Webinars

Upcoming Webinars

Date
Topic Time Registration
Aug 6
Enabling Secure BYOD and 1-to-1 Initiatives
11 am ET Sign Up Now
Aug 6
Simple, Self-Service Onboarding Portal for the Entire Student Body
1 pm ET Sign Up Now
Aug 13
Electronic Medical Records, Mobile Devices, and HIPAA Compliance
11 am ET Sign Up Now
Aug 13 Network Access Control 101: Securing the Critical Edge of Your Network 1 pm ET Sign Up Now
Aug 18 Developing Security Policies with Network Sentry/NAC and Network Sentry/RTR 9 am ET Sign Up Now
Aug 18 Developing Security Policies with Network Sentry/NAC and Network Sentry/RTR 2 pm ET Sign Up Now
Aug 20 BYOD 101: Avoid the 5 Most Common Mistakes 11 am ET Sign Up Now
Aug 20 Detecting Rogue Wired and Wireless Devices on Your PCI DSS Network 1 pm ET Sign Up Now

 

On Demand Webinars

Durham University: Expanding NAC BYOD to Incorporate Campus Wide Wireless

As part of the campus wide wireless expansion project, Durham University extended their NAC BYOD solution to support the new wireless environment consisting of thousands of mobile users and devices. Learn how they incorporated BYOD wireless access policies into their existing NAC solution, providing real-time wireless network visibility and security automation. This webinar will discuss the NAC BYOD wireless expansion project and how the university now benefits from:

  • Fast, easy and secure network access for thousands of students
  • The ability to identify and block compromised devices and provide self-service remediation
  • Enhanced student preparedness, through improved communications and procedures reducing helpdesk burden
  • Automated provisioning to leverage network segmentation

Watch Now or Download PDF

Columbus State University: From Guest Management to a Complete NAC BYOD Solution

With evolving BYOD requirements in a large wireless network of thousands of varied users and devices, Columbus State University required a comprehensive NAC BYOD solution. Learn how they transitioned from a guest management solution to a secure NAC environment that will provide real-time network visibility and security automation. This webinar will discuss the process of their transition to NAC BYOD and how the university benefits from:

  • Fast, easy and secure network access for thousands of students, faculty and guests
  • Automated network provisioning for this campus wide mobile wireless environment
  • A reduction in support calls to a burdened IT staff
  • A network-wide visibility of all connections to help eliminate blind spots

Watch Now or Download PDF

a_edu-21 Simple, Self-Service Onboarding Portal for 100,000 Students

Each year, thousands of students, faculty, and staff converge on your campus network bringing their laptops, iPads, smartphones and other mobile devices with them, and they all want wired and wireless network access. How can you provide them the right level of network access while ensuring security and without crushing your helpdesk staff? Learn how you can:

  • Gain 100% visibility into all mobile devices connecting to your network, including laptops, iPads, smartphones, gaming consoles, IP TVs and other mobile devices
  • Enable an automated, self-service registration process for thousands of personally-owned devices
  • Automatically detect and isolate non-compliant or infected devices on your wireless and wired networks
  • Dynamically provision and control the appropriate level of network access for your students, staff, and guests
  • Automatically remove infected or compromised devices that act as unsuspecting backdoors to your network

Watch Now or Download PDF

a_k12-41 Enabling Secure BYOD and 1 to 1 Initiatives

Primary and secondary schools are embracing personal mobile devices to enhance the learning process. Some schools allow students to bring their own device (BYOD) while others fund the device for each student (1-to-1). To avoid a barrage of help desk calls, IT staff are looking for simple, secure, and cost effective ways to embrace BYOD. The goal is to ensure students, faculty, and staff get to use their device of choice while access to sensitive information and the internet is carefully managed.
Watch this webinar to learn about:

  • Scalable, secure onboarding
  • How to allow only safe and trusted devices onto the network
  • Provisioning granular network access for students, staff and guests

Watch Now or Download PDF

Reduce the Mean Time to Incident Response

Incident Response has always been a complex and time consuming process. It requires Incident Responders to aggregate security, network and endpoint information to find the threat’s presence and reconstruct an accurate picture of its foothold. To minimize Incident Response time, high-fidelity security alerts, are now being augmented with a new warehouse of context providing the responder with unprecedented traceability during triage. In addition, network access controls are being leveraged to monitor, isolate, or block a compromised endpoint from the network in real time. Learn how automatically correlating a live inventory of network and endpoint information with high-fidelity security alerts can reduce the mean time to Incident Response.

