Standards  >   Network Protocols  >   WLAN Protocols  >  

Wireless Access Protocol

RSS Feed   
Wireless Access Protocol Multimedia (View All Report Types)
Webinar: Cost-Effectively Replacing F5 Load Balancers
sponsored by Array Networks
WEBCAST: Are your load balancers due for a refresh? If so, view this F5 replacement Webinar, which includes a demo of Array Networks ADC features and capabilities. Learn how to meet your load balancing (ADC) requirements for literally half what you would pay with F5.
Posted: 17 Jul 2017 | Premiered: Jul 21, 2016

Array Networks

HP Network Automation 9.00 Evaluation
sponsored by Hewlett Packard Enterprise
TRIAL SOFTWARE: HP Network Automation software tracks, regulates, and automates configuration and software changes across globally distributed, multi-vendor networks.
Posted: 16 Jul 2010 | Premiered: 16 Jul 2010

Hewlett Packard Enterprise

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks

5 ways to improve WLAN reliability, performance and capacity
sponsored by Hewlett Packard Enterprise
WEBCAST: Learn best practices for wireless LAN design, deployment and management while discovering solutions to tackling WLAN network challenges.
Posted: 26 Aug 2011 | Premiered: Aug 26, 2011

Hewlett Packard Enterprise

IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010


IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010


The Network Evolution University: Next Generation Networks
sponsored by
VIRTUAL SEMINAR: In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present.
Posted: 29 Sep 2011 | Premiered: 09 Nov 2011

Securely Deliver Apps and Desktops to Any Enterprise
sponsored by Citrix
VIDEO: Tune into this video, in which Scott Lane, Citrix Distinguished Engineer, demonstrates how to leverage cloud resources like Office 365 and Azure AD to access your desktop environment. You'll see federated authentication services at work, and more.
Posted: 15 Feb 2018 | Premiered: 12 Feb 2018


It's Time for Field Service to Embrace Mobility
sponsored by Sprint
WEBCAST: In this webinar Zeus Kerravala of ZK Research talks about new ways to mobilize your workforce and why Mobility-as-a-Service makes so much sense. Watch to discover a smart, new way to think about mobility.
Posted: 14 Jun 2017 | Premiered: Feb 22, 2016


Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach
sponsored by HID Global
VIDEO: This brief video explores two-factor authentication(2FA) to enhance IAM strategies.
Posted: 12 Jun 2015 | Premiered: 31 May 2013

HID Global

Why Device Risk is an Essential Element for Your MFA Strategy
sponsored by iovation, Inc.
WEBCAST: Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.
Posted: 13 Dec 2017 | Premiered: Oct 31, 2017

iovation, Inc.

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID Global
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Contextual Access to Apps and Data Anywhere Anytime
sponsored by Citrix
VIDEO: Tune into this video to learn about the power of contextual access, which allows IT to set policies for who can access data based on location, device and network. You'll learn how to ensure all endpoints—whether dedicated desktop or mobile device—are properly protected.
Posted: 15 Feb 2018 | Premiered: 12 Feb 2018


Citrix UEM for Digital Workspaces
sponsored by Citrix
VIDEO: Today's workforce requires the same access to apps and data, regardless of location or device. Traditional client management tools are no longer sufficient. Unified endpoint management (UEM) combines client management with enterprise mobility management into a single pane of glass to manage users, devices, apps, and data.
Posted: 06 Feb 2018 | Premiered: 06 Feb 2018


How to Maintain Control of Documents and Files Shared with Others
sponsored by Citrix
VIDEO: Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018


YoYo Wallet Case Study: Enhanced Mobile App Testing and QA
sponsored by Applause
VIDEO: Find out how Yoyo Wallet improved their software testing abilities to identify and resolve bugs in their mobile payment apps faster and more efficiently without having to build a large internal QA department.
Posted: 26 Jan 2018 | Premiered: 22 Jan 2018


Mitigate Mobile Cloud App Risks
sponsored by MobileIron
VIDEO: Mobile apps are becoming the number one way employees are accessing cloud services, creating a new threat vector that you need to overcome: mobile app-to-cloud risk. This webcast explores 3 ways employees can introduce vulnerabilities by using cloud apps on mobile devices.
Posted: 07 Aug 2017 | Premiered: 07 Aug 2017


Podcast: Not All SD-WANs Are Equal, Performance Matters!
sponsored by Silver Peak
PODCAST: How do you go about choosing an SD-WAN that can simplify your network, make it more manageable, increase visibility and ultimately provide lower cost? Access the advice of principal analyst Zeus Kerravala as he discusses SD-WANs and the options you have in the market.
Posted: 29 Jul 2016 | Premiered: Jul 27, 2016

Silver Peak

Not All SD-WANs Are Equal, Performance Matters!
sponsored by Silver Peak
WEBCAST: How do you go about choosing a SD-WAN that can simplify your network, make it more manageable, increase visibility and ultimately provide lower cost? Access this webcast where industry veteran, Zeus Kerravala, discusses SD-WAN and highlights how to gain the upmost performance.
Posted: 29 Jul 2016 | Premiered: Jul 27, 2016

Silver Peak

Demo: Citrix Workspace XenMobile Service
sponsored by Citrix
WEBCAST: Watch this short video to learn about a mobility management service that gives you access to a single cloud based console to easily manage your users devices and business applications.
Posted: 26 Jan 2018 | Premiered: Jan 26, 2018


Public Housing Authority builds its future on Citrix Cloud and Microsoft Azure Government
sponsored by Citrix
VIDEO: See how LMHA, a public housing authority took a cloud-first strategy to modernizing its legacy IT system. Citrix Cloud & Microsoft Azure Government provides LMHA with workspaces accessible anywhere, at any time, on any device.
Posted: 16 Nov 2017 | Premiered: 18 Apr 2016


Mobility Purchasing: OpEx vs CapEx for Mobility
sponsored by Sprint
PODCAST: Zeus Kerravala discusses mobility budgets and how 'as-a-Service models' can better address these challenges now and in the future.
Posted: 12 Jun 2017 | Premiered: Jun 12, 2017


Cybersecurity Myths Debunked
sponsored by HelpSystems
WEBCAST: What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.
Posted: 04 Aug 2017 | Premiered: Aug 4, 2017


Getting to a State of OPEX: 3 Pillars of DaaS Success
sponsored by Citrix
VIDEO: To run desktops-as-a-service (DaaS) for hundreds or thousands of users, organizations must look beyond the simple desktop hosting and protocol discussion. This webinar discusses the three pillars of DaaS and how following them can shift your focus from CapEx to OpEx.
Posted: 01 Feb 2018 | Premiered: 01 Feb 2018


How the Internet of Things Is Transforming Industries and the Nature of Work
sponsored by Hewlett Packard Enterprise
WEBCAST: Jeff Kaplan, managing director and founder of THINKstrategies, provides his expert insight into what the IoT is all about, including the benefits and challenges you can expect. Learn how to create a digital workplace via IoT, how the IoT increases your security risks, and much more.
Posted: 13 Jul 2017 | Premiered: Jul 13, 2017

Hewlett Packard Enterprise

Employee & Device Monitoring: Dispelling the Myths
sponsored by Forcepoint
VIDEO: Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018


DNS High-Availability Tools: Open-Source Load Balancing Solutions
sponsored by Men and Mice
WEBCAST: Learn how DNS clients in different operating systems choose their DNS resolver among a list of available servers and how to minimize DNS threats with open-source load balancing tools.
Posted: 06 Nov 2017 | Premiered: Dec 8, 2016

Men and Mice

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement