Webinars

Upcoming Webinars

Date
Topic Time Registration
08/12 Simple, Self-Service Onboarding Portal for 100,000 Students 10 AM EDT Sign Up Now
1 PM EDT Sign Up Now

On Demand Webinars

BYOD: Make K-12 Learning Safe, Mobile and CollaborativeEnabling Secure BYOD and 1 to 1 Initiatives

Primary and secondary schools are embracing personal mobile devices to enhance the learning process. Some schools allow students to bring their own device (BYOD) while others fund the device for each student (1-to-1). To avoid a barrage of help desk calls, IT staff are looking for simple, secure, and cost effective ways to embrace BYOD. The goal is to ensure students, faculty, and staff get to use their device of choice while access to sensitive information and the internet is carefully managed. Watch this webinar to learn about:

  • Scalable, secure onboarding
  • How to allow only safe and trusted devices onto the network
  • Provisioning granular network access for students, staff and guests

Watch Now | Download Presentation

Securing Mobile Access While Embracing BYOD Across Your CampusSecuring Mobile Access While Embracing BYOD Across Your Campus

How can you embrace the benefits of Bring Your Own Device (BYOD) across your campus while ensuring security and reducing IT overhead? Watch this webinar and learn how you can:

  • Get 100% visibility into all mobile devices connecting to your network, including laptops, iPads, smartphones, gaming consoles, IP TVs and other mobile devices
  • Enable an automated, self-service registration process for thousands of student-owned devices
  • Automatically detect and isolate non-compliant or infected devices on your wireless and wired networks
  • Dynamically provision and control the appropriate level of network access for your students, staff, and guests

Watch Now | Download Presentation

BYOD: The iPad Invasion at Bryant UniversityBYOD: The iPad Invasion at Bryant University

Hear how Jon Domen of Bryant University used Bradford Networks’ network access control solution across his campus, and the lessons he learned during the process.

Watch Now | Download Presentation

Las Virgenes Unified School District Embraces BYOD Across 17 SchoolsLas Virgenes Unified School District Embraces BYOD Across 17 Schools

Through its district-wide BYOD initiative, the Las Virgenes Unified School District (LVUSD) is utilizing technology to improve the way students learn, solve problems and think critically.Hear LVUSC’s Chief Technology Officer, Phil Scrivano, explain how LVUSD enables its 11,500 students and 1,500 staff across 17 schools to easily and safely use their own mobile devices in the classroom, while protecting the school’s network.

Watch Now | Download Presentation

Utah Valley University Makes BYOD Fast, Simple and ReliableUtah Valley University Makes BYOD Fast, Simple and Reliable

Utah Valley University (UVU) is the second largest institution of higher learning in Utah with nearly 33,000 students and 5,000 faculty members. For UVU BYOD is not just a “nice to have” feature, but an integral part of the university experience.Hear UVU’s network engineer, Duke Heaton outline the specific steps he took to enable BYOD across the campus and give the students and staff access to the network resources for which they are authorized, without jeopardizing security or overwhelming IT.

Watch Now | Download Presentation

Ensure the Integrity of Your Networks and Protect Your Critical InfrastructureEnsure the Integrity of Your Networks and Protect Your Critical Infrastructure

This webinar draws on Bradford Networks’ extensive experience implementing Critical Infrastructure Protection (CIP) and ensuring network integrity at energy and utility companies around the globe, and explains how you can:

  • Get complete visibility into all devices on your network
  • Automatically block unknown/unauthorized devices to mitigate risk
  • Register all devices that are authorized to connect to your network
  • Assess risks and protect against cyber attacks before they occur
  • Monitor network connections at all times
  • Maintain a complete audit trail of each device on your network

Watch Now | Download Presentation

Windows XP End of Life: Five Steps for Keeping Your Network Safe from Vulnerable EndpointsWindows XP End of Life: Five Steps for Keeping Your Network Safe from Vulnerable Endpoints

As of April 8, 2014 Microsoft no longer provides support for Windows XP. With the end of automated patching and security fixes, endpoints running Windows XP will now become backdoors to your network and a tempting target for cyber criminals.

This webinar will present 5 steps to effectively manage and accelerate the transition from Windows XP, and protect your organization from these increasingly vulnerable endpoints. Attend this webinar and learn how you can:

  • Create an inventory of all endpoints, users, groups, and locations running Windows XP
  • Report on the OS patch levels, installed Antivirus products, and signature file versions
  • Direct Windows XP users to a captive portal to educate them on policy, timeframes, and how best to transition
  • Action Windows XP users with real-time notifications, network limitations, or prevent network access altogether
  • Trend the decline of Windows XP endpoints and the growth of other operating systems

Watch Now | Download PDF

Advanced Cyber Threats: 6 Steps to Prevent and Remove a Threats’ FootholdAdvanced Cyber Threats: 6 Steps to Prevent and Remove a Threats’ Foothold

Over the past few years the security industry has evolved its posture from pure prevention to include rapid detection, investigation, and remediation. It is now no longer a matter of if a threat will penetrate your defenses -- but when. With this shift from preventative to responsive, it is critical to minimize the think time and overall impact of a threat by finding and removing its electronic foothold as fast as possible. To reduce risk and minimize incident response time, Security Automation is being used to harden the network’s attack surface and address complexity. This webinar will take you through a 6 step process that uses Security Automation to help prevent threats and reduce remediation from days to minutes.

Watch Now | Download Presentation

14122_WOD_EnterpriseThe BYOD Blueprint with MobileIron and Bradford Networks

This joint MobileIron and Bradford Networks webinar explains and demonstrates how our NAC and MDM solutions integrate and complement each other to deliver a BYOD Blueprint that ensures full visibility and control of the network and mobile devices. View this recording to see how joint customers are using the integrated solution to:

  • Detect managed and unmanaged mobile devices attempting to connect to the network
  • Automatically determine if a device is compliant with an organization’s policies
  • Enforce device and network security and compliance policies
  • Dynamically provision network access based on pre-defined policies
  • Configure and update device settings over-the-air, and remotely lock and/or wipe devices if they are compromised
  • Register unmanaged/unknown devices for guest access
  • Know and verify every switch, router, and access point on the network

Watch Now | Download Presentation

The BYOD Blueprint with Airwatch and Bradford NetworksThe BYOD Blueprint with Airwatch and Bradford Networks

This webinar explains and demonstrates how Bradford Network Access Control (NAC) and Airwatch Mobile Device Management (MDM) solutions integrate and complement each other to deliver a BYOD Blueprint that ensures full visibility and control of the network and mobile devices in this era of IT consumerization.

Watch Now | Download Presentation

BYOD Security for Tablets and Smartphones Across the EnterpriseBYOD Security for Tablets and Smartphones Across the Enterprise

How can you allow personal mobile devices (BYOD) on the corporate network without putting the network and company assets at risk?Learn how a flexible network access control solution will give you visibility and control over all the devices connecting to your network.

  • Get 100% visibility into all the devices connecting to your wired and/or wireless network
  • Assign the right level of access based on policies that profile the user, device type and its security posture, and location
  • Proactively identify and prevent vulnerable devices from connecting to your secure network
  • Ensure safe automated onboarding and device registration
  • Prevent rogue wireless access points being added to your network

Watch Now | Download Presentation  

Network Access Control 101: Securing the Critical Edge of Your NetworkNetwork Access Control 101: Securing the Critical Edge of Your Network

This webinar draws on Bradford Networks’ extensive experience to provide you with key advice on how to secure the critical edge of your network. You will learn how to:

  • Get 100% visibility into all the devices connecting to your wired and/or wireless network
  • Identify vulnerable devices connecting to your secure network
  • Enable flexible network access without compromising security

Watch Now | Download Presentation

Introducing Network Sentry/Analytics, Bradford Networks New Cloud-Based Reporting SolutionIntroducing Network Sentry/Analytics, Bradford Networks New Cloud-Based Reporting Solution

Bradford Networks new Network Sentry/Analytics cloud-based reporting solution provides a unique perspective on security, mobility and BYOD trends. Network Sentry/Analytics correlates and analyzes historical network access data collected by your Network Sentry solution, delivering actionable reports that enable you to plan and develop the right long-term network security strategies. Watch the webinar to learn more.

Watch Now | Download Presentation

The Mobility Mandate: Prepare for BYOD with Enterprise-Ready Wi-Fi and Network Access ControlThe Mobility Mandate: Prepare for BYOD with Enterprise-Ready Wi-Fi and Network Access Control

The BYOD trend has exploded over the past couple of years with the average user carrying 2.8 wireless devices. As a result, organizations are now being pressured to allow more employee-owned personal devices, such as iPads, smartphones, tablets and personal laptops, onto their corporate networks.So is your wireless network ready for the growth and risk associated with BYOD?Presented jointly by Xirrus and Bradford Networks this webinar will explain how to design and secure a wireless network that enables mobility across your organization.

Watch Now | Download Presentation

The Mobility Mandate: Prepare for BYOD with Enterprise-Ready Wi-Fi and Network Access ControlSuccessful BYOD: Scalable, Secure, Simple

BYOD is getting more complex by the day and security concerns are a top priority for organizations of any size and across all industries. And when it comes to implementation, simplicity and scalability are top-of-mind.Hear how AirWatch, Bradford Networks and Xirrus address the key factors needed to ensure a successful, scalable and secure BYOD rollout.

Watch Now | Download Presentation

Embracing the Use of Mobile Devices at Hospitals and Medical Centers While Maintaining HIPAA ComplianceEmbracing the Use of Mobile Devices at Hospitals and Medical Centers While Maintaining HIPAA Compliance

Many hospitals and medical centers are embracing the use of hospital owned and/or personally owned tablets and other mobile devices in order to improve responsiveness and the quality of patient care. Hand in hand with these advances, access to Electronic Medical Records (EMR) needs to be secure and meet HIPAA compliance regulations.

This webinar presents a step-by-step, proven approach to enabling doctors and medical staff to use their mobile device of choice while maintaining sufficient visibility and control over each and every device joining your network.

Watch Now | Download Presentation  

BYOD Security for Tablets and Smartphones in Hospitals and Medical CentersBYOD Security for Tablets and Smartphones in Hospitals and Medical Centers

Many hospitals and medical facilities are being pressured to open their networks to mobile devices such as iPads, smartphones, tablets and personal laptops, etc. in order to improve productivity and patient care. These devices are being brought in by doctors, patients, employees, guests, contractors and others. Additionally, the hospitals themselves are increasingly introducing innovative technologies for patient care that run on mobile devices.Watch this webinar to learn how a flexible network access control solution can recognize any device across your wired and wireless networks giving you visibility into what’s on your network and letting you assign the right level of access to ensure safe onboarding of all mobile devises and HIPAA compliance.

Watch Now | Download Presentation

Detecting Rogue Wired and Wireless Devices on Your PCI DSS NetworkDetecting Rogue Wired and Wireless Devices on Your PCI DSS Network

Retail organizations, even when PCI DSS compliant, must remain diligent about safeguarding their networks and access to cardholder data. Given that retail networks are public facing with wired and wireless network access within reach of the general public as well as employees, retail IT professionals must ensure the integrity of their cardholder networks and the devices that are connected to them. View this webinar to understand how you can use Network Access Control for PCI DSS network monitoring, device monitoring and reporting.

Watch Now | Download Presentation

PCI DSS Compliance: Prevent Mobile Devices from Connecting to Your Cardholder NetworkPCI DSS Compliance: Prevent Mobile Devices from Connecting to Your Cardholder Network

This webinar provides key advice on how Network Access Control (NAC) can reduce risk, maintain network integrity and ensure PCI DSS compliance.You will learn how to:

  • Easily isolate the cardholder network to prevent unauthorized access to critical systems
  • Know exactly what devices are connected to your network at any given time
  • Detect/prevent a rogue device that tries to connect to the wired/wireless cardholder network
  • Using flexible policies, enable safe wireless access to the cardholder network to authorized devices and users only

Watch Now | Download Presentation

PCI DSS Compliance: Ensure the Integrity of Your Cardholder NetworkPCI DSS Compliance: Ensure the Integrity of Your Cardholder Network

Consumers today want anytime, anywhere Internet access via their mobile devices while they shop in your stores and eat in your restaurants. Therefore many retail establishments now offer Wifi connectivity to their patrons. In addition, these stores need their own network connectivity to connect Point-of-Sale terminals with cardholder databases and other business-critical systems.Under PCI DSS regulations, these networks must be isolated from other networks and are subject to stringent security protections. In these dynamic and highly distributed environments it’s therefore critical to actively manage and control network access and ensure that patrons don’t inadvertently or deliberately access corporate networks and put the organization at risk.This webinar provides key advice on how Network Access Control (NAC) can reduce risk, maintain network integrity and ensure PCI DSS compliance.

Watch Now | Download Presentation