• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

wireless networks

Results 51 - 75 of 83Sort Results By: Published Date | Title | Company Name
By: Cambium Networks     Published Date: Oct 03, 2016
Download this white paper to learn more about these 7 things utilities should know about private wireless networks: Capacity vs. range Topologies (PTP, Rings, Mesh, PMP) Licensed vs. unlicensed Line of sight vs. non-line of sight Security Quality of service Network management
Tags : 
wireless networks, security, network management, quality of service, wireless service providers
    
Cambium Networks
By: Cambium Networks     Published Date: Oct 03, 2016
In this paper we’ll go over some of these challenges and how a network administrator can use the features of Cambium NEtworks cnPilo Wi-Fi solutions to resolve them.
Tags : 
wi-fi, solutions, it solutions, wireless networks, schools, service management
    
Cambium Networks
By: Cambium Networks     Published Date: Oct 03, 2016
What’s the catalyst behind this astonishing growth? There’s little question that one of the prime drivers — perhaps the most important of all — is the meteoric rise of reliable, high quality, cost-efficient wireless broadband video surveillance networks.
Tags : 
video surveillance, security, wireless broadband, safety, video camera, wireless security
    
Cambium Networks
By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Previously, wireless added a useful layer of mobility to your wired infrastructure. Now, you have users who may never connect with cables. Before, laptops and desktops were the primary tools of productivity in the office. These days, smartphones, tablets and apps are essential, whether users are on the move or at their desks.
Tags : 
device, iot, vlans, unified access, applications, analytics, healthcare
    
Alcatel Lucent Enterprise
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
Trend Micro, Inc.
By: SAP     Published Date: Jun 30, 2011
Learn more about today's challenges of monetizing connected services across diverse industries such as high tech, financial services, telecommunications and how SAP can help you maximize these opportunities.
Tags : 
sap, monetizing services, hyperconnected world, internet, wireless networks, cross industry drivers, changing business models, product commoditization
    
SAP
By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : 
blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing
    
BlackBerry
By: BlackBerry     Published Date: Jun 11, 2008
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise: namely, increased productivity, improved efficiency and improved response times resulting in decreased costs and increased revenue opportunities. But with these advantages come risks, and most have to do with controlling the data contained on wireless devices and the networks and applications to which they connect.
Tags : 
blackberry, corporate mobile policy, enterprise solution, crm, microsoft exchange, mobile device management, mobile device management software, mobile workers
    
BlackBerry
By: Cisco     Published Date: Jul 11, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
By: Cisco     Published Date: Apr 10, 2015
Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.
Tags : 
cisco, lbs, it technology, wifi, analytics, wireless networks, mobile computing, wireless application software
    
Cisco
By: Cisco     Published Date: Apr 10, 2015
Not all 802.11ac solutions are the same, with the right approach, you can combine the mobility of wireless with the performance of wired networks. To get up to speed on 802.11ac, we're providing an 802.11ac migration cheat sheet and webinar on-demand.
Tags : 
cisco, 802.11ac, wireless, wifi, network performance, 802.11, mobile computing, mobile data systems
    
Cisco
By: Cisco     Published Date: Apr 10, 2015
Let these case studies show how you can succeed with mobility, too. Pinellas County Integrates Wired and Wireless Networks Cisco Meraki Architecture Construction - C&S Companies Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution Cisco CMX Connects Evergreen Brickworks Video
Tags : 
cisco, case study, byod, wireless, wifi, network integration, cmx, bandwidth management
    
Cisco
By: Cisco     Published Date: Apr 10, 2015
Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.
Tags : 
cisco, lbs, it technology, wifi, analytics, wireless networks, mobile computing, mobile data systems
    
Cisco
By: Cisco     Published Date: Dec 21, 2016
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
    
Cisco
By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
By: Cisco     Published Date: Nov 18, 2015
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
cisco, zk research, infrastructure, hybrid wan, networking
    
Cisco
By: Ruckus Wireless     Published Date: Sep 28, 2009
In this free white paper, learn how it's now possible for wireless local area networks (WLANs) to deliver predictable throughput, reject interference, and generally behave just like Ethernet. Discover how beamforming, a specialized method of antenna-based RF transmission, renders inconsistent performance stable; rejects performance-impeding interference; supports reliability-sensitive applications like real-time voice and high-definition video; and eliminates packet loss, delays, and jitter. Download your copy of this free white paper now.
Tags : 
wifi, wi-fi, wlan, lan, access points, radio frequency, 802.11, phy
    
Ruckus Wireless
By: Symantec     Published Date: Dec 28, 2015
Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Tags : 
code signing, wireless networks, transferring code, content distribution, security
    
Symantec
By: AirDefense     Published Date: Apr 24, 2007
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Tags : 
best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan
    
AirDefense
By: AirDefense     Published Date: Apr 24, 2007
This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.
Tags : 
wlan, wireless security, wireless freeloaders, wireless rogue, rogue, rogues, wireless infrastructure, monitoring
    
AirDefense
By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan
    
AirTight Networks
By: AirTight Networks     Published Date: Aug 21, 2009
More and more companies are realizing that their corporate air waves are an asset that requires protection. Strong security policies have been created for wired networks. The same is now needed for the corporate air waves. This paper will discuss the compelling business reasons why an investment in wireless intrusion prevention should be made.
Tags : 
intrusion prevention, wireless security, security policy, security policies, security management, governance, airtight, airtight networks
    
AirTight Networks
By: Meru Networks     Published Date: Aug 21, 2009
This paper explains the numerous places where VoWLAN can go to work, why most offerings fail to make it work, and how only Meru Networks' standard-based solution puts the power of VoWLAN to work at enterprise-scale.
Tags : 
voip, voice over ip, wlan, wlans, vowlan, enterprise software, communications, wireless communications
    
Meru Networks
By: Meru Networks     Published Date: Aug 21, 2009
This white paper is for the enterprise IT administrator tasked with deploying a wireless LAN (WLAN) of any scale, the significant investment in equipment, time and resources to properly plan and install the deployment is daunting.
Tags : 
wlan, wireless lan, wlan deployment, wlan investment, wlan cost, it spending, cost control, meru
    
Meru Networks
By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells
    
Meru Networks
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter