Wireless Security Research
-
E-Zine: Wired and wireless: Can you achieve an integrated network
Sponsored by: TechTarget NetworkingThis expert E-Zine will help IT professionals learn more about the challenges of networking and some best practices for managing wired and wireless technologies. Read on to learn more about unified architecture, unified wireless management, combining wired and wireless security, and more.
-
Dispelling Top Ten Wireless Security Myths
Sponsored by: AirTight Networks, Inc.Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.
-
Security in the Age of Mobility
Sponsored by: Trend MicroThis resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
-
Network Security Technologies Technical Guide
Sponsored by: TechTarget SecurityRead this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
-
Underexposed risks of public Wi-Fi hotspots
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi hotspots.
-
Mobile Device Management Systems Help Mitigate BYOD Risks
Sponsored by: TechTarget SecurityThis whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.
-
BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud
Sponsored by: TechTarget SecurityThis E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!
-
Keeping Up With Network Needs: Five WLAN Questions Answered
Sponsored by: TechTarget SecurityIn this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
-
WLAN Planning For BYOD
Sponsored by: TechTarget SecurityThis E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
-
Network Security Essential Guide
Sponsored by: TechTarget SecurityThe increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
-
Managing Mobile Application Security in the BYO Device Era
Sponsored by: TechTarget SecuritySmartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now!
-
Tutorial: Five Steps to Effective Wireless Networking in Healthcare
Sponsored by: HP & Intel®This e-guide from SearchHealthIT.com demonstrates how health IT administrators should plan, implement and manage wireless networks within their respected facilities. Read now for five steps to effective wireless networking in health care.
-
HIT Managers Tackle Hospital Wireless Implementation Challenges
Sponsored by: HP & Intel®This e-guide outlines the challenges today's hospitals may encounter when implementing wireless networks. Inside, uncover expert tips and recommendations for creating a wireless network built for the long-term.
-
BYOD Security Policy Considerations and Best Practices
Sponsored by: TechTarget SecurityThis E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
-
Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
Sponsored by: TechTarget SecurityUncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
-
Bring Your Own Design: Simplifying BYOD with Ruckus Wireless
Sponsored by: RUCKUS NetworksUncover how to use the right Wi-Fi access points (APs) in your organization to embrace the bring your own device (BYOD) movement without sacrificing the security or manageability of your wireless network.
-
B.Y.O.D Without the Risk
Sponsored by: Juniper Networks, Inc.As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable.
-
Enabling High Performance for Apple iPads in the Enterprise
Sponsored by: Aruba NetworksLearn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.
-
Computer Weekly - 15 May 2012: Overhauling banking IT
Sponsored by: TechTarget ComputerWeekly.comThis week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital?
-
SearchConsumerization.com E-Guide: Enterprise device management: A brave new world
Sponsored by: TechTarget SecurityThis exclusive E-Guide from SearchConsumerization.com examines the latest trends, news and analysis pertaining to IT device management today.
-
Expert Discussion: Mobile device security in health care
Sponsored by: Hewlett Packard EnterpriseThis E-Guide discusses some of the most significant trends and themes concerning mobile device security in health IT. Discover what it will take to deploy a stable, cost-efficient mobile security system in your hospital.
-
Understanding Mobility Trends and Mobile Usage Among Business Users
Sponsored by: iPass Inc.Technology and data consumption are evolving faster than mobile networks are able to adapt; what we at iPass are calling “Mobile Darwinism.” Learn more as you explore mobility trends and mobile usage among business users.
-
Expert Tips for Managing Mobile Devices in the Enterprise
Sponsored by: TechTarget SecurityGet expert tips for managing the mobile device explosion in the enterprise, and also learn about the brave new work of enterprise device management.
-
Mobility Solutions
Sponsored by: AzzurriEnabling and supporting mobility can be complicated, especially when it comes to integrating it with company policy. Discover how a mobility solution can help you with all this.
-
Malicious Mobile Threats Report, 2010-2011
Sponsored by: Juniper Networks, Inc.Threats to mobile devices are real, and lacking proper oversight and awareness can lead to serious consequences. In this report explore new and emerging mobile threats and attack vectors, as well as gain practical threat mitigation techniques.