wireless security

Results 1 - 25 of 80Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and assess aspects of campus-scale, wireless and wired network infrastructures from Cisco and Huawei Technolgies. Our evaluation found that, where Cisco and Huawei both offer all the comparable components for building a campus-wide, wireless and wired, network infrastructure, test after test found that the Cisco package offers certain positive advantages that Huawei does not. Cisco showcased superior performance against the Hauwei wireless solution with a highly developed resource management, hardware, software and security platform to provide the most optimized, trustworthy system to ever customer. To find out more download this whitepaper today.
Tags : 
cisco, power, radio, wi-fi, network, architecture
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Nov 08, 2018
Enterprise IT is changing. Its evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The purpose of this paper is to assess the switching requirements for next-generation campus networks incorporating wired switches, wireless LANs and WAN routers in an intuitive, intent-based network supporting cloud, mobility, IoT and digitization, with pervasive security.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Dec 11, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and assess aspects of campus-scale, wireless and wired network infrastructures from Cisco and Huawei Technolgies. Our evaluation found that, where Cisco and Huawei both offer all the comparable components for building a campus-wide, wireless and wired, network infrastructure, test after test found that the Cisco package offers certain positive advantages that Huawei does not. Cisco showcased superior performance against the Hauwei wireless solution with a highly developed resource management, hardware, software and security platform to provide the most optimized, trustworthy system to ever customer. To find out more download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco WebEx, Cisco Spark, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : 
symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop, mobile device, distributed computing, infrastructure, network security, remote access, remote network management, mobile computing, mobile data systems, mobile workers, pda, smart phones, wireless communications
    
Symantec.cloud
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
    
Rohde & Schwarz Cybersecurity
Published By: Intel     Published Date: Sep 14, 2018
Digital transformation has pioneered an ever-evolving landscape in the omnichannel retail experience. To efficiently meet consumer demands, retailers consider a fully immersive omnichannel customer experience as integral to their engagement strategy. With increasingly varied technologies such as NFC-based payments, digital signage with rich-media experiences, wireless technologies and IoT technologiespresent great opportunities and complexities. New technologies are often being rolled out without a centrally managed approach leading to siloed solution landscape, making deployment difficult. Uncover the path to simplify and automate, where the Reliant Platform delivered performance, scalability, reliability, security, and inter-operability Reliant needs for retail applications.
Tags : 
    
Intel
Published By: Aerohive     Published Date: Jun 01, 2015
Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control, anti spam, anti spyware, application security, firewalls, wifi, wireless infrastructure
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Dcouvrez comment les organisations peuvent intgrer facilement et de manire sre une gamme dutilisateurs et de terminaux en fournissant des cls pr-partages individuelles sur le mme SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control, anti spam, anti spyware, application security, firewalls, wifi, wireless infrastructure
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Lernen Sie, wie man einfach und sicher eine Palette von Benutzern und Gerten aktivieren kann, indem man jedem einen einmaligen Schlssel zuweist.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control, anti spam, anti spyware, application security, firewalls, wifi, wireless infrastructure
    
Aerohive
Published By: Aerohive     Published Date: Aug 03, 2015
Dieses Whitepaper dient als Leitfaden und erlutert die ntigen Anforderungen an Konnektivitt und Produktivitt, um Ihr Netzwerk auf die Mobilittswelle vorzubereiten.
Tags : 
mobility, mobility technology, wireless. connectivity, network, security, byod, network architecture, network management, mobile computing, mobile data systems, mobile workers, smart phones, wireless infrastructure, wireless phones, wireless security
    
Aerohive
Published By: iPass     Published Date: Sep 16, 2009
Thanks to new mobile technologies, work happens everywhere today. It might be responding to email on the morning train or uploading a customer contract during a cross-town cab ride. Your workers need this level of connectivity to compete. At the same time, you likely face unprecedented budgetary challenges.
Tags : 
wireless, wifi, smartphones, pda, security, smartphone, personal devices, nokia, gps, data, ipass, ipass connect, connect, windows mobile, mobility, mobile data systems, smart phones, wireless application software, wireless communications, wireless infrastructure
    
