"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Wireless Security

Results 251 - 275 of 289Sort Results By: Published Date | Title | Company Name
White Paper Published By: HP - Enterprise     Published Date: Jun 05, 2013
It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : 
mobile applications, ecosystem, risk, defense, application
    
HP - Enterprise
Webinar Published By: BlackBerry     Published Date: Oct 03, 2012
Get future ready with BlackBerry Enterprise Server v5. Join a free webcast to understand how upgrading to BlackBerry Enterprise Server v5 will get your organization ready for the next generation in mobile device management: BlackBerry Mobile Fusion.
Tags : 
blackberry enterprise server, mobile device management, mdm, mobile computing, mobile solutions
    
BlackBerry
Webinar Published By: BlackBerry     Published Date: Oct 03, 2012
An overview of BlackBerry PlayBook OS 2.0 security capabilities and features, including: BlackBerry® Balance technology, BlackBerry® Bridge, data-at-rest protection, and secure connectivity to support native email and corporate intranet access.
Tags : 
mobile security, corporate intranet, blackberry, secure connectivity, wireless hardware
    
BlackBerry
Webinar Published By: BlackBerry     Published Date: Oct 03, 2012
This presentation on NFC security will provide an overview of the security protections built into the BlackBerry platform to protect users, application developers and enterprises.
Tags : 
blackberry, security, mobile security, blackberry, smart phones
    
BlackBerry
Webinar Published By: BlackBerry     Published Date: Oct 03, 2012
Find out why these certifications matter to your organisation, and why they should be considered when protecting the information security of your mobile workforce.
Tags : 
security certifications, blackberry, mobile workforce, mobile security, blackberry
    
BlackBerry
Webinar Published By: BlackBerry     Published Date: Oct 03, 2012
Learn about tools and applications available that make the development platform BlackBerry® WebWorks SDK, the perfect fit for work, home and life.
Tags : 
tablet, tablet applications, software development, sdk, enterprise management
    
BlackBerry
White Paper Published By: BlackBerry     Published Date: Oct 03, 2012
In this FAQ, learn how to establish harmony between security and usability with the BlackBerry PlayBook OS 2.0. Get the answers to your most pressing questions and make BYOD a success for your enterprise.
Tags : 
mobile device management, mobile device, mobile communications, managing mobility, mobile management
    
BlackBerry
White Paper Published By: BlackBerry     Published Date: Oct 03, 2012
Though you can't stop the loss or theft of devices, there are powerful ways to ensure enterprise and data security in every scenario. This FAQ explains how the BlackBerry PlayBook tablets can be an integral part of an enterprise security strategy.
Tags : 
enterprise security, enterprise security strategy, mobile security, data security, blackberry
    
BlackBerry
White Paper Published By: BlackBerry     Published Date: Oct 03, 2012
Tablet computers are making significant inroads in the enterprise - and in a recent survey of over 150 executives, Research In Motion® explores which features are most important.
Tags : 
mobile enterprise, mobile computing platform, tablet, tablet computers, blackberry
    
BlackBerry
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
Following the sale of a company division housing its corporate data center, Source Interlink had to relocate core IT operations. Teaming with CDW, they were able to not only relocate, but lower capital and operating costs, reduce their carbon footprint, and increase efficiency.
Tags : 
data, center, optimization, cdn, interlink
    
CDW Vmware
White Paper Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection
    
CDW Symantec
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
As with many enterprises today, your data center houses critical IT components that your business depends on. But are they fully secure and protected from potential threats such as intruders or natural disasters? A data recovery plan is very important to be fully prepared in the event of a disaster.
Tags : 
quick, start, data, recovery, vmware
    
CDW Vmware
Webinar Published By: Apple Corporation     Published Date: Dec 01, 2011
In this seminar, you'll learn how you can use the iPad to create and deliver stunning sales and marketing presentations, make business meetings even more productive and take advantage of business "dashboards" to stay better informed no matter where you're working from.
Tags : 
ipad, ipod, apple, ipad2, tablet
    
Apple Corporation
White Paper Published By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : 
virtualization, memory overcommitment, memory performance, memory reclamation, vmware
    
Kingston
White Paper Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions
    
M3 Consulting, Inc.
White Paper Published By: Focus     Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
Tags : 
amy babinchak, best practices, bob egan, expert content, information technology
    
Focus
White Paper Published By: Phoenix Contact USA     Published Date: Nov 09, 2010
A WirelessHART gateway with WLAN connection means better communication, flexibility and increased efficiency for your HART sensor network.
Tags : 
industrial wireless technology, wirelesshart, wirelesshart gateway, wifi, wireless communications
    
Phoenix Contact USA
White Paper Published By: Gartner, Inc     Published Date: Oct 28, 2010
New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.
Tags : 
emerging trends, emerging technologies, hype cycle, new technologies, it trends
    
Gartner, Inc
White Paper Published By: xmannnnn     Published Date: Aug 06, 2010
Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.
Tags : 
active directory, bandwidth management, convergence, distributed computing, ethernet networking
    
xmannnnn
Webinar Published By: Absolute Software     Published Date: Dec 16, 2009
In this webinar, Jack Heine, Research VP, Gartner, and David Holyoak, CIO of accounting firm Grant Thornton, discuss how to facilitate mobility while minimizing the risk of data exposure using web-based management and anti-theft capabilities.
Tags : 
absolute, it security, mobile management, project management, mobility
    
Absolute Software
White Paper Published By: AirTight Networks     Published Date: Aug 21, 2009
More and more companies are realizing that their corporate air waves are an asset that requires protection. Strong security policies have been created for wired networks. The same is now needed for the corporate air waves. This paper will discuss the compelling business reasons why an investment in wireless intrusion prevention should be made.
Tags : 
intrusion prevention, wireless security, security policy, security policies, security management
    
AirTight Networks
White Paper Published By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : 
secure remote access, remote access, wireless security, secure wifi, wifi security
    
Aventail
White Paper Published By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : 
mobile workforce, remote access, network security, wireless security, off-site
    
Internet Security Systems
White Paper Published By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment
    
Meru Networks
White Paper Published By: Meru Networks     Published Date: Aug 21, 2009
Pervasive wireless LAN deployments require much larger, broader deployment of Wi-Fi access points than hot spots, cafes or isolated guest access in the enterprise. Clearly new solutions and deployment methodologies should be considered to make pervasive wireless LAN deployments feasible and economical.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment
    
Meru Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory