IT Systems  >   Communications Networks  >   LAN  >  

Wireless LAN

RSS Feed    Add to Google    Add to My Yahoo!
Wireless LAN White Papers (View All Report Types)
A Guide to Delivering Secure Wireless LAN
sponsored by Fortinet, Inc.
WHITE PAPER: In this guide, you will learn how to deploy comprehensive wireless security to your LAN—regardless the size of your business, your network topology, and cloud-based Wi-Fi management. Discover a WLAN portfolio that will address the Wi-Fi needs of SMBs as well as large-scale enterprises.
Posted: 03 Nov 2015 | Published: 02 Nov 2015

Fortinet, Inc.

Ask Questions Until You Get the Right Answers and the Right Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Establishing a relationship with a trusted reseller can help you turn your network into something that matches your business and fulfills the specific needs of your organization.
Posted: 12 Dec 2011 | Published: 08 Dec 2011

Cisco Systems, Inc.

Enabling High-Performance for Apple iPads in the Enterprise
sponsored by Aruba Networks
WHITE PAPER: Learn about the specific challenges of deploying iPads in the enterprise, how to configure an iPad for a wireless land area network (WLAN), and a specific WLAN solution that offers scalable performance in a high density network -- ideal for the mobile workplace.
Posted: 05 Nov 2010 | Published: 05 Nov 2010

Aruba Networks

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007

Juniper Networks, Inc.

Wireless Site Survey Best Practices
sponsored by Fluke Networks
WHITE PAPER: This paper provides insight into best practices for executing wireless site surveys.
Posted: 24 Apr 2008 | Published: 01 Apr 2008

Fluke Networks

Tired of Rogues - Solutions for Detecting & Eliminating Rogue Wireless Networks
sponsored by AirDefense Inc.
WHITE PAPER: This paper provides an overview of the different types of rogue wireless devices, the risks faced by enterprises due to their proliferation and multiple approaches to detecting and mitigating them.
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Locating Rogue 802.11n and Legacy Wireless Access Points
sponsored by Fluke Networks
WHITE PAPER: Learn more about the omnidirectional and unidirectional search methods for locating rogue access points to improve wireless network security.
Posted: 03 Oct 2008 | Published: 03 Oct 2008

Fluke Networks

Public or Private Cloud: The Choice is Yours
sponsored by Aerohive Networks
WHITE PAPER: This resource provides an overview of public, private and hybrid clouds, their key advantages and disadvantages, and tips that will help you select the best option for your organization.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Aerohive Networks

The Ultralight Branch
sponsored by Aerohive Networks
WHITE PAPER: Access this whitepaper to learn more about enterprise connections and how ultralight branches can help keep users connected from multiple, small locations.
Posted: 08 Dec 2011 | Published: 08 Dec 2011

Aerohive Networks

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.
Posted: 17 Apr 2013 | Published: 31 Dec 2012

AirTight Networks, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement