The majority of IT pros today are concerned with vulnerabilities posed by BYOD and IoT (Internet of Things) devices in the workplace. Personal electronics and smart technologies are penetrating even heavily regulated industries, with almost half of enterprises also looking to deploy IoT devices for security and monitoring.
With this proliferation, how can you get visibility of what’s really accessing the network, and retain control while giving users flexibility?
Join this session for practical insights from the guys who wrote the book on WLAN Security. Learn:
Practical strategies, free tips, and top tools to protect your network
Adrian Schofield sheds light on tech in South Africa
Mark Chillingworth on IT leadership