RSS feed Get our RSS feed

News by Topic

access point

Results 151 - 175 of 187Sort Results By: Published Date | Title | Company Name
By: SAS     Published Date: Nov 16, 2018
More account openings are taking place through digital devices and online, giving the access and anonymity fraudsters need to steal or fabricate identities. Since credit fraud often starts with a falsified application, it makes sense to have strong tools to monitor loans and credit lines from that point onward. This paper discusses analytics-driven methods for validating applications and spotting trouble at all three stages of bust-out fraud schemes.
Tags : 
     SAS
By: IBM     Published Date: Mar 04, 2014
Technology advances are changing the way employees work, consumers buy, and enterprises conduct business. Old methods for marketing products are taking a back seat to online distribution, and mobile devices are ubiquitous access points to the Internet. The resulting environment is ripe for the creation and distribution of new software for handling a constantly expanding array of functions. When there is an app for everything, organizations have no choice but to adapt or risk getting left behind as markets enter the era of the Web application programming interface (API).
Tags : ibm, mobile, mobile app, api, api management, web application, application programming interface, app
     IBM
By: Kapost     Published Date: Jan 16, 2014
Over the past 10 years, the Internet has provided unprecedented access to information. Consequently, B2B buyers are constantly online learning about industry trends and innovative solutions to their pain points. Given their busy schedules, buyers have grown accustomed to the convenience of researching and comparing multiple options online, narrowing their choices independently of the vendor and, only then, engaging with sales. While buyers have always made the final purchase decision, in today’s world, the vendor is not given an opportunity to engage until the buyer is close to a choice. Today, the buyer is in control of their own journey.
Tags : content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform
     Kapost
By: Cisco     Published Date: Apr 10, 2015
Your users are ready for multigigabit wireless. The real question is: Is your network? Don’t miss this opportunity to get a first-hand look at the solutions you’ll need to achieve data rates that make it easier for your people to share, stay informed, and make smart decisions. • Join hosts Robb, Jimmy Ray, and networking experts as they dive deep into the technical details of delivering exponentially faster 802.11ac Wave 2 access through the current Cat5 cable you already have. • Hear all about Cisco’s founding membership and participation in the NBASE-T Alliance, the team that’s driving the standardization of 2.5 Gb/s and 5 Gb/s Ethernet speeds in campus access. • Discover the access point and switch technology you’ll need to ensure that your wired access layer does not become a stumbling block for your continued mobile growth.
Tags : cisco, techwise, routers, wan, productivity, performance, 802.11ac, wireless
     Cisco
By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
     Cisco
By: Cisco     Published Date: Apr 04, 2016
Miercom was engaged to perfirm independent, hands-on, comparative testing of competitive IEEE 802.11ac Wave 2-based WiFi Access Points (APs) from Cisco Systems, Aruba Networks and Ruckus Wireless. This report summarizes the results of the Wave 2 AP comparative testing in these areas: - Client density: Downlink throughput as the number of client per AP scales from 10 to 100. - Single vs Multi-User MIMO: Downlink throughput for MU-MIMO (Multi-User, Multiple-Input Multiple-Output), a hallmark of 802.11ac Wave 2, vs Single-User (SU-MIMO) environments. - 1 Gbps+ Link Aggregation: Tests found that Wave 2 APs can support more than 1Gbps of aggregate downlink throughput, tested over two 1-Gbps LAG (link aggregation) connections.
Tags : cisco systems, meiercom, client density, mimo, link aggregation
     Cisco
By: Cisco     Published Date: Apr 11, 2016
Cisco made Application Policy Infrastructure Controller Enterprise Module (APIC-EM) generally available on November 3rd, 2015. It is an SDN controller that supports apps that make WAN and access networks easier to deploy and manage. Cisco’s focus on a low-risk, incremental approach to adopting SDN will appeal to its user-base. Cisco needs to describe the policy control capabilities benefits of APIC-EM, and also highlight its power as a platform and its ability to distinguish apps from point solution offerings from many other companies with competitive features.
Tags : esg brief, cisco apic, sdn controller, wan, sdn
     Cisco
By: Ruckus Wireless     Published Date: Sep 28, 2009
In this free white paper, learn how it's now possible for wireless local area networks (WLANs) to deliver predictable throughput, reject interference, and generally behave just like Ethernet. Discover how beamforming, a specialized method of antenna-based RF transmission, renders inconsistent performance stable; rejects performance-impeding interference; supports reliability-sensitive applications like real-time voice and high-definition video; and eliminates packet loss, delays, and jitter. Download your copy of this free white paper now.
Tags : wifi, wi-fi, wlan, lan, access points, radio frequency, 802.11, phy
     Ruckus Wireless
By: Ruckus Wireless     Published Date: Sep 28, 2009
In this free white paper, discover the hidden costs of out-of-the-box Wi-Fi. Fluctuating connections can potentially cost thousands per day! Now get cost outlays for 5 vendors in 2 different scenarios; learn which 10 component(s) may avoid catastrophe; and find out when to prioritize coverage over capacity. If your business is riding on Wi-Fi, it pays to play it safe. Learn how-download your copy of this free white paper now.
Tags : ruckus, access points, wifi, wi-fi, wlan, aps, networking, wireless
     Ruckus Wireless
By: Ruckus Wireless     Published Date: Oct 16, 2008
This free white paper clearly explains how to optimize existing networks for Voice Over Wi-Fi (VoFi). Learn how to fight both known and hidden sources of RF voice interference; how to prioritize traffic flows, so voice always comes first; how properly planning your WLAN can dramatically improve handset battery life; how to arrange for roaming without annoying dropouts; and more. Download your free copy now.
Tags : ruckus, access points, wifi, wi-fi, wlan, aps, networking, wireless
     Ruckus Wireless
By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
Meet-me services like Blue Jeans® and Zoom® support only one model: a prescheduled, “meet-me” conference with long, numerical dial strings and access codes. They don’t offer a “connected experience.” You have to separately manage and integrate video systems, resulting in an inferior, disjointed user experience that is more challenging to manage. Meet-me models can’t match Lifesize. Everything else is a group meeting to which participants call in and wait for everyone else. There’s no directory dialing, no point-to-point calling, no presence status and no call escalation. The only thing consistent about meet-me services is that they copy the cumbersome user experience of the audio conferencing model—dial, enter code, enter ID, wait … Download now to learn why Lifesize Cloud is the ONLY solution you need!
Tags : lifesize, cloud, video, connected experience, video systems, meet-me model
     LifeSize, a division of Logitech
By: Citrix     Published Date: Nov 04, 2013
Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access. Click here to find out why.
Tags : citrix xenapp, xenapp, application delivery, application integration, device management, device access, remote access
     Citrix
By: Citrix     Published Date: Jul 25, 2014
This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.
Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
     Citrix
By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
     Bitium
By: HP     Published Date: Aug 26, 2014
SMBs need a robust, scalable network capable of handling any workload securely and reliably. It's critical to select network switches, routers, and wireless access points with the capabilities needed for today's traffic and tomorrow's growth, including mobile and BYOD computing. As part of HP’s Just Right IT program for SMBs, HP Networking solutions are purpose-built for growing businesses. Learn what to look for in networking technology, and how HP can help you create a network that will keep pace with your business growth.
Tags : data, business, technology, portfolio, cloud-based, support, portal, solution
     HP
By: VMware     Published Date: Feb 24, 2017
The workplace has changed radically, and conventional approaches to desktop management and mobile device management (MDM) are no longer adequate for the new digital workplace. Enterprise IT must quickly and dramatically change the way it manages users’ access to digital resources to deliver a consistent experience across all devices, even as operating systems and platforms relentlessly evolve. Fortunately, with the advent of Windows 10, IT now can rethink the way it aligns endpoint management with users’ new digital work styles. Read this UBM whitepaper to learn more about how these seven “musts” can help IT fully leverage Microsoft’s newest operating system to better serve the business.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
End users expect to be able to work anywhere, at any time, and from any device. Additionally, they expect a similar experience for accessing work apps and data across all their devices—desktop, laptop, tablet, and smartphone. Meeting these expectations is becoming more and more complex for IT teams that continue to use multiple disconnected tools to manage mobile and desktop devices. A unified endpoint management (UEM) solution provides a holistic and user-centric approach to managing all endpoints. VMware AirWatch® Unified Endpoint Management™ provides IT with a comprehensive view of asset inventory and full lifecycle management of endpoints across the organization. Read more to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Tags : 
     VMware
By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
     Marketo
By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their company’s information is secure and today any device can become an access point threat. Printers and MFPs can be the Achilles’ Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn what’s necessary to protect your company.
Tags : hewlett packard, printer security, information technology
     Hewlett Packard Enterprise
By: Meru Networks     Published Date: Aug 21, 2009
Pervasive wireless LAN deployments require much larger, broader deployment of Wi-Fi access points than hot spots, cafes or isolated guest access in the enterprise. Clearly new solutions and deployment methodologies should be considered to make pervasive wireless LAN deployments feasible and economical.
Tags : wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells
     Meru Networks
By: Mirage Networks     Published Date: Aug 21, 2009
This industry report gives you the information you need to make decisions about how to secure your network by controlling access and by preventing endpoint infections and policy violations.
Tags : network security, nac, network access control, access control, endpoint security, end-point security, intrusion prevention, policy based
     Mirage Networks
By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management
     Pointsec
By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations
     Quocirca
By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : network security, access control, nac, network access control, intrusion prevention, landesk
     LANDesk
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics