EXPLORING ZERO TRUST IN ACTION:
Securing Users, Devices, and Access
Syscomm is organising a webinar exploring how organisations can take control of who and what connects to their network and why identity-based security is no longer optional. Powered by Cloud Network Access Control and Universal Zero Trust Network Access, this session is built for IT leaders navigating the reality of hybrid workforces, unmanaged devices, and growing compliance demands. We’re bringing together Robert Wright from Extreme Networks and Anton Beehl from Syscomm to share their frontline expertise on the challenges IT teams face today.
Thursday, 16th April 2026
11:00 - 12:00 BST
Online - Free
-YOUR SPEAKERS
In Conversation
Anton Beehl is an Account Director at Syscomm Ltd, specialising in designing and delivering secure, scalable IT solutions that solve real-world challenges. With experience across both technical delivery and strategic leadership, he bridges the gap between infrastructure, security, and business outcomes. Having worked with organisations across manufacturing, professional services, logistics, and financial sectors, Anton has a deep understanding of the operational, compliance, and infrastructure challenges that businesses face.
Robert Wright is Technology Leader at Extreme Networks, with deep expertise in enterprise networking and security, with a strong focus on Extreme Networks solutions and customer success. His background spans technical strategy, partner engagement, and customer-facing leadership, helping organisations design and adopt modern, secure network infrastructures that deliver real business value. He is known for combining strong technical knowledge with a clear customer focus, enabling partners and end users to achieve better outcomes through innovative networking and cyber security solutions.
-WHAT WE’LL COVER
Securing the Future of Connected Organistaions
From securing remote workers to managing contractor devices and enforcing compliance across multi-site environments, this session addresses the access control challenges modern IT teams deal with every day.
What it actually means in practice, why it matters beyond the buzzword, and how it shifts your security posture from perimeter-based to identity-first.
Contractors, visitors, BYOD, IoT sensors, and operational technology that every organisation has devices it doesn't fully control. We'll explore how Cloud NAC gives you visibility and policy enforcement over every connection.
Whether you're operating across warehouses, branch offices, factory floors, or remote locations, we'll discuss how a cloud-based NAC approach scales without adding infrastructure overhead.
Go beyond day-one onboarding. Learn how identity, device health, and location work together to continuously assess and enforce access policies, not just at connection time.
See what's on your network, understand its compliance state, and act on threats automatically. We'll cover how NAC feeds into your wider security ecosystem to close the gaps.
Event Details
A calendar invite and joining link will be sent to your inbox.
- Thursday, 16th April 2026
- 11:00 - 12:00 GMT
- Online