IT Systems  >   Communications Networks  >   LAN  >  

Dual-mode Wireless LAN

RSS Feed    Add to Google    Add to My Yahoo!
Dual-mode Wireless LANReports
 
WLAN Planning For BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

Solution Spotlight: Wireless LAN performance and application optimization
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This solution spotlight answers the important questions companies should ask before implementing a WLAN.
Posted: 07 Oct 2013 | Premiered: 25 Oct 2013

SearchNetworking.com

Wireless LAN ITDC - Checklist #3
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchNetworking.com's three-part guide on wireless products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a wireless solution.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

SearchSecurity.com

Transforming Your WiFi Network Into A Secure Wireless LAN
sponsored by Fortinet, Inc.
WHITE PAPER: With businesses utilizing WLAN for BYOD strategies, it is more important than ever to secure your wireless networks. This guide explores a solution that allows a network of any size to take advantage of wireless technology without compromising the network's security.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Fortinet, Inc.

WLAN Access Control and Wi-Fi Network Needs
sponsored by SearchSecurity.com
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

SearchSecurity.com

Case Study: How Liverpool FC and Alexandra Palace successfully rolled out Wi-Fi
sponsored by Xirrus
EGUIDE: This expert e-guide examines two recent wireless case studies. Inside, learn how Liverpool FC and Alexandra Palace each navigated the challenges of Wi-Fi deployment and reaped the rewards of wireless.
Posted: 15 Aug 2013 | Published: 15 Aug 2013

Xirrus

Memorial Hermann Delivers Secure, Reliable Wireless for Mission-Critical Patient Care
sponsored by Aerohive Networks
WHITE PAPER: In this case study, learn how Memorial Hermann Health System is benefiting after upgrading to a wireless network.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Aerohive Networks

A Whirlwind Tour of Wireless Vulnerabilities
sponsored by AirMagnet
PRESENTATION TRANSCRIPT: This white paper discusses the steps you must take to ensure that your wireless network is security and how to guard against vulnerabilities.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

AirMagnet

Cisco Prime Network Control System 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees.
Posted: 02 Jul 2012 | Premiered: 22 Jun 2012

Cisco Systems, Inc.

Wireless LAN Reliability in the Unwired Enterprise
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines what it takes to maximize availability in the unwired enterprise, and explores the five elements needed to make the wireless LAN as dependable as wired Ethernet.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement