Wireless Security Research
-
Best Practices in Authentication and Access Control
Sponsored by: Nevis NetworksRead this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
-
Beyond Corporate Walls: Motorola Enterprise Mesh Networks
Sponsored by: Motorola SolutionsWireless mesh technology is flexible, secure and allows for easy control of user access. Read this paper to learn how mesh technology can help your enterprise cost effectively extend its wireless coverage without any extra cable or fiber.
-
The CIO's Guide to Mobile Security
Sponsored by: BlackBerryMobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data.
-
Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications
Sponsored by: Sybase iAnywhereMobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.
-
Deploying a Wireless LAN
Sponsored by: BlackBerryMany factors must be considered when planning for a WLAN deployment. This paper provides a starting point for posing questions to WLAN equipment and service vendors.
-
5-Step Plan for Securing Your Enterprise WLAN
Sponsored by: AirTight Networks, Inc.Read this white paper that details the five essential steps you must take to secure your enterprise WLAN.
-
Mobile Data Security Essentials for Your Changing, Growing Workforce
Sponsored by: CREDANT TechnologiesDownload this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
-
Ten Ways Hackers Breach Security
Sponsored by: Global KnowledgeHacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
-
HiPath Wireless Portfolio
Sponsored by: SiemensThis brochure provides an overview of Siemens' HiPath Wireless LAN and mobility management solutions. Learn how you can benefit from this new solution now.
-
Driving Innovation: The Wireless LAN in Healthcare
Sponsored by: SiemensThis white paper highlights the features and benefits of a reliable and secure wireless infrastructure and provides an overview of the many applications that are enabled by WLAN technology.
-
Enterprise-Grade Wireless LAN Security
Sponsored by: SiemensThis white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.
-
CIO Perspective: BlackBerry Security
Sponsored by: BlackBerryIn this question and answer session, learn how Dr. John D. Halamka. MD, of the Harvard Medical School, depends on a BlackBerry Solution to keep his patient and student records secure.
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
Sponsored by: MicrosoftAttend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach
Sponsored by: MicrosoftAttend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
-
Troubleshooting Wireless LANs to Improve Wi-Fi Uptime and Security
Sponsored by: Fluke NetworksThis whitepaper gives you an in-depth look at the wireless troubleshooting process. You'll learn how to improve security and performance by identifying rogue access points and ad-hoc networks and learn how to conduct network audits.
-
Security for BlackBerry Devices with Bluetooth Wireless Technology
Sponsored by: BlackBerryThis document provides information about the Bluetooth® wireless technology and its uses with BlackBerry Device Software and the potential vulnerabilities in Bluetooth wireless technology.
-
The CIO's Guide to Mobile Applications
Sponsored by: BlackBerryRead this white paper to learn about some of the key enterprise LOB applications that most benefit from mobility and how applications can be deployed with a simple implementation guideline.