EXPLORING ZERO TRUST IN ACTION:
Securing Users, Devices, and Access

Syscomm is organising a webinar exploring how organisations can take control of who and what connects to their network and why identity-based security is no longer optional. Powered by Cloud Network Access Control and Universal Zero Trust Network Access, this session is built for IT leaders navigating the reality of hybrid workforces, unmanaged devices, and growing compliance demands. We’re bringing together Robert Wright from Extreme Networks and Anton Beehl from Syscomm to share their frontline expertise on the challenges IT teams face today.

Thursday, 16th April 2026

11:00 - 12:00 BST

Online - Free

-YOUR SPEAKERS

In Conversation

Anton Beehl is an Account Director at Syscomm Ltd, specialising in designing and delivering secure, scalable IT solutions that solve real-world challenges. With experience across both technical delivery and strategic leadership, he bridges the gap between infrastructure, security, and business outcomes. Having worked with organisations across manufacturing, professional services, logistics, and financial sectors, Anton has a deep understanding of the operational, compliance, and infrastructure challenges that businesses face. 

Robert Wright is Technology Leader at Extreme Networks, with deep expertise in enterprise networking and security, with a strong focus on Extreme Networks solutions and customer success. His background spans technical strategy, partner engagement, and customer-facing leadership, helping organisations design and adopt modern, secure network infrastructures that deliver real business value. He is known for combining strong technical knowledge with a clear customer focus, enabling partners and end users to achieve better outcomes through innovative networking and cyber security solutions.

-WHAT WE’LL COVER

Securing the Future of Connected Organistaions

From securing remote workers to managing contractor devices and enforcing compliance across multi-site environments, this session addresses the access control challenges modern IT teams deal with every day.

Demystifying Zero Trust Network Access

What it actually means in practice, why it matters beyond the buzzword, and how it shifts your security posture from perimeter-based to identity-first.

The 1:1 Device Challenge

Contractors, visitors, BYOD, IoT sensors, and operational technology that every organisation has devices it doesn't fully control. We'll explore how Cloud NAC gives you visibility and policy enforcement over every connection.

Securing Hybrid & Multi-Site Environments

Whether you're operating across warehouses, branch offices, factory floors, or remote locations, we'll discuss how a cloud-based NAC approach scales without adding infrastructure overhead.

Identity-Based Access & Continuous Compliance

Go beyond day-one onboarding. Learn how identity, device health, and location work together to continuously assess and enforce access policies, not just at connection time.

From Visibility to Action: Real-Time Network Intelligence

See what's on your network, understand its compliance state, and act on threats automatically. We'll cover how NAC feeds into your wider security ecosystem to close the gaps.

Event Details

A calendar invite and joining link will be sent to your inbox.