Wireless LAN Security Reports

WLAN Access Control and Wi-Fi Network Needs
sponsored by TechTarget Security
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

TechTarget Security

Application Control at the Wireless Edge
sponsored by Xirrus
WHITE PAPER: With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.
Posted: 31 Jul 2013 | Published: 31 Dec 2012

Xirrus

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

PBS Engineering and Environmental Bolsters Virtualized Environment with Disaster Recovery Efforts and Cuts 40 Percent in Energy Costs
sponsored by Dell and VMware
CASE STUDY: Learn how one firm improved diaster recovery efforts with virtualization and cut energy costs by 40%.
Posted: 10 Sep 2013 | Published: 31 Aug 2013

Dell and VMware

Tutorial: Five Steps to Effective Wireless Networking in Healthcare
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com demonstrates how health IT administrators should plan, implement and manage wireless networks within their respected facilities. Read now for five steps to effective wireless networking in health care.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

HP & Intel®

Technical Guide on Mobile Security
sponsored by TechTarget Security
EGUIDE: Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

TechTarget Security

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

HIT Managers Tackle Hospital Wireless Implementation Challenges
sponsored by HP & Intel®
EGUIDE: This e-guide outlines the challenges today's hospitals may encounter when implementing wireless networks. Inside, uncover expert tips and recommendations for creating a wireless network built for the long-term.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

HP & Intel®

Expert Tips on Getting Mobile Securely with Virtual Desktops
sponsored by TechTarget Security
EGUIDE: In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices.
Posted: 30 Sep 2011 | Published: 30 Sep 2011

TechTarget Security

Handbook: Identity and Access Management
sponsored by TechTarget Security
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

TechTarget Security