RSS feed Get our RSS feed

News by Topic

wireless management

Results 51 - 71 of 71Sort Results By: Published Date | Title | Company Name
By: BlackBerry     Published Date: Mar 12, 2010
Individually acquired smartphones - those devices that employees purchase outright or get reimbursed for by the organization - are on the rise.
Tags : blackberry, smartphones, wireless, pda, enterprise servers, it management, budget, mobility
     BlackBerry
By: BlackBerry     Published Date: Jun 22, 2010
Fast, accurate communications are the underpinnings of patient care and safety. Yet, today's hospital staff carry so many pagers and other devices, it's become cumbersome. With Amcom Mobile Connect, you can simplify communications and strengthen care by using your BlackBerry smartphone for code alerts, patient updates, lab results, consult requests, and much more. In short, everything.
Tags : blackberry, smartphones, wireless, pda, pagers, healthcare, enterprise servers, it management
     BlackBerry
By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
     Utimaco
By: IBM     Published Date: Oct 10, 2013
Mobile computing via smart phone, laptop, tablet and e-reader is becoming commonplace in the enterprise today. Unfortunately, so are the challenges it brings. This White Paper examines the network security, device management, network performance and user expectation issues you need to solve for effective mobile collaboration, and outlines the planned, architectural approach IBM recommends.
Tags : mobile computing, smart phones, wireless devices, device management, security, network performance, user expectations, mobile collaborations
     IBM
By: IBM     Published Date: Oct 10, 2013
The ubiquity of mobile devices is transforming the ways that business gets done in today’s world. IBM has the services that can help go beyond supporting devices to achieve a flexible, powerful mobile enterprise.
Tags : mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy
     IBM
By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy
     IBM
By: NEC     Published Date: Nov 12, 2014
In this webinar an expert panel will examine the security and visibility needs of mesh SDN networks by examining the security challenges faced by businesses in distributed SDN environments. The webinar will also present real-world case studies of companies who excelling at providing a superior customer experience for their applications and their sites.
Tags : nec, software defined networking, sdn, lan, land area network, wifi, wireless network, network management
     NEC
By: TechInsights     Published Date: Sep 01, 2009
Join us at ESC Boston, September 21-24 at the Hynes Convention Center, in Boston, MA. Expo registration is FREE, and advanced registration pricing is still available for conference packages.
Tags : embedded systems, conference, boston, esc boston, build your own embedded system, atom, windows embedded, classes
     TechInsights
By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection
     AirDefense
By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans
     AirDefense
By: AirTight Networks     Published Date: Aug 21, 2009
More and more companies are realizing that their corporate air waves are an asset that requires protection. Strong security policies have been created for wired networks. The same is now needed for the corporate air waves. This paper will discuss the compelling business reasons why an investment in wireless intrusion prevention should be made.
Tags : intrusion prevention, wireless security, security policy, security policies, security management, governance, airtight, airtight networks
     AirTight Networks
By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management
     Pointsec
By: DataViz     Published Date: Feb 06, 2007
Push email is in high demand for today's mobile workforce. If you have Documents To Go with InTact Technology, you can edit your files from anywhere without compromise.  Check out this white paper to find out how.
Tags : mobile computing, mobile workers, wireless application software, microsoft office, mobility, dataviz, document management, dataviz intact
     DataViz
By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode
     Infor
By: PEAK Technologies, Inc.     Published Date: Apr 19, 2007
Download this paper now and read why many businesses now recognize that comprehensive management of their wireless device infrastructure is a crucial component of a total IT enterprise management solution.
Tags : wireless, infrastructure, wireless infrastructure, wireless device, wireless networking, wlan, mobile computing, it management
     PEAK Technologies, Inc.
By: GAO RFID Inc.     Published Date: Feb 28, 2007
Learn how manufacturers today can leverage RFID technology to help them run more efficient operations that help minimize production down time, optimize material and parts inventories, improve and maintain optimal labor output.
Tags : rfid, wireless, rfid tags, supply chain, supply chain management, gao, gao rfid, gao group
     GAO RFID Inc.
By: Trapeze Networks     Published Date: Apr 16, 2007
This paper identifies the requirements for next-generation WLANs, examines the limitations of existing approaches, and describes an innovative WLAN architecture from Trapeze Networks called Smart Mobile™, which overcomes those limitations.
Tags : 802.11n, wireless, wi-fi, wireless local area network, wlan, wireless network, mobile, voice over ip
     Trapeze Networks
By: CommonTime     Published Date: Apr 02, 2008
Many companies that have already invested in IBM Lotus Domino/Notes for their business communications now look to achieve the business benefits that are delivered by mobility solutions. To address this challenge, CommonTime has partnered with Microsoft® to combine key elements our best-of-breed Lotus Domino/Notes mobility solution for Windows Mobile devices with Microsoft’s System Center Mobile Device Manager 2008 (MDM).
Tags : wireless device management, mobile device management, mobile workers, asset management, commontime
     CommonTime
By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will provide advice, best practices, and insight on how to create security and management policies for a wireless workforce.
Tags : messagelabs symantec hosted services, wireless workforce, mobile data security, data and services, business practices, security, management policy
     Symantec.cloud
By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
     Ruckus Wireless
By: Sierra Wireless     Published Date: May 08, 2019
With Octave TM, Sierra Wireless went a step further and takes care of the secure device to cloud infrastructure OEM need, so that washing machine manufacturers can focus on what really matters for their business: acting on their equipment data to create new services. Octave is an all-in-one D2C platform optimized for cellular IoT, including intelligent edge, wireless network connectivity, and unique data orchestration and device management capabilities. To find out more download today!
Tags : 
     Sierra Wireless
Start   Previous    1 2 3     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics