Bloor organises regular events for our end-user and vendor communities including:
  • Annual Bloor Symposium
  • Executive programme events such as roundtables, workshops and seminars
  • Executive peer-to-peer networking events
  • Tele-briefings and Webinars
We have found that CIOs and other senior executives are keen to engage in discussion and debate with technology partners. Bloor brings relevant service and technology partners together with our CIO and leadership communities, in ways that maximise the value to both, making them mutually beneficial conversations. Bloor events enable CIOs and other senior executives to come together with technology vendors and service providers in a non-sales environment for the mutual benefit of both the vendor and the business. What sets Bloor apart from other providers are three key points:
  • We have close relationships with many of the most successful CIOs around the world
  • The calibre of our facilitator, often an ex-CIO, will create a frank, honest, and constructive atmosphere where you can gain the insight into what your target audience thinks.
  • Being vendor, media & research agnostic, we are recognised by the CIO community as an independent voice, able to create mutually-beneficial conversations between CIOs and vendors
Bloor is happy to assist you if your organisation is running or participating in an event. For instance, we can provide a speaker on an appropriate topic from among our independent analysts or a facilitator. Where appropriate we can carry out background research on the issues being addressed. For more information, please contact us.
Loading Events

« All Events

  • This event has passed.

Defending against the rogue - Technology Solutions to Address unwanted Users, Devices and Applications

14th October, 2014
2:00 pm - 3:00 pm
Event Category:
Attending from Bloor:

More Information / Register

Securing your network against unwanted and unknown threats has become mission critical. Many organizations, however, are in the dark as to what is on their network—making it impossible to control access and mitigate risk. This webinar will feature new research in a Bloor Research report by Fran Howarth, which looks at how next-generation NAC technologies have become essential tools in the security arsenal for preempting rogue user, device, and application risks and ensuring that sensitive data is kept safe. Fran will be joined by ForeScout Systems Engineer Manager, Toni Buhrke, who will demonstrate how next-generation NAC provides the visibility and controls required to keep corporate networks secure against rogue devices.

Attendees will learn how:

  • Next-generation NAC technologies provide visibility across the network to ensure that rogue devices, applications and users are brought under control and security issues efficiently resolved.
  • Continuous monitoring allows organisations to ensure network access and endpoint compliance policies are always enforced.
  • Integration with other security tools—wireless, MDM, security, SIEM, and advanced threat detection to provide actionable security intelligence.
  • Centralised management ensures implementations can be effectively managed and policies enforced.