Wireless Security White Papers

Results 1 - 25 of 251Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Aerohive     Published Date: Jun 15, 2015

Dieses Dokument enthält Ratschläge für die Bewertung eines WiFi-Netzes im Unternehmen und analysiert die wichtigsten Anforderungen, architekturbezogene Erwägungen, 10 Sachen, die ein WiFi-Netz imstande zu tun sein muss, und benutzt das RFP Verfahren, um einen Zulieferer auszuwählen.

Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
    
By: Aerohive     Published Date: Jun 15, 2015

Lernen Sie, wie man einfach und sicher eine Palette von Benutzern und Geräten aktivieren kann, indem man jedem einen einmaligen Schlüssel zuweist.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: TigerText     Published Date: Jun 11, 2015

Download this guideline for reinforcing existing BYOD security practices and discover how mobile health can minimize expenses, improve patient care and boost staff productivity.

Tags : tigertext, mobile security, wireless security, mobile devices, mobile workers, byod, smart phones, data protection
    
By: Aerohive     Published Date: Jun 01, 2015

Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Aerohive     Published Date: Jun 01, 2015

This guide reveals how to evaluate enterprise WiFi Network.

Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
    
By: Aerohive     Published Date: Jun 15, 2015

Découvrez comment les organisations peuvent intégrer facilement et de manière sûre une gamme d’utilisateurs et de terminaux en fournissant des clés pré-partagées individuelles sur le même SSID.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Aerohive     Published Date: Jun 15, 2015

Ce document apporte des conseils permettant d’évaluer les réseaux Wi-Fi d’entreprise grâce à l’étude des exigences clés, des considérations de l’architecture, des 10 éléments inhérents à un réseau Wi-Fi et de l’utilisation du processus DDP pour sélectionner un fournisseur.

Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s “Endpoint Security for Business: Technology in Action” to learn about threats you can see and those you can’t.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
By: Cisco     Published Date: Jun 10, 2015

Vendor innovation is focused on supporting new application types and deployment options, with WAN optimization migrating toward more diverse platforms or to a WAN cloud.

Tags : wifi, wireless, technology, network, 802.11, cloud, network architecture, wireless infrastructure
    
By: Cisco     Published Date: Jun 10, 2015

Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity.

Tags : wifi, wireless, technology, network, application, infrastructure, network management, wireless application software
    
By: Aerohive     Published Date: May 19, 2015

This case study explores the solutions provided by choosing the controller-less wireless technology of Aerohive.

Tags : wi-fi solutions, eduaction, aerohive wi-fi solution benefits, wi-fi network challenges, wi-fi experience, wlan, improve education with wi-fi solutions, wlan solutions
    
By: Aerohive     Published Date: May 13, 2015

This paper gives information on how Aerohive AP130 provides high-performance data rates up to 876Mbps in the 5-GHz band.

Tags : aerohive ap130, network infrastructure, aerohive networks, wi-fi security and mobility packages, hardware platform, security, integrated application, wireless
    
By: Aerohive     Published Date: May 13, 2015

This ebook reveals how organisations can ensure a secure mobility platform that starts with a single AP.

Tags : wi-fi, mobility, security, mobile security, byod, mobility for staff, mobility for guests, mobility for byod
    
By: Aerohive     Published Date: May 13, 2015

HiveManager NG is a cloud-based, enterprise-class Wi-Fi management solution and is a breakthrough in management simplicity, flexibility, and redundancy.

Tags : hivemanager ng, aerohive, wi-fi solutions, network management system, network, how to simplify your wi-fi, wi-fi solutions, network simplification
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: Aerohive Networks     Published Date: May 06, 2015

This paper describes how to eliminate the complexity and cost of traditional wireless networks and create one that is ready for mobility.

Tags : mobility, networking, wi-fii, wireless, network architecture, network management, network performance, network provisioning
    
By: Cisco     Published Date: Apr 10, 2015

This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.

Tags : cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan
    
By: Cisco     Published Date: Apr 10, 2015

While providing your customers and guests with Wi-Fi, you can give them pertinent information, individual attention, and special offers. And you can learn how, where, and when they move through your venue. Customers or guests passing through your store, hotel, or other venue increasingly expect free Wi-Fi. They also expect personal service. You can give them both, which can help boost your sales. And in doing so, you can gain information that will help make your venue more attractive and profitable.

Tags : cisco, wifi, wireless. wan, wlan, network design, it solutions, network performance, quality of service
    
By: Cisco     Published Date: Apr 10, 2015

Compare Switches & Get Free Resources Our guides and free service can help you prepare for mobility, advanced security, and simplicity with the new Catalyst switches.

Tags : cisco, catalyst, networks, byod, mobile computing, wifi, bandwidth management, infrastructure
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Users Beware: 10 Security Tips to Share with Your Users - ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to IT admins to share with users so they are more aware of the security traps they face every day.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: Cisco     Published Date: Jan 21, 2015

Camera intelligence continues to expand and offer options that simply did not exist before. Nick Kong joins TechWiseTV for a little show and tell with the latest 6000 series of IP Cameras.

Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
By: Dell     Published Date: Jan 21, 2015

Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.

Tags : dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure, infrastructure, storage virtualization, disaster recovery
    
By: Entrust     Published Date: Jan 16, 2015

With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.

Tags : entrust, server, risk, assessment, authentication, standards, layered, authentication
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End