Wireless Security Research
-
The development of wired and wireless LANs in a hybrid work model
Sponsored by: TechTarget ComputerWeekly.comMany companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).
-
Mobile Payments Using Host Card Emulation with NFC
Sponsored by: TechTarget ComputerWeekly.comIn this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
-
The CIO's Guide to Fixed Mobile Convergence
Sponsored by: BlackBerryOrganizations seeking solutions that provide high-performance access while addressing security needs can leverage fixed mobile convergence (FMC) systems to enhance communication. This document explores why your organization should implement an FMC solution, the benefits of FMC and considerations for methods of implementation.
-
A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
Sponsored by: Motorola SolutionsThis paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
-
Security Threat Report: July 2009 Update
Sponsored by: SophosBusinesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
-
Secure Wireless Made Easy -- Selecting a Next-Generation Solution for Pervasive WLAN Implementations
Sponsored by: SonicWALLThis paper examines the characteristics of a next-generation solution that helps alleviate the prevailing issues and challenges associated with today's WLAN implementations. The emergence of products that conform to related criteria holds the key to enabling enterprises to fully realize the important benefits that wireless technology has to offer.
-
Disaster Recovery Planning for BlackBerry Enterprise Server for Microsoft Exchange
Sponsored by: BlackBerryThis document provides an overview of BlackBerry® Enterprise Server components and is intended to help administrators prepare for the design and delivery of disaster recovery procedures for the BlackBerry environment.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
Successful Mobile Deployments Require Robust Security
Sponsored by: Lopez ResearchNow that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
-
US Food Service - Streamline project includes Afaria
Sponsored by: Sybase, an SAP companyWatch this video to learn how US Food Service, the second largest food service provider, implemented Afaria from Sybase to streamline order entry and information management between their mobile sales force, distribution centers and the corporate office.
-
The CIO's Guide to Mobile Security
Sponsored by: BlackBerryLearn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
-
eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
Sponsored by: TechTarget ComputerWeekly.comCheck out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
-
eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
Sponsored by: TechTarget Mobile ComputingStructured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
-
Blackberry Enterprise Solution: Security Technical Overview
Sponsored by: BlackBerryThis document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
-
Wireless Networking: Five Questions to Start With
Sponsored by: Cisco Systems, Inc.This paper answers five questions about wireless networking, allowing you and your employees to stay connected to your company's information resources virtually anytime, anywhere.
-
Getting the Most from Your Wireless Network
Sponsored by: WildPackets, Inc.Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee.
-
Five Ways to Improve Your Wireless Security
Sponsored by: Cisco Systems, Inc.A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
-
Fast and Cost-Effective Unified Communications for Your Business
Sponsored by: Cisco Systems, Inc.The Cisco Unified Wireless Network is the industry's only unified wired and wireless solution to cost-effectively address the wireless LAN (WLAN) security, deployment, management, and control issues facing enterprises. Learn more in this brochure.
-
Housing Association Puts Staff into the Community, Increasing Personal Contact
Sponsored by: Cisco Systems, Inc.This case study showcases how The Community Gateway Association (CGA) became the first housing association in England to be set up as a 'community gateway'.
-
Medical Office Increases Productivity with New Communications System
Sponsored by: Cisco Systems, Inc.This video case study showcases a physician's practice implementing a phone system and reducing time required for appointment reminder calls from four hours to 15 minutes per day and achieving efficient contact with insurance companies.
-
Eco-Friendly Materials Importer Uses Technology to Grow
Sponsored by: Cisco Systems, Inc.In this video case study watch how amaZulu, an eco-friendly company that imports natural architectural materials from villages all around the world, uses Cisco technology to improve customer service and productivity.
-
Enterprise Wireless LAN Security
Sponsored by: Motorola SolutionsThis paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.
-
Unified Threat Management: The Best Defense against Blended Threats
Sponsored by: SonicWALLThe SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
-
Cisco Secure Wireless Office Solution for SMBs
Sponsored by: Cisco Systems, Inc.Designed for today's increasingly mobile businesses, the Cisco® Secure Wireless Office Solution helps enhance productivity by making information and business applications accessible anywhere, anytime.
-
Increase Productivity and Reduce Security Risks for Teleworkers
Sponsored by: SonicWALLThis paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.