15:30 - 16:00 Welcome coffee
16:00 - 18:00 Secure Access (ioT) und Demo
18:00 - 19:00 Q&A and Apero
Technology and market trends are rapidly changing the way enterprises design local area networks, onboard clients, and enable business applications of every type, and this has implications for how network access security is planned, deployed, and managed. As a result, IT administrators are starting to recognize network access and network security can no longer be viewed independently and in fact are now dependent on each other. The number and types of network-connected wireless devices continues to grow unabated. BYOD (Bring Your Own Device) has become the norm, and enterprise networks have moved beyond connecting laptops, smartphones, and tablets. Now, the emerging IoT (Internet of Things) technology is bringing new device types to the enterprise in virtually every industry. However, this exponential increase in unsecured connected devices presents new vulnerabilities and a growing attack surface for hackers to exploit. On top of the challenges of BYOD onboarding, IoT devices such as wireless sensor nodes, location-based beacons, and other small devices pose an additional threat, since many cannot support a suite of security solutions. This puts the onus on the network to keep these devices secure.
Termine auf Anfrage - Kontaktieren Sie uns