IT Management  >   Systems Operations  >   Networking  >  

Wireless Networking

RSS Feed    Add to Google    Add to My Yahoo!
Wireless NetworkingReports
 
Expert Tips on Getting Mobile Securely with Virtual Desktops
sponsored by SearchSecurity.com
EGUIDE: In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices.
Posted: 30 Sep 2011 | Published: 30 Sep 2011

SearchSecurity.com

Protect Sensitive Data on Laptops - Even for Disconnected Users
sponsored by Citrix Systems, Inc.
WHITE PAPER: Securing corporate data is a top IT imperative and with more employees working from alternative locations, the mobile security challenge has become a critical focus for IT.  Read this white paper to understand how local virtual desktops based on Citrix XenClient should be a part of your security strategy.
Posted: 02 Aug 2012 | Published: 02 Aug 2012

Citrix Systems, Inc.

Installation and Configuration Guide: BlackBerry Enterprise Server Express for Microsoft Exchange
sponsored by BlackBerry
TECHNICAL ARTICLE: The BlackBerry® Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices.
Posted: 18 Oct 2010 | Published: 16 May 2010

BlackBerry

The Forrester Wave: Mobile Collaboration, Q3 2011
sponsored by IBM
WHITE PAPER: Mobile communications have been a stronghold in the workforce. Mobile collaboration is putting collaboration workloads onto smartphones and tablets and delivering great user experience anytime, anywhere, on any device.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM

HKMP Case Study: BlackBerry Solution is on the Money for Accounting Firm
sponsored by BlackBerry
CASE STUDY: Access this case study to learn how an accounting firm used BlackBerry® smartphones to meet their needs for almost immediate communications, collaboration, document access and security.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry

The iEverything Enterprise: Understanding and Addressing IT's Dilemma in a World Dominated by Wireless Smart Devices
sponsored by Aerohive Networks
WHITE PAPER: Virtualization, cloud computing and wireless technologies are providing gains in productivity and cost savings. Enterprise applications can now be delivered to almost any device, regardless of whether they are issued corporately or personally owned. Learn how almost every IT department is experiencing the effects of smart device adoption.
Posted: 09 Sep 2011 | Published: 09 Sep 2011

Aerohive Networks

Maintaining Wireless Network Availability in Hospitals
sponsored by HP & Intel®
EBOOK: This e-book from SearchHealthIT.com takes an in-depth look at the primary concerns and drivers behind wireless network connectivity in health care. Inside, uncover an overview of 3 primary wireless technologies to gain a better understanding of how to provide wireless access to hospital staff.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

HP & Intel®

E-Zine: Wired and wireless: Can you achieve an integrated network
sponsored by SearchNetworking.com
EZINE: This expert E-Zine will help IT professionals learn more about the challenges of networking and some best practices for managing wired and wireless technologies. Read on to learn more about unified architecture, unified wireless management, combining wired and wireless security, and more.
Posted: 18 Apr 2013 | Published: 30 Apr 2011

SearchNetworking.com

Mobility and Security: Dazzling Opportunities, Profound Challenges
sponsored by McAfee, Inc.
ANALYST REPORT: Mobility offers a number of dazzling opportunities, but it also comes with some profound challenges relating to security and privacy. This report examines the current state of mobile security, including common problems mobility can present, and offers key recommendations that all businesses and consumers should consider to mitigate risks.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

McAfee, Inc.

Successful Mobile Deployments Require Robust Security
sponsored by BlackBerry
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 15 Oct 2010 | Published: 20 May 2009

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement