Hardware  >   Networking Hardware  >   LAN Hardware  >   WLAN Hardware  >  

Wireless LAN Access Points

RSS Feed    Add to Google    Add to My Yahoo!
Wireless LAN Access Points Multimedia (View All Report Types)
The Top Drivers of WLAN Deployment
sponsored by Cisco
VIDEO: In a rush? Access this brief video to quickly and easily pinpoint the information you need to learn what's driving the mobile workforce, and how a WLAN deployment can help.
Posted: 23 Oct 2015 | Premiered: 23 Oct 2015


Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

Cisco Prime Network Control System 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees.
Posted: 02 Jul 2012 | Premiered: 22 Jun 2012

Cisco Systems, Inc.

Enhance Security with Hardware Based Memory Protection
sponsored by Oracle Corporation
VIDEO: This video discusses a hardware based memory protection system that improves security and reliability and can fit a multitude of different data center designs. Watch now to learn how this memory protection can improve your data center security, reliability, and efficiency.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Jason Nolet Details New Solutions for Enterprise
sponsored by Brocade
VIDEO: This brief video uncovers two new network products that will help you adapt to the demands of new applications and ever-changing business requirements.
Posted: 29 Feb 2012 | Premiered: 21 Oct 2011


What is Intel Core vPro Technology
sponsored by Intel
VIDEO: This short video examines a hardware-assisted approach to PC management. Find out more about this technique and how it can help you properly manage your desktop environment, regardless of system states.
Posted: 15 Jun 2012 | Premiered: 15 Jun 2012


Borderless Networks: Innovation is Everywhere
sponsored by Cisco Systems, Inc.
WEBCAST: Cisco Borderless Networks includes video, trusted security, and mobility solutions that integrate wired and wireless technologies. Learn about the latest enhancements to Cisco Borderless Networks, including Catalyst access switches, the TrustSec network security solution, and 3900 Series ISR G2 routers.
Posted: 24 Mar 2010 | Premiered: Mar 23, 2010

Cisco Systems, Inc.

Forrester Webinar: Taming the Performance Beast
sponsored by Embarcadero Technologies, Inc.
WEBCAST: Smart strategies and tools for database optimization is critical to reduce costs in complex infrastructures and can help organizations defer hardware upgrades, get more out of existing systems, and improve developer and DBA productivity.
Posted: 26 Apr 2010 | Premiered: Apr 26, 2010

Embarcadero Technologies, Inc.

How Enterprise-Class Services Integrate with Real Companies
sponsored by Comcast
PODCAST: Discover why one of your peers chose Enterprise Services from Comcast to fulfill their need for a high-speed connection between their primary site and disaster recovery site.
Posted: 06 Mar 2013 | Premiered: Dec 31, 2012


Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013


Go Wireless within Minutes
sponsored by Cisco
VIDEO: This brief video explains how to set up a robust WiFi network for your small- to medium-sized business, all under 10 minutes. Learn how to make this possible for your organization with a limited IT department (or even none at all.)
Posted: 22 Oct 2015 | Premiered: 22 Oct 2015


Network Evolution University: Unified Wired and Wireless
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: In this classroom, you'll learn how enterprise network managers can build a unified access layer for wired and wireless LANs, establish unified network infrastructure to meet the needs of both wired and wireless users, and deploy network discovery and troubleshooting capabilities that span both wired and wireless access networks.
Posted: 18 Jul 2013 | Premiered: 22 Jul 2013


Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Adding Macs to Your Enterprise? Start with Identity Management
sponsored by Centrify Corporation
WEBCAST: Watch this on-demand webinar to learn how to completely integrate Macs into your network environment.
Posted: 03 Nov 2015 | Premiered: May 28, 2015

Centrify Corporation

Targeted Attack Protection: Bolstering Your Mobile Defenses
sponsored by Proofpoint, Inc.
WEBCAST: In this informative webcast, learn the top 6 malware apps users will encounter, how to secure Apple and Android devices, and mitigate malicious apps. Discover the top mobile app malware threats plaguing organizations and how to thwart them in their tracks before data leakage occurs.
Posted: 30 Oct 2015 | Premiered: Oct 7, 2015

Proofpoint, Inc.

Macs in the Wild: Securing Your Mobile Workforce and Their Devices
sponsored by Centrify Corporation
WEBCAST: This webinar, presented by Jason Snell, Editor in Chief with Six Colors, and Peter Havens, Director of Product Management with Centrify, teaches you how to set up a strong defense against would be device, identity and data theft for your mobile workforce.
Posted: 03 Nov 2015 | Premiered: Sep 4, 2015

Centrify Corporation

Cloud-Based Communication Case Study: Upgrading TheLadders
sponsored by ThinkingPhones
WEBCAST: In this webcast case study, Nick Giordano, Technical Support Specialist at TheLadders, explains how his organization upgraded their infrastructure by transitioning from a legacy system to cloud-enabled business communications through a third-party service.
Posted: 01 Sep 2015 | Premiered: Aug 10, 2015


Setting Security Policies for Enterprises With Diverse Endpoints
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Enterprise desktop admins have taken on the influx of new devices. In addition to bring your own desktop policies, other endpoint management practices and technologies have emerged to help IT keep control over sensitive data and corporate systems.
Posted: 25 Sep 2012 | Premiered: 26 Sep 2012

Empower Your Business Communications with UC and Mobile Workers
sponsored by ShoreTel
WEBCAST: In this webcast, you will discover how to unify your enterprise communication technologies—whether it is voice, video, or IM—regardless of location. Learn how to leverage the power of pure IP, to provide your organization with UC that will drive collaboration and enhance productivity.
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014


Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Technical Support Services: Integrated Multivendor Support
sponsored by IBM
VIRTUAL ENVIRONMENT: This overview discusses how an integrated multivendor support service can provide lifecycle-based recommendations around which hardware should be kept on OEM maintenance and helps you streamline support by serving as a single point of contact. Get access now to see how this service can simplify your technical support.
Posted: 11 Nov 2015 | Premiered: 11 Nov 2015


Network Evolution University: Optimizing Cloud Delivery
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This cloud networking classroom analyzes the new options available to enterprises to make sure cloud-based access is optimized for both the wired and wireless networks.
Posted: 10 Feb 2014 | Premiered: 14 Feb 2014


Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


How awareness computing is changing healthcare IT
sponsored by Aventura
VIDEO: Access this video to learn how custom desktops can improve speed of access and security at the point of care, and allow clinicians to spend more time with their patients.
Posted: 28 Aug 2015 | Premiered: 30 Apr 2015


A Solid Mobility Strategy Can Improve Quality of Service
sponsored by Dimension Data
VIDEO: Access this video to learn how one company improved their quality of service by implementing a sound mobility strategy. Tune in to learn how to craft a mobility strategy that will improve efficiency, and keep staff as well as clients happy.
Posted: 11 Mar 2015 | Premiered: 11 Mar 2015

Dimension Data

Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOD to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014


The Evolution of Wireless LAN Architectures
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: Today, wireless LANs are the primary and often only network in the organization. But are you making the most of the capabilities in your contemporary WLAN architecture? Learn about the role of the control plane - and the wireless controller – in optimizing your WLAN.
Posted: 17 Apr 2015 | Premiered: 17 Apr 2015


Security for Medical Equipment Makers and Healthcare Providers
sponsored by Symantec & Intuitive
WEBCAST: For healthcare organizations, securing medical devices and sensitive data on them/the network are two of the top security concerns. In this webcast, IT security experts Brian Witten of Symantec and Justin Ware of the Intuitive Technology Group discuss the security measures needed today.
Posted: 09 Nov 2015 | Premiered: Oct 26, 2015

Symantec & Intuitive

EtherScope Network Assistant -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: First responders to network emergencies need to solve problems fast on 10, 100 and Gig copper, fiber and wireless LAN networks. This tool helps frontline network professionals quickly solve the wide range of problems they encounter.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks

The New Campus Network is Simply Connected
sponsored by Juniper Networks, Inc.
WEBCAST: View this webcast and learn about Juniper’s recommendation for building a device and application agnostic network, which is simpler, higher performing and more secure, in an increasingly more mobile user setting.
Posted: 03 Jun 2011 | Premiered: May 18, 2011, 02:00 EDT (06:00 GMT)

Juniper Networks, Inc.

EtherScope Series II Network Assistant
sponsored by Fluke Networks
PRODUCT DEMO: EtherScope Series II Network Assistant helps first responders solve network problems on both sides of the access point - fast. This virtual demo will show you an ideal portable platform for rogue hunting and troubleshooting.
Posted: 01 Jun 2007 | Premiered: 01 Jan 2006

Fluke Networks
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement