Home / Bradford Networks Blog
Monday, March 11th, 2013
HIMSS 2013 just wrapped up, and it was a very interesting and productive few days. One key takeaway was that mobility is now the norm in healthcare IT, with tablet devices in particular becoming as prevalent as desktop PCs and fixed terminals.
Wednesday, February 13th, 2013
The theme for the upcoming RSA 2013 Conference is “Security in Knowledge,” and there will be lots of attention on utilizing Big Data for security at the conference.
Tuesday, January 29th, 2013
While there are plenty of stories hyping the BYOD movement, there are also some under-reported aspects of BYOD that will impact your business if you are not prepared.
Wednesday, January 16th, 2013
A network professional recently described an experiment he did when investigating different options for network access control (NAC).
He wanted to see how long it took another vendor’s NAC software to identify a device on the network.
Thursday, December 20th, 2012
Most BYOD initiatives are aimed at allowing safe access to enterprise applications from within the operating environment of a user’s personal device.
Wednesday, November 21st, 2012
Jailbreaking is a fact of life in the BYOD world, but there is a great deal of confusion and uncertainty about how to handle it.
Wednesday, October 31st, 2012
More and more employees want to use their personal devices for work, on the corporate network. And more and more companies are embracing the idea.
Saturday, September 22nd, 2012
One of the ongoing NAC controversies has to do with the notion of agents. There are many misconceptions about agents: what they are, how they work, and if they’re even necessary to provide network access control.
Friday, August 10th, 2012
The differences between 802.1x and Network Access Control (NAC) for end point authentication is a topic that comes up time and again in my conversations with CIOs and IT managers.
Saturday, July 7th, 2012
It’s a fundamental problem for any company with a wired or wireless network: what’s the best way to authenticate devices and users?
Friday, June 22nd, 2012
Many companies are trying to understand what steps are needed for a successful implementation of BYOD. Most discussions and industry literature focus on technical issues such as how to identify offending devices, the best way to keep them off the network, or how to limit the types of devices.
Tuesday, May 15th, 2012
As this school year draws to a close, now is the time to think about addressing the new influx of devices and users that will be stepping onto your campus.
Friday, April 13th, 2012
Network access control (NAC) continues to gain traction as a key element of network and data security. As more and more commercial and government thought leaders embrace the technology, many of the messages are strikingly familiar.
Monday, March 19th, 2012
More and more enterprises are embracing Bring Your Own Device (BYOD) as they recognize the advantages of opening their networks to employee-owned devices.
Call Today (866) 990-3799 General Contact Form Site map
*We value your privacy and use a variety of security measures to protect your personal information.
Our email is permission-based and we will only send you relevant information.
Contact Bradford Product Support if you have forgotten your password, or if you are a customer who would like to request access to the Customer Portal.