ComputerWeekly.com Research Library

Powered by Bitpipe.com

Wireless Security Research

  • Mobile Device Management Systems Help Mitigate BYOD Risks

    Sponsored by: TechTarget Security

    This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.

  • BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!

  • Keeping Up With Network Needs: Five WLAN Questions Answered

    Sponsored by: TechTarget Security

    In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.

  • WLAN Planning For BYOD

    Sponsored by: TechTarget Security

    This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.

  • Tablets & Smartphones in the Enterprise

    Sponsored by: TechTarget Security

    Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend.

  • Managing Mobile Application Security in the BYO Device Era

    Sponsored by: TechTarget Security

    Smartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now!

  • BYOD Security Policy Considerations and Best Practices

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.

  • Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them

    Sponsored by: TechTarget Security

    Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.

  • Wireless LAN ITDC - Checklist #3

    Sponsored by: TechTarget Security

    This is the third piece in SearchNetworking.com's three-part guide on wireless products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a wireless solution.

  • Tackling Top Wireless Challenges and Debunking Common Myths: Expert Roadmap

    Sponsored by: ADTRAN, Inc.

    This E-Guide from SearchNetworking.com explores the myths associated with cloud-managed WLANs and aims to help you understand what you can truly expect from these service offerings.

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    Sponsored by: TechTarget Security

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

  • SearchConsumerization.com E-Guide: Enterprise device management: A brave new world

    Sponsored by: TechTarget Security

    This exclusive E-Guide from SearchConsumerization.com examines the latest trends, news and analysis pertaining to IT device management today.

  • E-Zine: Wired and wireless: Can you achieve an integrated network

    Sponsored by: TechTarget Networking

    This expert E-Zine will help IT professionals learn more about the challenges of networking and some best practices for managing wired and wireless technologies. Read on to learn more about unified architecture, unified wireless management, combining wired and wireless security, and more.

  • Dispelling Top Ten Wireless Security Myths

    Sponsored by: AirTight Networks, Inc.

    Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.

  • Security in the Age of Mobility

    Sponsored by: Trend Micro

    This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.

  • Network Security Technologies Technical Guide

    Sponsored by: TechTarget Security

    Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.

  • Underexposed risks of public Wi-Fi hotspots

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.

  • Network Security Essential Guide

    Sponsored by: TechTarget Security

    The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.

  • Tutorial: Five Steps to Effective Wireless Networking in Healthcare

    Sponsored by: HP & Intel®

    This e-guide from SearchHealthIT.com demonstrates how health IT administrators should plan, implement and manage wireless networks within their respected facilities. Read now for five steps to effective wireless networking in health care.

  • HIT Managers Tackle Hospital Wireless Implementation Challenges

    Sponsored by: HP & Intel®

    This e-guide outlines the challenges today's hospitals may encounter when implementing wireless networks. Inside, uncover expert tips and recommendations for creating a wireless network built for the long-term.

  • Bring Your Own Design: Simplifying BYOD with Ruckus Wireless

    Sponsored by: RUCKUS Networks

    Uncover how to use the right Wi-Fi access points (APs) in your organization to embrace the bring your own device (BYOD) movement without sacrificing the security or manageability of your wireless network.

  • B.Y.O.D Without the Risk

    Sponsored by: Juniper Networks, Inc.

    As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable.

  • Enabling High Performance for Apple iPads in the Enterprise

    Sponsored by: Aruba Networks

    Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.

  • Computer Weekly - 15 May 2012: Overhauling banking IT

    Sponsored by: TechTarget ComputerWeekly.com

    This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital?

  • Expert Discussion: Mobile device security in health care

    Sponsored by: Hewlett Packard Enterprise

    This E-Guide discusses some of the most significant trends and themes concerning mobile device security in health IT. Discover what it will take to deploy a stable, cost-efficient mobile security system in your hospital.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.