"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Wireless Security

Results 276 - 289 of 289Sort Results By: Published Date | Title | Company Name
Case Study Published By: Pointsec     Published Date: Aug 21, 2009
Critical data is best protected against misuse on business trips complete encryption of notebook hard disks. If 4,500 notebooks are involved, as is the case for the Zurich firm Swiss Re, precise selection criteria and exact planning for the international rollout are important.
Tags : 
data protection, laptop, lost laptop, lost notebook, encryption
White Paper Published By: Pointsec     Published Date: Aug 21, 2009
The use of handheld computers is estimated to grow by more than 50 percent in the next few years. This surge in use of mobile devices means that companies need to make sure their growing mobile workforce use devices that are secure so that handhelds do not become the weakest link in their security system.
Tags : 
secure mobile, secure laptop, laptop security, secure handheld, wireless security
White Paper Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile
White Paper Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop
White Paper Published By: CopiaTECH     Published Date: Mar 18, 2008
Wireless networking is no more a new name to computer users these days than iPod is to music lovers. This technology is one of the most popular, inexpensive and simple modes of connecting computers to the internet or a network. Both home users, work users and laptop/mobile users, who want to stay connected, even while on the move, are adopting this technology. Download this paper to read about all the threats that come with wireless connections and ways to guard against them.
Tags : 
copiatech, wireless, wireless security, wifi
White Paper Published By: TamoSoft     Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
Tags : 
monitoring, lan, wan, best practices, networking
White Paper Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan
Nevis Networks
White Paper Published By: Xirrus     Published Date: May 04, 2007
Get a technical foundation for deploying a high performance Wi-Fi network. Learn the details of how they work/compete, where they complement and where they're most effective.
Tags : 
wifi, wireless, 802.11, xirrus, wi fi
White Paper Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming
Trapeze Networks
White Paper Published By: Provenir     Published Date: Mar 14, 2007
Mobile banking - banking on mobile devices including mobile phones, iPhones, Blackberries, and PDAs is taking off again, and financial institutions around the world are rushing to leverage the technology to gain new customers. This white paper describes the mobile banking "revolution", the state of the technology, the challenges, and the benefits.
Tags : 
wireless, wireless application software, wireless security, wireless phones, pda
White Paper Published By: Fiberlink     Published Date: Feb 08, 2007
This white paper looks at some of the key issues facing enterprises that might need to turn office workers into mobile workers, rapidly and in large numbers.
Tags : 
business continuity, mobile workers, mobile computing, disaster planning, pandemics
White Paper Published By: Quocirca     Published Date: Feb 05, 2007
This paper looks at how to get the best out of mobile productivity and how to avoid the six most common mobility pitfalls during the planning and execution of mobile implementations.
Tags : 
productivity, wireless, mobile workers, wireless application software, wireless communications
White Paper Published By: NetIQ Corporation     Published Date: Jan 29, 2007
This white paper identifies what is required for a comprehensive and integrated security management solution and examines the difference between SEM, SIM and SIEM and the challenges of enterprise level security monitoring.
Tags : 
security management, event management, network security, monitoring, network security
NetIQ Corporation
White Paper Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security
AirTight Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12     Next   End

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory