Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

You Don't Know NAC: Applications, Innovations and User Insights from Evaluation to Deployment

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

According to some analysts, organizations can only account for half of devices on their network. With the influx of personal mobile devices and the drive to enable Bring Your Own Device policies, how can organizations manage the increased risks of data leakage, compliance and data privacy, and advanced persistent threats?

Network access control (NAC) technologies serve to provide real-time visibility and control of all users and systems attempting to access network resources via managed, unmanaged, wired and wireless devices.

Led by Senior Analyst Andy Kellet of Ovum Research, hear this expert and end-user panel expose key issues, considerations, plans and results with regard to modern-day NAC and NAC implementation. Hear Steve Orman, technical director from Sussex Health NHS, and Tony Whelton, director of IT services and development at Wellington College, share their insights regarding the potential roadblocks, hidden politics, new processes and lessons learned from opposite sides of the fence in terms of requirements, deployment and justification perspectives.

This webinar will:

  • Help you understand where, how, why and when NAC can be proactively employed proactively to automate controls, identify endpoint violations, expedite remediation and enable post-connect defenses
  • Examine the common pitfalls of NAC technologies and implementation from the perspective of two active end-users
  • Educate listeners on the NAC process – from technology evaluation to deployment

 

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

Speakers

Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Andrew Kellett

Andrew Kellett Senior Analyst, Ovum

    Steve Orman

    Steve Orman Technical Director, NHS IT Shared Service

      Tony Whelton

      Tony Whelton Director of IT Services, Wellington College