iPass
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for yearssocial engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organizationthe user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: Aruba Networks     Published Date: Nov 15, 2013
With more Internet-connected mobile devices than people in the world in 2013, IT must provide seamless connectivity to every class of user employees, contractors, guests and even customers appropriate to their role and type of device. Mobility in the workplace isnt just for user benefit and productivity. The migration to mobility begets several IT benefits.
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Le lieu de travail nouvelle gnration repose sur la mobilit. lheure o le nombre dappareils mobiles connects Internet dpasse la population mondiale, il est essentiel que les services informatiques soient en mesure doffrir chaque catgorie dutilisateurs (employs, entrepreneurs, invits et clients) une connectivit fluide et adapte leurs besoins et types dquipement. Outre les atouts vidents pour les utilisateurs et leffet bnfique sur la productivit, la migration vers la mobilit est source de nombreux avantages pour les services informatiques. Tlchargez ce livre blanc pour les dcouvrir
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Der Next-Generation Workplace steht fr Mobilitt. Im Jahr 2013 gab es mehr mit dem Internet verbundene Mobilgerte als Menschen weltweit. Aufgabe der IT ist es, die dafr notwendigen Verbindungen und Netzwerke zu schaffen und dafr zu sorgen, dass diese an die Anforderungen der unterschiedlichen Benutzergruppen, an ihre Aufgaben sowie die eingesetzten mobilen Gerte angepasst sind sei es fr Angestellte, Unternehmer, Gste oder Kunden. Mobiles Arbeiten steigert die Produktivitt und bietet zahlreiche Vorteile fr den Anwender aber auch IT-Verantwortliche knnen profitieren. Laden Sie unser Whitepaper herunter und berzeugen Sie sich von den Vorteilen...
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
El lugar de trabajo de la prxima generacin se centra totalmente en la movilidad. En este ao 2013 hay ms dispositivos mviles con conexin a Internet que personas en el planeta, de modo que la tecnologa informtica debe proporcionar una conectividad sin restricciones a cada tipo de usuario trabajadores, contratistas, invitados e incluso clientes apropiada para la funcin de cada uno y el tipo de dispositivo que utiliza. Se pone de manifiesto que la movilidad en el lugar de trabajo no es slo para el beneficio propio del usuario y de la productividad. La migracin hacia la movilidad genera varias ventajas en TI. Descrguese este documento tcnico para descubrir las ventajas....
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Il luogo di lavoro di nuova generazione sar tutto concentrato sulla mobilit. Gi nel 2013 nel mondo ci sono pi dispositivi mobili che persone, e l'IT deve fornire una connettivit senza interruzioni ad ogni tipo di utente dipendenti, appaltatori, ospiti e persino clienti che si adatti al loro ruolo e al tipo di dispositivo che utilizzano. E cos, la mobilit sul posto di lavoro non giova solo agli utenti e alla produttivit. La migrazione verso la mobilit genera numerosi vantaggi informatici. Scaricate questo libro bianco per scoprirli tutti
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Brocade     Published Date: Sep 07, 2010
This research study investigates industry best practices for mul-site and campus-area Wireless LANs (WLANs),based on a recent survey of 163 organizations.
Tags : 
wlan, wireless lan, wireless network performance, wireless network security, wlan security, higher education, healthcare, network performance, network performance management, network security, wireless infrastructure, wireless security
    
Brocade
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity giving people anywhere, anytime access to information via devices theyre comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner evaluates a variety of networking vendors providing access layer connectivity. Vendors must have an end-to-end hardware solution, but increasingly, vendor differentiation centers on network services, including guest access, onboarding, security and management tools. Read this whitepaper for more information.
Tags : 
wireless lan, infrastructure, hardware solution, network services, security, technology, best practices, networking, wireless
    
Aruba Networks
Published By: Cisco     Published Date: Dec 21, 2016
Todays corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco
Published By: Extreme Networks     Published Date: Sep 17, 2014
In this eBook, we will demonstrate specific use cases for how a business intelligence solution can be used effectively by IT operations.
Tags : 
extreme networks, purview, application analytics, wifi/wireless, network solutions, business intelligence solutions, business intelligence, it operations, it management, data mining, networking, network technology, network optimization, business analytics, application, application security
    
Extreme Networks
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.