IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Network Security White Papers (View All Report Types)
 
The Economics of Cooperative Control – Protocols are Free
sponsored by Aerohive Networks
WHITE PAPER: Instead of regurgitating an architecture where costly, centralized controllers are needed, Aerohive followed the original intent of the 802.11 standard designers more closely and brought the technology to maturity. This paper explores how inter-AP protocols can execute the same functions performed by centralized controllers with lower cost.
Posted: 01 Apr 2011 | Published: 30 Mar 2011

Aerohive Networks

Hospital Improves Patient Care and Clinician Productivity with WLAN
sponsored by Juniper Networks, Inc.
WHITE PAPER: To facilitate high-quality patient care, Memorial Hospital deployed a wireless LAN to provide both data and voice access throughout the facility. The instantaneous communication and broad information access has significantly improved the quality of patient care, because it lets staff spend more time caring for patients and less time on paperwork.
Posted: 20 May 2011 | Published: 20 May 2011

Juniper Networks, Inc.

Building Secure Wireless LANs
sponsored by Aerohive Networks
WHITE PAPER: This white paper provides a holistic view of Wi-Fi security, offering guidelines to deploy a wireless network that’s as secure as your wired one.  
Posted: 06 Jun 2011 | Published: 02 Jun 2011

Aerohive Networks

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
sponsored by CDW Corporation
WHITE PAPER: Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
Posted: 08 Sep 2009 | Published: 16 Mar 2009

CDW Corporation

Conquering Today's Bring-Your-Own-Device Challenges
sponsored by Aruba Networks
WHITE PAPER: It is vital to consider the effect BYOD will have on your network before allowing it in your enterprise. In this resource discover the new networking requirements of BYOD to help you embrace it for the better of your enterprise.
Posted: 15 Apr 2012 | Published: 23 Mar 2012

Aruba Networks

Building Mobility into Your Network
sponsored by NETGEAR Inc.
WHITE PAPER: Business environments have become increasingly dynamic and have created the demand for unprecedented levels of workforce mobility. These demands for business mobility require networks and data to be securely accessible anytime and anywhere − throughout the office, as well as from remote locations. Read this white paper to find out more.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

NETGEAR Inc.

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

5 Steps to Secure the Wireless Network
sponsored by NETGEAR Inc.
WHITE PAPER: Today’s organizations increasingly rely on the ease and lower cost of wireless networking. Schools and businesses are investing in Wi-Fi to leverage benefits including more flexible network connectivity, improved productivity, and reduced capital expense. Read this white paper to learn how to incorporate wireless connectivity into your everyday.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

NETGEAR Inc.

Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
sponsored by Insight
WHITE PAPER: Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
Posted: 13 May 2013 | Published: 13 May 2013

Insight
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement