Home / Bradford Networks Blog
Tuesday, September 3rd, 2013
To secure your network, you first have to detect what’s on it. You have to identify what type of device is trying to connect and make sure it’s free of vulnerabilities and malware before it gets on the network.
Saturday, August 10th, 2013
If you don’t know what’s on your network at all times — if you can’t control what gets on — you put that network and the assets behind it at risk.
Sunday, August 4th, 2013
Lately, I’ve heard a lot of discussion in law firm technology circles about the advantages and challenges of BYOD. Okay, most of those discussions are about the challenges.
Tuesday, July 16th, 2013
eduroam (education roaming) is a program that provides a secure, worldwide roaming access service for the international research and education community.
Wednesday, July 10th, 2013
At Bradford Networks, we often talk about Network Sentry’s visibility — its unique ability to identify every user and every device that attempts to access a wired or wireless network.
Wednesday, June 19th, 2013
One June 10th, Apple announced its iOS 7 and OS X Mavericks platforms. For organizations with BYOD and mobility programs—or even those that don’t, but still see plenty of device traffic on the network—the forthcoming operating systems have some new bells and whistles that will undoubtedly affect corporate, school and enterprise networks.
Monday, June 17th, 2013
I just got back from the Gartner Security & Risk Management Summit 2013 which took place last week in Washington DC, and I’d like to share my thoughts while impressions are still fresh.
Monday, June 10th, 2013
Today we launched Network Sentry/Analytics 1.5 at the Gartner Security & Risk Management Summit, which is taking place this week at National Harbor, MD.
Tuesday, June 4th, 2013
Network visibility and automated access control are the most well-known benefits of Network Sentry, but there are many others. This post examines how Network Sentry greatly simplifies management at the network edge, a place where there’s vast potential for confusion and human error.
Monday, May 20th, 2013
The BYOD movement got its start in colleges and universities nearly a decade ago, spurred by technology-savvy students who demanded to use their personal devices on campus and by forward-thinking administrators who recognized that allowing network access using personal devices could improve the educational experience while aiding their recruiting efforts.
Wednesday, May 1st, 2013
In September, students will return to school for the fall semester. The next few months are the perfect time to prepare for the onslaught of personal devices on campus–the now-familiar BYOD tsunami.
Tuesday, April 23rd, 2013
The sun is shining, birds are chirping in the trees and you feel great as you stroll across campus. And then you hear it: the rising crescendo as the students return.
Friday, April 19th, 2013
I recently spoke with a network engineer for a company that’s a household name in the production of feature films, TV shows, DVDs and other media.
Wednesday, March 27th, 2013
When mobile devices access your network, each of those devices is a potential security risk – but you may not be aware of the magnitude.
Thursday, March 21st, 2013
Lately there have been lots of claims about technologies that can make personal devices safe for work. But there’s a tendency to focus on individual products or technologies, thinking they will solve all the problems of BYOD security One recent example is Samsung KNOX, a product that creates two containers, one for enterprise and one for personal use.
Monday, March 11th, 2013
HIMSS 2013 just wrapped up, and it was a very interesting and productive few days. One key takeaway was that mobility is now the norm in healthcare IT, with tablet devices in particular becoming as prevalent as desktop PCs and fixed terminals.
Wednesday, February 13th, 2013
The theme for the upcoming RSA 2013 Conference is “Security in Knowledge,” and there will be lots of attention on utilizing Big Data for security at the conference.
Tuesday, January 29th, 2013
While there are plenty of stories hyping the BYOD movement, there are also some under-reported aspects of BYOD that will impact your business if you are not prepared.
Wednesday, January 16th, 2013
A network professional recently described an experiment he did when investigating different options for network access control (NAC). He wanted to see how long it took another vendor’s NAC software to identify a device on the network.
*We value your privacy and use a variety of security measures to protect your personal information.
Our email is permission-based and we will only send you relevant information.