the devices that are connected to them.

View this webinar to understand how you can use Network Access Control for PCI DSS network monitoring, device monitoring and reporting.

Watch Now or Download PDF

14122_WOD_PCI1 PCI DSS Compliance: Prevent Mobile Devices from Connecting to Your Cardholder Network

This webinar provides key advice on how Network Access Control (NAC) can reduce risk, maintain network integrity and ensure PCI DSS compliance.You will learn how to:

  • Easily isolate the cardholder network to prevent unauthorized access to critical systems
  • Know exactly what devices are connected to your network at any given time
  • Detect/prevent a rogue device that tries to connect to the wired/wireless cardholder network
  • Using flexible policies, enable safe wireless access to the cardholder network to authorized devices and users only

Download Presentation