Wireless Security Research
-
A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
Sponsored by: Motorola SolutionsThis paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
-
Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions
Sponsored by: Sunbelt SoftwareIn this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor.
-
Security Threat Report: July 2009 Update
Sponsored by: SophosBusinesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
-
Secure Wireless Made Easy -- Selecting a Next-Generation Solution for Pervasive WLAN Implementations
Sponsored by: SonicWALLThis paper examines the characteristics of a next-generation solution that helps alleviate the prevailing issues and challenges associated with today's WLAN implementations. The emergence of products that conform to related criteria holds the key to enabling enterprises to fully realize the important benefits that wireless technology has to offer.
-
Disaster Recovery Planning for BlackBerry Enterprise Server for Microsoft Exchange
Sponsored by: BlackBerryThis document provides an overview of BlackBerry® Enterprise Server components and is intended to help administrators prepare for the design and delivery of disaster recovery procedures for the BlackBerry environment.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
Successful Mobile Deployments Require Robust Security
Sponsored by: Lopez ResearchNow that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
-
US Food Service - Streamline project includes Afaria
Sponsored by: Sybase, an SAP companyWatch this video to learn how US Food Service, the second largest food service provider, implemented Afaria from Sybase to streamline order entry and information management between their mobile sales force, distribution centers and the corporate office.
-
The CIO's Guide to Mobile Security
Sponsored by: BlackBerryLearn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
-
eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
Sponsored by: TechTarget ComputerWeekly.comCheck out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
-
eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
Sponsored by: TechTarget Mobile ComputingStructured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
-
Blackberry Enterprise Solution: Security Technical Overview
Sponsored by: BlackBerryThis document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
-
Wireless Networking: Five Questions to Start With
Sponsored by: Cisco Systems, Inc.This paper answers five questions about wireless networking, allowing you and your employees to stay connected to your company's information resources virtually anytime, anywhere.
-
Getting the Most from Your Wireless Network
Sponsored by: WildPackets, Inc.Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee.
-
Five Ways to Improve Your Wireless Security
Sponsored by: Cisco Systems, Inc.A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
-
Fast and Cost-Effective Unified Communications for Your Business
Sponsored by: Cisco Systems, Inc.The Cisco Unified Wireless Network is the industry's only unified wired and wireless solution to cost-effectively address the wireless LAN (WLAN) security, deployment, management, and control issues facing enterprises. Learn more in this brochure.
-
Medical Office Increases Productivity with New Communications System
Sponsored by: Cisco Systems, Inc.This video case study showcases a physician's practice implementing a phone system and reducing time required for appointment reminder calls from four hours to 15 minutes per day and achieving efficient contact with insurance companies.
-
Eco-Friendly Materials Importer Uses Technology to Grow
Sponsored by: Cisco Systems, Inc.In this video case study watch how amaZulu, an eco-friendly company that imports natural architectural materials from villages all around the world, uses Cisco technology to improve customer service and productivity.
-
Housing Association Puts Staff into the Community, Increasing Personal Contact
Sponsored by: Cisco Systems, Inc.This case study showcases how The Community Gateway Association (CGA) became the first housing association in England to be set up as a 'community gateway'.
-
Enterprise Wireless LAN Security
Sponsored by: Motorola SolutionsThis paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.
-
Unified Threat Management: The Best Defense against Blended Threats
Sponsored by: SonicWALLThe SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
-
Cisco Secure Wireless Office Solution for SMBs
Sponsored by: Cisco Systems, Inc.Designed for today's increasingly mobile businesses, the Cisco® Secure Wireless Office Solution helps enhance productivity by making information and business applications accessible anywhere, anytime.
-
Increase Productivity and Reduce Security Risks for Teleworkers
Sponsored by: SonicWALLThis paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
-
Best Practices in Authentication and Access Control
Sponsored by: Nevis NetworksRead this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
-
Beyond Corporate Walls: Motorola Enterprise Mesh Networks
Sponsored by: Motorola SolutionsWireless mesh technology is flexible, secure and allows for easy control of user access. Read this paper to learn how mesh technology can help your enterprise cost effectively extend its wireless coverage without any extra cable or fiber.