BYOD and Top 5 Network Security Threats for 2012

Network Security threats continue to evolve, sometimes faster than the tools designed to protect against them. Are you confident that your network is safe, and that you have visibility into who and what is on your network at all times? For most network professionals, due to trends such as mobile device proliferation and the consumerization of IT, the answer is No.

In this webinar, Tom Murphy, Chief Marketing Officer at Bradford Networks, will describe the Top 5 Network Security Threats for 2012, and provide advice for securing your network against them. Attendees will learn:

  • Bring Your Own Device (BYOD) initiatives introduce risks to your network
  • How to limit network security threats caused by users accessing with mobile devices
  • Tips for securing IP-enabled mobile devices
  • Vulnerable devices connecting to your secure network creates backdoors for cyber criminals
  • Enable flexible network access without compromising security
  • Shared network-attached devices are restricted to what they can connect to therefore what they can be used for
  • IT Staff need 100% visibility into the devices being connected to their wired and/or wireless network
  • How to address security risks created by virtualization


Tom Murphy
CMO, Bradford Networks

As Chief Marketing Officer, Tom is responsible for the global strategy and execution of Bradford’s marketing efforts. In this role, Tom is focused on extending Bradford’s presence and relevance on the world stage, building and guiding Bradford’s global brand, to further the success of the company’s sales teams and partner ecosystem.

A 25-year veteran of the IT industry, Tom joined Bradford after five years as the chief strategy officer of Bit9, Inc., a security company that specializes in endpoint protection and application whitelisting. During his time at Bit9, Tom was awarded the Massachusetts Technology Leadership Council’s CXO of the Year award, expanded its global customer base from zero to hundreds of enterprise customers, evangelized around the world, and positioned Bit9 as the market leader in application whitelisting. Prior to Bit9, Tom held leadership positions at several highly successful software companies including Symantec/Relicore, BMC Software/BGS Systems and Precise Software Solutions/Veritas Software. While at Precise, Tom established leadership in the Application Performance Management (APM) market culminating with a highly successful IPO.

Tom holds a master’s degree in Computer Information Systems from Northeastern University in Boston and a bachelor’s degree, with a double major in Mathematics and Computer Science, from Westfield State University.



* All fields are required
Tell us about you
Job Title
First Name
Last Name
Tell us what is important to you
1. What is the primary network security challenge ?
2. How many devices are on your network?
3. What is the timeframe for your project?
" maxlength=128 class=fis style="width: 418;">