Watch Now or Download PDF

NAC 101 Network Access Control 101: Secure the Critical Edge of Your Network

As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and Gartner predicts the source of breaches will have shifted from workstations to tablets and smartphones by 2017.

As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure. Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network.

Watch Now or Download PDF

Rapid Threat Response 101: An Introduction to Network Sentry/RTR

Today’s cyber threats are targeted, difficult to detect, and require expertise to contain. They traverse various domains of IT management — making incident response a time consuming and cross-functional challenge. Silos of security and network information require correlation to trace the security events to the compromised endpoints. Moreover, the increasing volume of security events makes it impractical to prioritize, respond and contain threats manually.

This webinar is an introduction to Network Sentry/RTR — a solution that can correlate high fidelity security events with new contextual information to prioritize, simplify, and accelerate incident response.Learn how you can leverage:

  • Context: Add contextual information to security events to gauge business criticality
  • Automation: Automate workflows to empower the SOC with NOC-related information
  • Containment: Isolate, restrict or block compromised endpoints from the network in seconds

Reduce Critical Threat Containment Time from 7 Days to 7 Seconds with Fortinet

Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management — making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

Watch this session to understand how to reduce threat response time from 7 days to 7 seconds. Fortinet and Bradford Networks have partnered together with a solution that correlates high fidelity security alerts with contextual information on threats on compromised end-points in real-time, reducing threat containment time from days to seconds.

Watch Now or Download PDF

Securing Compromised Endpoints in Minutes with Check Point and Bradford Networks

Cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. Because they traverse different domains of IT management, it creates a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

Watch this webinar to understand how to reduce threat response time from days to minutes, or even seconds. Bradford Network’s Network Sentry/RTR correlates high fidelity security alerts from Check Point Software’s Next Generation Firewall and Threat Prevention solutions to identify and contain threats on compromised end-points in real-time. You will learn about the integration between the two solutions and how it’s used to contain compromised endpoints.

Watch Now or Download PDF

image0041 Developing A Five Step Plan to Reduce Critical Threat Containment

The cyber world is so vast and interconnected, and cyber criminals are so cunning in finding weaknesses to exploit it, that you’re almost certain to get hacked at some point. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

Join this webinar to learn about building a five-step process to identify and contain threats on compromised end-points – and cut the threat response time from days to seconds and lessen a threat’s impact. When the unthinkable happens, knowing how to leverage the inherent intelligence in your network and a high degree of automation will let you respond quickly and effectively to minimize the damage.

Watch Now or Download PDF

rtr-fireeye1 Reduce Critical Threat Containment Time from 7 Days to 7 Minutes with FireEye

Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management — making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

Join this session to understand how to reduce threat response time from 7 days to 7 seconds. Leveraging integration with FireEye, Bradford Networks correlates high fidelity security alerts to identify and contain threats on compromised end-points in real-time.

Watch Now or Download PDF

rtr-palo1 Reduce Critical Threat Containment Time from 7 Days to 7 Minutes with Palo Alto Networks

Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management — making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

Join this session to understand how to reduce threat response time from 7 days to 7 seconds. Leveraging integration with Palo Alto Networks, Bradford Networks correlates high fidelity security alerts to identify and contain threats on compromised end-points in real-time.

Watch Now or Download PDF

14182_XP_EO_180x1801 Windows XP End of Life: Five Steps for Keeping Your Network Safe from Vulnerable Endpoints

As of April 8, 2014 Microsoft no longer provides support for Windows XP. With the end of automated patching and security fixes, endpoints running Windows XP will now become backdoors to your network and a tempting target for cyber criminals.

