What's Really On Your Network?

On-Demand recording

Watch this workshop to hear about the best practices in handling risks posed by known and unknown devices on your network, including BYOD and connected ‘things’ (IoT).

With the complexity of wired/wireless networks, it can be difficult to know what devices are attempting access, even before setting rules on what they can do!  But a robust network access control approach can unify endpoint protection, authentication and compliance – putting you back in control. We will review:

  • Key risk assessment questions, plus strengths and weaknesses of different approaches
  • Best practices for identifying and setting access policies for device types
  • How to handle non-compliant devices and boost security defenses
  • Controlling BYOD and connected ‘things’– a major security risk at 1 in 5 companies (Gartner, 2018)