Wireless Security White Papers

Results 1 - 25 of 253Sort Results By: Published Date | Title | Company Name
By: Aerohive     Published Date: Aug 03, 2015

Dieses Whitepaper dient als Leitfaden und erläutert die nötigen Anforderungen an Konnektivität und Produktivität, um Ihr Netzwerk auf die Mobilitätswelle vorzubereiten.

Tags : mobility, mobility technology, wireless. connectivity, network, security, byod, network architecture, network management
    
By: Aerohive     Published Date: Aug 03, 2015

This paper looks at how this mentality requires IT operations to architect an access network specifically with "mobile first" in mind.

Tags : mobility, mobility technology, wireless. connectivity, network, mobility first, it operations, network architecture, network management
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Aerohive     Published Date: Jun 15, 2015

Découvrez comment les organisations peuvent intégrer facilement et de manière sûre une gamme d’utilisateurs et de terminaux en fournissant des clés pré-partagées individuelles sur le même SSID.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Aerohive     Published Date: Jun 15, 2015

Ce document apporte des conseils permettant d’évaluer les réseaux Wi-Fi d’entreprise grâce à l’étude des exigences clés, des considérations de l’architecture, des 10 éléments inhérents à un réseau Wi-Fi et de l’utilisation du processus DDP pour sélectionner un fournisseur.

Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
    
By: Aerohive     Published Date: Jun 15, 2015

Dieses Dokument enthält Ratschläge für die Bewertung eines WiFi-Netzes im Unternehmen und analysiert die wichtigsten Anforderungen, architekturbezogene Erwägungen, 10 Sachen, die ein WiFi-Netz imstande zu tun sein muss, und benutzt das RFP Verfahren, um einen Zulieferer auszuwählen.

Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
    
By: Aerohive     Published Date: Jun 15, 2015

Lernen Sie, wie man einfach und sicher eine Palette von Benutzern und Geräten aktivieren kann, indem man jedem einen einmaligen Schlüssel zuweist.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s “Endpoint Security for Business: Technology in Action” to learn about threats you can see and those you can’t.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
By: Aerohive     Published Date: Jun 01, 2015

Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Aerohive     Published Date: Jun 01, 2015

This guide reveals how to evaluate enterprise WiFi Network.

Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and running multiple applications from both company and personal devices, sensitive corporate data is more vulnerable than ever before. For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

For virtualization security, there’s no one size fits all solution…and trying to fit your organization’s specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: TigerText     Published Date: Jun 11, 2015

Download this guideline for reinforcing existing BYOD security practices and discover how mobile health can minimize expenses, improve patient care and boost staff productivity.

Tags : tigertext, mobile security, wireless security, mobile devices, mobile workers, byod, smart phones, data protection
    
By: Cisco     Published Date: Jun 10, 2015

Vendor innovation is focused on supporting new application types and deployment options, with WAN optimization migrating toward more diverse platforms or to a WAN cloud.

Tags : wifi, wireless, technology, network, 802.11, cloud, network architecture, wireless infrastructure
    
By: Cisco     Published Date: Jun 10, 2015

Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity.

Tags : wifi, wireless, technology, network, application, infrastructure, network management, wireless application software
    
By: Aerohive     Published Date: May 19, 2015

This case study explores the solutions provided by choosing the controller-less wireless technology of Aerohive.

Tags : wi-fi solutions, eduaction, aerohive wi-fi solution benefits, wi-fi network challenges, wi-fi experience, wlan, improve education with wi-fi solutions, wlan solutions
    
By: Aerohive     Published Date: May 13, 2015

This paper gives information on how Aerohive AP130 provides high-performance data rates up to 876Mbps in the 5-GHz band.

Tags : aerohive ap130, network infrastructure, aerohive networks, wi-fi security and mobility packages, hardware platform, security, integrated application, wireless
    
By: Aerohive     Published Date: May 13, 2015

This ebook reveals how organisations can ensure a secure mobility platform that starts with a single AP.

Tags : wi-fi, mobility, security, mobile security, byod, mobility for staff, mobility for guests, mobility for byod
    
By: Aerohive     Published Date: May 13, 2015

HiveManager NG is a cloud-based, enterprise-class Wi-Fi management solution and is a breakthrough in management simplicity, flexibility, and redundancy.

Tags : hivemanager ng, aerohive, wi-fi solutions, network management system, network, how to simplify your wi-fi, wi-fi solutions, network simplification
    
By: Aerohive Networks     Published Date: May 06, 2015

This paper describes how to eliminate the complexity and cost of traditional wireless networks and create one that is ready for mobility.

Tags : mobility, networking, wi-fii, wireless, network architecture, network management, network performance, network provisioning
    
By: Cisco     Published Date: Apr 10, 2015

This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.

Tags : cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End