This webinar will present 5 steps to effectively manage and accelerate the transition from Windows XP, and protect your organization from these increasingly vulnerable endpoints. Attend this webinar and learn how you can:

  • Create an inventory of all endpoints, users, groups, and locations running Windows XP
  • Report on the OS patch levels, installed Antivirus products, and signature file versions
  • Direct Windows XP users to a captive portal to educate them on policy, timeframes, and how best to transition
  • Action Windows XP users with real-time notifications, network limitations, or prevent network access altogether
  • Trend the decline of Windows XP endpoints and the growth of other operating systems

Watch Now | Download PDF

image0041 Advanced Cyber Threats: 6 Steps to Prevent and Remove a Threats’ Foothold

Over the past few years the security industry has evolved its posture from pure prevention to include rapid detection, investigation, and remediation. It is now no longer a matter of if a threat will penetrate your defenses — but when. With this shift from preventative to responsive, it is critical to minimize the think time and overall impact of a threat by finding and removing its electronic foothold as fast as possible. To reduce risk and minimize incident response time, Security Automation is being used to harden the network’s attack surface and address complexity. This webinar will take you through a 6 step process that uses Security Automation to help prevent threats and reduce remediation from days to minutes.

Watch Now | Download Presentation

Compliance & Network Security Best Practices for State Agencies & Local Governments

Knowing what’s connecting to your network is fundamental to regulatory compliance as well as security best practices. The right Network Access Control solution can provide state agencies and local governments with real-time visibility and automated control over every attempted connection to the network. This webinar will provide best practices for securing a network and addressing compliance within state agencies and local governments.

  • Criminal Justice Information Service (CJIS) Compliance – Address 6 of the 12 requirements
  • Protect Personally Identifiable Information (PII) – Comply with state PII data protection regulations
  • Payment Card Industry Data Security Standard (PCI DSS) – Achieve PCI DSS compliance
  • Incident Response – Build and demonstrate a rapid threat response plan
  • BYOD – Enable safe onboarding for employees and guests on government networks

healthcare-byod1 Electronic Medical Records, Mobile Devices, and HIPAA Compliance

Many hospitals and medical centers are embracing tablets to improve the quality of patient care. With this new mobility, securing Electronic Medical Records (EMR) and demonstrating HIPAA compliance has created new challenges.

This high-impact webcast will present a proven approach to enabling medical staff to leverage their mobile device of choice while protecting EMR and maintaining compliance.

Watch Now or Download PDF

a_pci41 Detecting Rogue Wired and Wireless Devices on Your PCI DSS Network

Retail organizations, even when PCI DSS compliant, must remain diligent about safeguarding their networks and access to cardholder data. Given that retail networks are public facing with wired and wireless network access within reach of the general public as well as employees, retail IT professionals must ensure the integrity of their cardholder networks and the devices that are connected to them.

View this webinar to understand how you can use Network Access Control for PCI DSS network monitoring, device monitoring and reporting.

Watch Now or Download PDF

Bradford Networks - BYOD

Bradford Networks offers the best solution to enable secure network access for corporate issued and personal mobile devices. The company's flexible Network Sentry platform is the first network security offering that can automatically identify and profile all devices and all users on a network, providing complete visibility and control. Unlike vendor-specific network security products, Network Sentry provides a view across all brands of network equipment and connecting devices eliminating the network blind spots that can introduce risk.

Bradford Networks - Network Sentry/RTR

Network Sentry/RTR minimizes a threat's impact and the response time for remediation. Network Sentry/RTR leverages its unique Live Inventory of Network Connections (LINC) to automatically correlate high fidelity security alerts from the leading firewall and Advanced Threat Detection solutions, including FireEye, Fortinet, and Palo Alto Networks, with detailed contextual information on compromised endpoints, users and applications. Once identified, Network Sentry/RTR triggers an automated response, based on the severity and business criticality of the incident, to contain compromised devices in real time. Network Sentry/RTR also provides detailed historical information on all network connections, giving security experts unprecedented forensics to help fully understand and investigate the threat's methodology, lifecycle and scope.

Bradford Networks Pitches a Perfect Game for the Miami Marlins

Marlins Park is the spectacular new home of the Miami Marlins baseball team.

Throughout the ballpark there are thousands of different IP devices that are used to run the facility and venue events - including ATM machines, televisions and menu boards, LED display boards, point of sale terminals, sound systems, as well as PCs and laptops used by Marlins staff. For each game there can also be anywhere from 20 to 80 radio and television station personnel who need network access in order to broadcast the games. In addition to the sheer volume and variety, equipment is constantly being added and moved around the ballpark.

Hear how Bradford Networks' Networks Sentry secures the Miami Marlin's ballpark, providing secure, automated networks provisioning for thousands of infrastructure devices.