You Don't Know NAC: Applications, Innovations and User Insights from Evaluation to Deployment

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

According to some analysts, organizations can only account for half of devices on their network. With the influx of personal mobile devices and the drive to enable Bring Your Own Device policies, how can organizations manage the increased risks of data leakage, compliance and data privacy, and advanced persistent threats?

Network access control (NAC) technologies serve to provide real-time visibility and control of all users and systems attempting to access network resources via managed, unmanaged, wired and wireless devices.

Led by Senior Analyst Andy Kellet of Ovum Research, hear this expert and end-user panel expose key issues, considerations, plans and results with regard to modern-day NAC and NAC implementation. Hear Steve Orman, technical director from Sussex Health NHS, and Tony Whelton, director of IT services and development at Wellington College, share their insights regarding the potential roadblocks, hidden politics, new processes and lessons learned from opposite sides of the fence in terms of requirements, deployment and justification perspectives.

This webinar will:

  • Help you understand where, how, why and when NAC can be proactively employed proactively to automate controls, identify endpoint violations, expedite remediation and enable post-connect defenses
  • Examine the common pitfalls of NAC technologies and implementation from the perspective of two active end-users
  • Educate listeners on the NAC process – from technology evaluation to deployment

 

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

Speakers

Photo of Drew Amorosi

Drew Amorosi

Deputy Editor, Infosecurity Magazine

Photo of Andrew Kellett

Andrew Kellett

Senior Analyst, Ovum

Steve Orman

Technical Director, NHS IT Shared Service

Tony Whelton

Director of IT Services, Wellington College

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.