Full Control Networks are hosting an educational event in a choice of 2 locations
Retain control of your Network: Get visibility, meet compliance & protect it
“Network Manager” defines responsibility, but with users, staff and unknown devices constantly putting the network at risk, retaining control and satisfying policies can be a huge challenge.
Aside from our roots in network performance Full Control Networks can also support you taking a pro-active approach, in adding greater visibility and control over more areas of your network – if you’re going to be blamed for it or spend hours fixing it or need to prove you comply, you might consider some technology that can really help.
At this workshop speakers from Portnox, LogPoint, Bromium, Thycotic and Full Control will offer their expert knowledge and advice about:
- Controlling who and what’s connected to your network - the power of visibility by Portnox
- Using the logs in your servers/switches/routers to comply to PCI and GDPR - get insight from LogPoint
- Letting your users click and open anything safely - unique technology from Bromium
- Managing and controlling privileged account access and passwords - with advice from Thycotic
- Looking at the inside and outside network data for activity to compromised locations - with Plixer and Ixia
- Getting the data in your network to the tools that need to see it - how Datacom Taps can help
Knowing who and what is connected to the network is an increasingly difficult task
When these devices have been identified, do you need to act and restrict them in some way, change what they can see or block them completely? What if you could see in real-time every IP device connected to your network and have it categorised and managed in accordance with your compliance policies?
Log data is plentiful and offers a wealth of useful information
The key is organising it and making it work for you. Correctly organised these logs form the key part of your PCI, GDPR compliance requirements with dedicated reporting built in.
Users will always open attachments of unknown origin, click on links in emails and get sent files from seemingly safe sources
However, if your PC is safely isolated from these files and pages but you can still click on them regardless, then nothing is missed and staff don’t have to waste time checking these thing out.
Admin passwords are shared amongst many and also a key part of how software products communicate with each other
Staff leaving or contract staff needing access to privileged accounts can lead to situation where the key information is not under control, maybe just written on the whiteboard, but the damage when they’re abused can be fatal. Learn how to keep them safe, in a vault, with access by user.
Check the network data for traffic trying to get out to unwanted sites, block DNS or simply use up resources to create vulnerabilities
Network traffic analysis, looking for DDoS and malware issues inside the network, blocking attempts to attack your Firewalls – different ways to look at the security issues in your traffic.
Get data from the network and into all your tools
All security and analysis tools are only as good as the data that’s fed into them. With the complexity of diverse paths, encapsulated data, virtual environments and aggregated links this needs to be thought through and correctly designed.
Choice of 2 locations
- Wed 15th November 2017 at Chill Factore, Manchester, M41 7JA
- Friday 17th November 2017 at SnoZone, Castleford, WF10 4TA
Details of the day
Time: 9am until 3pm
What’s included: Bacon butties on arrival, plenty of tea / coffee, lunch, car parking
The Extras: Join us for a sledging session afterwards - kit for the snow activities is included - just bring gloves and appropriate footwear!
The cost: Nothing!
Places are limited, so email us now to book your place!