Wireless Security White Papers

Results 1 - 25 of 255Sort Results By: Published Date | Title | Company Name
By: TigerText     Published Date: Aug 30, 2015

Download this Healthcare Informatics e-book for a comprehensive understanding of the BYOD policy, the challenges faced, and the impact it could have on the industry.

Tags : tigertext, tiger text, byod, hippa compliance, patient data, secure data, records management, hacker detection
    
By: Silanis     Published Date: Aug 30, 2015

Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.

Tags : silanis, esignlive, electronic signature, regulatory compliance, compliance, health records, digital signature, signature
    
By: Kaspersky     Published Date: Aug 27, 2015

Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.

Tags : kaspersky, attacks, cyberattacks, business process, security costs, it budget, network security, anti virus
    
By: Cloud Sherpas     Published Date: Aug 10, 2015

This white paper outlines exactly what the Google solution delivers and the top five reasons why more enterprises are choosing to move to the cloud with Google every day.

Tags : google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration, migrating to google apps, cloud apps for business, google app development
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s “Endpoint Security for Business: Technology in Action” to learn about threats you can see and those you can’t.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and running multiple applications from both company and personal devices, sensitive corporate data is more vulnerable than ever before. For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

For virtualization security, there’s no one size fits all solution…and trying to fit your organization’s specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Aerohive     Published Date: Aug 03, 2015

Dieses Whitepaper dient als Leitfaden und erläutert die nötigen Anforderungen an Konnektivität und Produktivität, um Ihr Netzwerk auf die Mobilitätswelle vorzubereiten.

Tags : mobility, mobility technology, wireless. connectivity, network, security, byod, network architecture, network management
    
By: Aerohive     Published Date: Aug 03, 2015

This paper looks at how this mentality requires IT operations to architect an access network specifically with "mobile first" in mind.

Tags : mobility, mobility technology, wireless. connectivity, network, mobility first, it operations, network architecture, network management
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Aerohive     Published Date: Jun 15, 2015

Découvrez comment les organisations peuvent intégrer facilement et de manière sûre une gamme d’utilisateurs et de terminaux en fournissant des clés pré-partagées individuelles sur le même SSID.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Aerohive     Published Date: Jun 15, 2015

Ce document apporte des conseils permettant d’évaluer les réseaux Wi-Fi d’entreprise grâce à l’étude des exigences clés, des considérations de l’architecture, des 10 éléments inhérents à un réseau Wi-Fi et de l’utilisation du processus DDP pour sélectionner un fournisseur.

Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
    
By: Aerohive     Published Date: Jun 15, 2015

Dieses Dokument enthält Ratschläge für die Bewertung eines WiFi-Netzes im Unternehmen und analysiert die wichtigsten Anforderungen, architekturbezogene Erwägungen, 10 Sachen, die ein WiFi-Netz imstande zu tun sein muss, und benutzt das RFP Verfahren, um einen Zulieferer auszuwählen.

Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
    
By: Aerohive     Published Date: Jun 15, 2015

Lernen Sie, wie man einfach und sicher eine Palette von Benutzern und Geräten aktivieren kann, indem man jedem einen einmaligen Schlüssel zuweist.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Cisco     Published Date: Jun 10, 2015

Vendor innovation is focused on supporting new application types and deployment options, with WAN optimization migrating toward more diverse platforms or to a WAN cloud.

Tags : wifi, wireless, technology, network, 802.11, cloud, network architecture, wireless infrastructure
    
By: Cisco     Published Date: Jun 10, 2015

Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity.

Tags : wifi, wireless, technology, network, application, infrastructure, network management, wireless application software
    
By: Aerohive     Published Date: Jun 01, 2015

Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Aerohive     Published Date: Jun 01, 2015

This guide reveals how to evaluate enterprise WiFi Network.

Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
    
By: Aerohive     Published Date: May 19, 2015

This case study explores the solutions provided by choosing the controller-less wireless technology of Aerohive.

Tags : wi-fi solutions, eduaction, aerohive wi-fi solution benefits, wi-fi network challenges, wi-fi experience, wlan, improve education with wi-fi solutions, wlan solutions
    
By: Aerohive     Published Date: May 13, 2015

This paper gives information on how Aerohive AP130 provides high-performance data rates up to 876Mbps in the 5-GHz band.

Tags : aerohive ap130, network infrastructure, aerohive networks, wi-fi security and mobility packages, hardware platform, security, integrated application, wireless
    
By: Aerohive     Published Date: May 13, 2015

This ebook reveals how organisations can ensure a secure mobility platform that starts with a single AP.

Tags : wi-fi, mobility, security, mobile security, byod, mobility for staff, mobility for guests, mobility for byod
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End