Bloor organises regular events for our end-user and vendor communities including:
  • Annual Bloor Symposium
  • Executive programme events such as roundtables, workshops and seminars
  • Executive peer-to-peer networking events
  • Tele-briefings and Webinars
We have found that CIOs and other senior executives are keen to engage in discussion and debate with technology partners. Bloor brings relevant service and technology partners together with our CIO and leadership communities, in ways that maximise the value to both, making them mutually beneficial conversations. Bloor events enable CIOs and other senior executives to come together with technology vendors and service providers in a non-sales environment for the mutual benefit of both the vendor and the business. What sets Bloor apart from other providers are three key points:
  • We have close relationships with many of the most successful CIOs around the world
  • The calibre of our facilitator, often an ex-CIO, will create a frank, honest, and constructive atmosphere where you can gain the insight into what your target audience thinks.
  • Being vendor, media & research agnostic, we are recognised by the CIO community as an independent voice, able to create mutually-beneficial conversations between CIOs and vendors
Bloor is happy to assist you if your organisation is running or participating in an event. For instance, we can provide a speaker on an appropriate topic from among our independent analysts or a facilitator. Where appropriate we can carry out background research on the issues being addressed. For more information, please contact us.
Loading Events

« All Events

  • This event has passed.

Take Back Network Control: Taming the Rogue Device Threat


Date:
19th November, 2013
Time:
7:00 am - 10:00 am
Event Category:
Attending from Bloor:

More Information / Register

How do you know what devices are accessing your network?
How do you detect a rogue device?
What can you do to prevent a threat in your network and minimize the risk?

With workforce mobility, bring your own device (BYOD) into the workplace, and guest access into your network, enterprises are realizing how important it is to track and monitor who and what is accessing the network. We’ve recently seen examples of how rogue devices have caused significant damage through gaining access to corporate infrastructure through network vulnerabilities. And, it’s alarming how easy it is for this to happen. A rogue or unknown device connects onto what you thought was a protected network, gains access and proceeds to cause often irrevocable damage which can result in millions of dollars to your business. Can you afford for this to happen? Attend this webinar, which focuses on how to manage this threat, reviewing the potential risks, and how technology can be applied to proactively eliminate the issue.

The panelists will look at how Network Access Control (NAC) or Endpoint Visibility, Access, and Security (EVAS) is being implemented by enterprises worldwide to address network security while continuing to support current infrastructure and the expanding mobile workforce.

Topics of discussion will include:

  • How to gain complete network visibility and control of all network devices from a cost effective, centralized deployment
  • How to manage endpoints and deal with BYOD, Rouge Devices, and Corporate Mobile devices
  • Achieving interoperability with third party security systems, such as patch management, endpoint compliance and SIEMs, to automate security control platform that uses contextual security decisions to make endpoint control actions.
  • Gaining control over BYOD, wireless systems, and unwanted applications and have the ability to black and/or white list these devices and/or applications

Slidedecks and Event Materials

There is one file to download for this event: