|Page (1) of 1 - 01/26/12||email article||print page|
Bradford Networks Webinar Outlines the Ten Steps Needed to Implement a Secure BYOD ProcessInteractive Session to Provide a Roadmap for Securing Network Access for Personal and Mobile Devices (January 26, 2012)
CAMBRIDGE, MA -- (Marketwire) -- 01/26/12 -- Bradford Networks, the best choice to enable secure network access for corporate-issued and personal mobile devices, announced details of its webinar today, "The 10 Immediate Steps to Secure a BYOD Process." This webinar will provide organizations with a clear roadmap for implementing a secure Bring Your Own Device (BYOD) process.
Frank Andrus, CTO, Bradford Networks
John Sheedy, director of product management, Bradford Networks
The BYOD trend has escalated to the point where organizations can no longer prohibit the use of personal devices in the workplace. As more employees demand to be able to use their personal devices on corporate networks, businesses need to implement a BYOD policy that bridges productivity with network security. This webinar will provide expert insight into devising a BYOD policy. By the end of the webinar, attendees will learn how to create and implement a BYOD policy that covers everything from what OS versions should be allowed, to providing network access based on role and device type.
Thursday, January 26, 2012: 10:00 a.m. - 11:00 a.m. ET
To register, please visit:
About Bradford Networks
Bradford Networks offers the best solution to enable secure network access for corporate-issued and personal mobile devices. The company's flexible Network Sentry platform is the first network security offering that can automatically identify and profile all devices and all users on a network, providing complete visibility and control. Unlike vendor-specific network security products, Network Sentry provides a view across all brands of network equipment and connecting devices, eliminating the network blind spots that can introduce risk.
Network Sentry is a trademark of Bradford Networks, Inc. All other trademarks contained herein are the property of their respective owners.
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=1867212
email: Email Contact
Copyright @ Marketwire
Related Keywords: network security, network access control, NAC, Office Equipment, Security, Management, CTO/CIO, Marketwire, Inc., , IT (Information Technology), Security, Other,