Hardware  >   Networking Hardware  >   Internetworking Hardware  >   Routers  >  

Intelligent Mobile Gateways

RSS Feed    Add to Google    Add to My Yahoo!
Intelligent Mobile GatewaysWhite Papers (View All Report Types)
 
Healthcare Giant Accelerates into Future of Wireless
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper describes how Cisco deployed solutions for high-bandwidth and high-density wireless locations within a hospital system with 14,800 employees, a massive campus, and 10,000 devices accessing the network at any given time.
Posted: 02 Sep 2014 | Published: 31 Oct 2013

Cisco Systems, Inc.

5 Tips for Wireless and BYOD
sponsored by Cisco
WHITE PAPER: More and more companies are implementing bring your own device (BYOD) policies within the enterprise in order to improve productivity and meet the needs of a changing workforce. However, diving into BYOD without a guide is a dangeous game -- fortunately, this resource can help.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

Cisco

Locating Rogue 802.11n and Legacy Wireless Access Points
sponsored by Fluke Networks
WHITE PAPER: Learn more about the omnidirectional and unidirectional search methods for locating rogue access points to improve wireless network security.
Posted: 03 Oct 2008 | Published: 03 Oct 2008

Fluke Networks

Hot Tips for Securing Your Wireless Network
sponsored by Sophos, Inc.
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos, Inc.

Riverside Healthcare System
sponsored by Aerohive Networks
WHITE PAPER: This crucial case study discusses how a healthcare organization with four facilities utilized a WLAN solution to eliminate slow client performance, centralize configuration and monitoring and open the door to many labor-saving applications.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Aerohive Networks

Slow and Steady Wins the Race to the Private Cloud
sponsored by IBM
WHITE PAPER: Access this exclusive, expert whitepaper to uncover the ins-and-outs of IBM SmartCloud – and how you can benefit from adopting this cloud deployment solution.
Posted: 26 Feb 2014 | Published: 28 Feb 2013

IBM

Bring Increased Agility & Availability to Business Applications
sponsored by NEC Corporation of America
WHITE PAPER: Read this informative white paper now to uncover the key features of a virtualization tool which will help you expand the benefits of virtualization to business applications such as SQL Server.
Posted: 01 May 2014 | Published: 31 Dec 2013

NEC Corporation of America

Have Control Over Remote Access—It's Time to Deploy New Laptops
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals several helpful tips surrounding the secure deployment of new laptops.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Dell, Inc. and Windows 8 Pro

Desktop Virtualization for On-Demand Growth
sponsored by Citrix
WHITE PAPER: Access this exclusive, informative resource to find out how one data center solution can provide you with the support you need for desktop virtualization.
Posted: 14 Mar 2014 | Published: 31 Dec 2013

Citrix

Mobile Security: Threats and Countermeasures
sponsored by MobileIron
WHITE PAPER: Mobile devices are quickly becoming the device of choice for the primary end-user. The intuitive user-experience, robust computing capabilities, extensive catalog of apps, and always-on connectivity combined with portability make mobile devices very compelling PC replacements.
Posted: 22 Aug 2014 | Published: 22 Aug 2014

MobileIron

Exploring New Features, Uses for Secure Web Gateway Appliances
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

SearchSecurity.com

Technical guide on Web Security Gateways
sponsored by SearchSecurity.com
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

SearchSecurity.com

Secure Web Gateways Decision Center
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Decision Center will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 29 Oct 2013 | Premiered: 23 Sep 2013

SearchSecurity.com

Expert Guide to Secure Web Gateways
sponsored by TechTarget
RESOURCE: Investments in secure Web gateways (SWG) are on the rise because traditional firewalls don't stop all attacks against enterprise systems. Don't waste another minute researching SWG feature options. Participate in our brief survey and waiting for you is your complimentary e-guide that outlines why SWG is worth the investment.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Ensuring the security of your mobile business intelligence
sponsored by IBM
WHITE PAPER: Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.
Posted: 24 Sep 2012 | Published: 24 Sep 2012

IBM

Security for the Mobile First Era
sponsored by MobileIron
RESOURCE: Along with the great benefits of mobility came the daunting security risks.  As mobile networks becoming increasingly more diverse, it's important to have a security plan that can keep up.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

MobileIron

Secure Web Gateway Overview: Implementation Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!
Posted: 10 May 2013 | Published: 10 May 2013

SearchSecurity.com

The 10-Minute Guide to Cloud Encryption Gateways
sponsored by CipherCloud
WHITE PAPER: Learn about the innovative solutions that have been developed to address the security concerns regarding business applications in the cloud.
Posted: 03 Sep 2014 | Published: 31 Dec 2013

CipherCloud

Exploring new web browser security capabilities
sponsored by SearchSecurity.com
WHITE PAPER: New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

SearchSecurity.com

The Truth About Mobile Business Intelligence
sponsored by Information Builders
WHITE PAPER: Mobile business intelligence (BI) is not a new concept, but the rumors that it's too complex, cumbersome, expensive, and limited have prevented most organizations from making the investment. Access this exclusive paper to uncover the 5 most common mobile BI myths debunked and how mobile BI can help you gain a competitive advantage.
Posted: 02 Aug 2012 | Published: 01 Aug 2012

Information Builders

2014 Global Threat Intelligence Report
sponsored by Solutionary
RESOURCE: This critical report outlines today's most dangerous cyber threats and the key security strategies that will keep your organization protected.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Solutionary

Enterprise Integration with Public Cloud Services using OAuth
sponsored by Forum Systems
WHITE PAPER: This white paper features a deployment strategy for an authentication and authorization solution that requires no third-party access to user credentials – so that your information stays within the company.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

The Balancing Act of Threat Intelligence and Risk
sponsored by CDW Corporation
WHITE PAPER: In this expert resource, get an inside at how risk management and threat intelligence affect global risk assessment, and how security officers can benefit from them.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

SearchSecurity.com University
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: With the Web the top threat vector, organizations need to ramp up their gateway protection. However, it seems as though the number of antimalware solutions is getting out of hand. In this university, you'll learn about the different features available in Web security gateways and the evolution of antimalware to meet the changing threat landscape.
Posted: 22 Jan 2013 | Premiered: 23 Jan 2013

SearchSecurity.com

Mobile Business Intelligence 101: Proven Strategies and Use Cases
sponsored by Information Builders
WHITE PAPER: The following white paper explores mobile business intelligence—what it is, how it's evolving, what applications exist, and how to address security concerns. Also gain access to real-world use cases, technology recommendations, and much more.
Posted: 22 May 2014 | Published: 22 May 2014

Information Builders

Cisco Unified Communications Manager
sponsored by Global Knowledge
WHITE PAPER: Unified Communications has gained status as a widely adopted way of communicating. This technology brings an incredible feature set to even smaller business entities. For most companies, the Cisco Communications Manager Express, or CUCM, can enable comprehensive voice communications with a wealth of advanced features.
Posted: 18 Jun 2013 | Published: 28 May 2013

Global Knowledge

IBM Cognos Business Intelligence for Mobile workers
sponsored by IBM
WEBCAST: The following webcast demonstrates the power of mobile analytics and how you can assume a competitive place within the business realm. Discover a powerful new mobile collaboration platform that allows you to get the most out of data and interact with your intelligence in new ways.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

IBM

5 Best Practices for Mobile Business Intelligence
sponsored by Tableau Software
WHITE PAPER: Going mobile doesn't just happen, there are signifcant differences between data at your desk and data on the go. Mobile business intelligence with an author-once, flexible approach can help you deploy faster and make your system more useful. Read on to learn 5 best practices for mobile BI.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Tableau Software

The Challenge of Mobile Business Intelligence: Developing a Successful Strategy for the New Mobility
sponsored by IBM
WHITE PAPER: Despite limitations, the mobile workforce has demanded access to BI from their smartphones without losing features or facing challenges. Read this essential report to get the insights on mobile BI you need to successfully implement these features into your company.
Posted: 24 Sep 2012 | Published: 24 Sep 2012

IBM

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

Malware Attacks Demand a New Malware Defense Approach
sponsored by SearchSecurity.com
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

This Changes Everything Mobile Analytics and the Future of Business
sponsored by Tableau Software
CASE STUDY: Read the following collection of brief case studies to see how the mobile transformation can empower you organization to make better, faster decisions, achieve significant cost savings, and give you an advantage over the competition.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Tableau Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement