ComputerWeekly.com Research Library

Powered by Bitpipe.com

Wireless Security Research

  • E-Guide: Mobile endpoint security and management - Best practices

    Sponsored by: TechTarget Security

    In this e-guide, uncover the challenges associated with selecting a data protection plan for your channel business as well as best practices you should consider in helping you through the process.

  • Presentation Transcript: How to Secure Your Mobile Devices

    Sponsored by: Dell SecureWorks

    In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization.

  • E-Book: Maintaining Wireless Network Availability In Hospitals

    Sponsored by: Aerohive Networks

    Healthcare facilities are prime candidates for wireless networks. But sorting through the technologies available, understanding their pros and cons and determining a strategy can be confusing. This e-book provides an overview of 3 wireless technologies to help healthcare IT leaders better understand how to provide wireless access to their users.

  • Building Secure Wireless LANs

    Sponsored by: Aerohive Networks

    This white paper provides a holistic view of Wi-Fi security, offering guidelines to deploy a wireless network that’s as secure as your wired one.  

  • It's All About Security: Things to Know Before You Open The Doors To Smartphones and Tablets in Your Enterprise

    Sponsored by: Sybase, an SAP company

    This white paper discusses mobile device security threats and how IT can manage and secure devices. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to protect end users, their devices, and the network infrastructure.

  • Network Evolution - Wired and Wireless: Can you achieve on an integrated network?

    Sponsored by: TechTarget Networking

    Read this Ezine to learn what options there are for companies having a unified architecture for their wireless networks, and what the advantages are.

  • The Economics of Cooperative Control – Protocols are Free

    Sponsored by: Aerohive Networks

    Instead of regurgitating an architecture where costly, centralized controllers are needed, Aerohive followed the original intent of the 802.11 standard designers more closely and brought the technology to maturity. This paper explores how inter-AP protocols can execute the same functions performed by centralized controllers with lower cost.

  • Wireless LAN Management Solution Overview

    Sponsored by: Juniper Networks, Inc.

    Juniper Networks Wireless LAN Management portfolio helps network managers and administrators oversee and control both the WLAN infrastructure and its mobility services.

  • Global Security Report 2011

    Sponsored by: Trustwave

    In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.

  • Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam

    Sponsored by: MessageLabs Symantec Hosted Solutions

    Todays wireless work environment poses new challenges for IT departments who must monitor and secure the online interactions of highly distributed and roaming workers. Companies are calling on security experts who can help organizations more effectively manage and protect their distributed workforce via the cloud.

  • Engineering the Wireless Hospital

    Sponsored by: Aerohive Networks

    Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. However, there are security, infrastructure, and connectivity obstacles to overcome. Check out this e-book to learn more.

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: BlackBerry

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • Implementing a Secure Wireless Network in an Educational Setting

    Sponsored by: NETGEAR Inc.

    Wireless connectivity has become a necessity in educational institutions of all levels. Students require Internet connectivity to conduct research, download assignments and communicate with their instructors. Likewise, educators utilize web portals to post assignments, and update class materials. Read this white paper to learn more. 

  • Building Mobility into Your Network

    Sponsored by: NETGEAR Inc.

    Business environments have become increasingly dynamic and have created the demand for unprecedented levels of workforce mobility. These demands for business mobility require networks and data to be securely accessible anytime and anywhere − throughout the office, as well as from remote locations. Read this white paper to find out more.

  • E-Book: Engineering the Wireless Hospital

    Sponsored by: TechTarget Health IT

    Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this exciting E-Book to learn more about topics like device security, running your network, and more.

  • Understanding High Availability for the BlackBerry Enterprise Server

    Sponsored by: BlackBerry

    Read this technical white paper to learn about the evolution of mobile devices and the introduction of high availability in a mobile context. Also learn about the Blackberry as well as load balancing, failover thresholds, and limited downtime upgrades.

  • AirMagnet WiFi Analyzer

    Sponsored by: AirMagnet

    AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise 802.11a/b/g/n networks. AirMagnet WiFi Analyzer solves end user WLAN issues while automatically detecting security threats and other wireless network vulnerabilities.

  • How to Unify Your Wireless Architecture Without Limiting Performance or Flexibility

    Sponsored by: D-Link

    So much is happening today to give you a chance to rethink your wireless architecture. Learn what to look for in a wireless architecture that not only provides the mobility and performance today’s applications need, but also lowers your costs of operations while increasing wireless security.

  • Secure Smartphone Apps: The Next Generation

    Sponsored by: BlackBerry

    The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take.

  • The CIO's Guide to Fixed Mobile Convergence

    Sponsored by: BlackBerry

    Organizations seeking solutions that provide high-performance access while addressing security needs can leverage fixed mobile convergence (FMC) systems to enhance communication. This document explores why your organization should implement an FMC solution, the benefits of FMC and considerations for methods of implementation.

  • Smart Policies for Personal-Liable Smartphones

    Sponsored by: BlackBerry

    This white paper addresses how businesses and employees can compromise between personal and business smartphone use, as well as benefit by establishing personal-liable smartphone policies.

  • Information Security Magazine - September 2009: Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.

  • Essential Guide to PCI DSS

    Sponsored by: Information Security Magazine

    This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.

  • Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind

    Sponsored by: CDW Corporation

    Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.

  • Taking a Strategic Approach to Enterprise Mobility

    Sponsored by: Sybase, an SAP company

    This webcast discusses everything you need to know about adopting a Mobile Enterprise Application Platform, such as the true value of adopting a Mobile Enterprise Application Platform, the trends you need to be tracking, and how to take a strategic approach to deployment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.