|03/11||Advanced Cyber Threats: 6 Steps to Prevent and Remove a Threat’s Electronic Foothold||10 AM EDT||Sign Up Now|
|1 PM EDT||Sign Up Now|
|03/25||Network Access Control 101: Securing the Critical Edge of Your Network||10 AM EDT||Sign Up Now|
|1 PM EDT||Sign Up Now|
|BYOD: Make K-12 Learning Safe, Mobile and Collaborative|
K-12 Schools today are looking to take advantage of the BYOD trend to transform the educational experience. Many are moving from traditional lecture-based instruction to new models of learning, teaching and collaboration that integrate mobile devices into the classroom experience. However, this creates significant challenges for IT departments: they must support hundreds or even thousands of mobile devices on their networks, provide a safe network environment and meet regulatory requirements, and deliver an easy onboarding process for these devices, all with limited IT resources.Tom Murphy, CMO at Bradford Networks will explain how to make learning safe, mobile and collaborative while minimizing the management burden on IT staff.
|Securing Mobile Access While Embracing BYOD Across Your Campus|
How can you embrace the benefits of Bring Your Own Device (BYOD) across your campus while ensuring security and reducing IT overhead? Watch this webinar and learn how you can:
|BYOD: The iPad Invasion at Bryant University|
Hear how Jon Domen of Bryant University used Bradford Networks’ network access control solution across his campus, and the lessons he learned during the process.
|The BYOD Invasion in Education: Will You be Ready for 2014?|
Watch this webinar and learn how Bradford Networks’ network access control solution will help you proactively address the security and management challenges of BYOD while enabling your students to access school and campus networks, safely and automatically.
|Las Virgenes Unified School District Embraces BYOD Across 17 Schools|
Through its district-wide BYOD initiative, the Las Virgenes Unified School District (LVUSD) is utilizing technology to improve the way students learn, solve problems and think critically.Hear LVUSC’s Chief Technology Officer, Phil Scrivano, explain how LVUSD enables its 11,500 students and 1,500 staff across 17 schools to easily and safely use their own mobile devices in the classroom, while protecting the school’s network.
|Utah Valley University Makes BYOD Fast, Simple and Reliable|
Utah Valley University (UVU) is the second largest institution of higher learning in Utah with nearly 33,000 students and 5,000 faculty members. For UVU BYOD is not just a “nice to have” feature, but an integral part of the university experience.Hear UVU’s network engineer, Duke Heaton outline the specific steps he took to enable BYOD across the campus and give the students and staff access to the network resources for which they are authorized, without jeopardizing security or overwhelming IT.
|Ensure the Integrity of Your Networks and Protect Your Critical Infrastructure|
This webinar draws on Bradford Networks’ extensive experience implementing Critical Infrastructure Protection (CIP) and ensuring network integrity at energy and utility companies around the globe, and explains how you can:
|The BYOD Blueprint with MobileIron and Bradford Networks|
This joint MobileIron and Bradford Networks webinar explains and demonstrates how our NAC and MDM solutions integrate and complement each other to deliver a BYOD Blueprint that ensures full visibility and control of the network and mobile devices.
View this recording to see how joint customers are using the integrated solution to:
|The BYOD Blueprint with Airwatch and Bradford Networks|
This webinar explains and demonstrates how Bradford Network Access Control (NAC) and Airwatch Mobile Device Management (MDM) solutions integrate and complement each other to deliver a BYOD Blueprint that ensures full visibility and control of the network and mobile devices in this era of IT consumerization.
|BYOD Security for Tablets and Smartphones Across the Enterprise|
How can you allow personal mobile devices (BYOD) on the corporate network without putting the network and company assets at risk?Learn how a flexible network access control solution will give you visibility and control over all the devices connecting to your network.
|Network Access Control 101: Securing the Critical Edge of Your Network|
This webinar draws on Bradford Networks’ extensive experience to provide you with key advice on how to secure the critical edge of your network. You will learn how to:
|Introducing Network Sentry/Analytics, Bradford Networks New Cloud-Based Reporting Solution|
Bradford Networks new Network Sentry/Analytics cloud-based reporting solution provides a unique perspective on security, mobility and BYOD trends. Network Sentry/Analytics correlates and analyzes historical network access data collected by your Network Sentry solution, delivering actionable reports that enable you to plan and develop the right long-term network security strategies. Watch the webinar to learn more.
|The Mobility Mandate: Prepare for BYOD with Enterprise-Ready Wi-Fi and Network Access Control|
The BYOD trend has exploded over the past couple of years with the average user carrying 2.8 wireless devices. As a result, organizations are now being pressured to allow more employee-owned personal devices, such as iPads, smartphones, tablets and personal laptops, onto their corporate networks.So is your wireless network ready for the growth and risk associated with BYOD?Presented jointly by Xirrus and Bradford Networks this webinar will explain how to design and secure a wireless network that enables mobility across your organization.
|Successful BYOD: Scalable, Secure, Simple|
BYOD is getting more complex by the day and security concerns are a top priority for organizations of any size and across all industries. And when it comes to implementation, simplicity and scalability are top-of-mind.Hear how AirWatch, Bradford Networks and Xirrus address the key factors needed to ensure a successful, scalable and secure BYOD rollout.
|Top Five Information Risk, Security, and Privacy Considerations When Using BYOD in Healthcare|
Presented by John Pironti, a leading authority on information risk management and security strategy, this webinar examines the top five information risk, privacy and security considerations that both the user—clinicians, doctors, staff and visitors—and the organization need to consider when implementing a BYOD strategy.
|BYOD Security for Tablets and Smartphones in Hospitals and Medical Centers|
Many hospitals and medical facilities are being pressured to open their networks to mobile devices such as iPads, smartphones, tablets and personal laptops, etc. in order to improve productivity and patient care. These devices are being brought in by doctors, patients, employees, guests, contractors and others. Additionally, the hospitals themselves are increasingly introducing innovative technologies for patient care that run on mobile devices.Watch this webinar to learn how a flexible network access control solution can recognize any device across your wired and wireless networks giving you visibility into what’s on your network and letting you assign the right level of access to ensure safe onboarding of all mobile devises and HIPAA compliance.
|Detecting Rogue Wired and Wireless Devices on Your PCI DSS Network|
Retail organizations, even when PCI DSS compliant, must remain diligent about safeguarding their networks and access to cardholder data. Given that retail networks are public facing with wired and wireless network access within reach of the general public as well as employees, retail IT professionals must ensure the integrity of their cardholder networks and the devices that are connected to them.
View this webinar to understand how you can use Network Access Control for PCI DSS network monitoring, device monitoring and reporting.
|PCI DSS Compliance: Prevent Mobile Devices from Connecting to Your Cardholder Network|
This webinar provides key advice on how Network Access Control (NAC) can reduce risk, maintain network integrity and ensure PCI DSS compliance.You will learn how to:
|PCI DSS Compliance: Ensure the Integrity of Your Cardholder Network|
Consumers today want anytime, anywhere Internet access via their mobile devices while they shop in your stores and eat in your restaurants. Therefore many retail establishments now offer Wifi connectivity to their patrons. In addition, these stores need their own network connectivity to connect Point-of-Sale terminals with cardholder databases and other business-critical systems.Under PCI DSS regulations, these networks must be isolated from other networks and are subject to stringent security protections. In these dynamic and highly distributed environments it’s therefore critical to actively manage and control network access and ensure that patrons don’t inadvertently or deliberately access corporate networks and put the organization at risk.This webinar provides key advice on how Network Access Control (NAC) can reduce risk, maintain network integrity and ensure PCI DSS compliance.