Take Back Network Control: Taming the Rogue Device Threat

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

How do you know what devices are accessing your network?
How do you detect a rogue device?
What can you do to prevent a threat in your network and minimize the risk?

With workforce mobility, bring your own device (BYOD) into the workplace, and guest access into your network, enterprises are realizing how important it is to track and monitor who and what is accessing the network. We’ve recently seen examples of how rogue devices have caused significant damage through gaining access to corporate infrastructure through network vulnerabilities. And, it’s alarming how easy it is for this to happen. A rogue or unknown device connects onto what you thought was a protected network, gains access and proceeds to cause often irrevocable damage which can result in millions of dollars to your business. Can you afford for this to happen? Attend this webinar, which focuses on how to manage this threat, reviewing the potential risks, and how technology can be applied to proactively eliminate the issue.

The panelists will look at how Network Access Control (NAC) or Endpoint Visibility, Access, and Security (EVAS) is being implemented by enterprises worldwide to address network security while continuing to support current infrastructure and the expanding mobile workforce.

Topics of discussion will include:

  • How to gain complete network visibility and control of all network devices from a cost effective, centralized deployment
  • How to manage endpoints and deal with BYOD, Rouge Devices, and Corporate Mobile devices
  • Achieving interoperability with third party security systems, such as patch management, endpoint compliance and SIEMs, to automate security control platform that uses contextual security decisions to make endpoint control actions.
  • Gaining control over BYOD, wireless systems, and unwanted applications and have the ability to black and/or white list these devices and/or applications


Fran Howarth

Snr Analyst, Security, Bloor Research

    Hanan Levin

    VP, Product Management, ForeScout

      Stephen Pritchard

      Freelance Writer, Infosecurity Magazine

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.