Wireless Security White Papers

Results 1 - 25 of 285Sort Results By: Published Date | Title | Company Name
By: Astaro     Published Date: Jan 19, 2011

This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.

Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management
By: ThousandEyes     Published Date: Jan 14, 2018

ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.

Tags : thousandeyes, ddos, migration, network migration, network security, wireless security, data protection, secure content management
By: Proofpoint     Published Date: May 17, 2017

In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.

Tags : proofpoint, ransomware, intrusion prevention, cyberattack, data protection, network security, encryption, wireless security
By: Kaspersky     Published Date: Feb 06, 2017

Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.

Tags : kaspersky, cyber crime, data loss, business security, network security, email security, hacker detection, internet security
By: Kaspersky     Published Date: Feb 06, 2017

As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.

Tags : ransomware, malware, encryption, cyberthreat, hacker detection, intrusion prevention, mobile data systems, smart phones
By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016

This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.

Tags : vasco, identitiy management, portal security, patient security, password protection, cybersecurity, network security, authentication
By: Cambium Networks     Published Date: Oct 03, 2016

What’s the catalyst behind this astonishing growth? There’s little question that one of the prime drivers — perhaps the most important of all — is the meteoric rise of reliable, high quality, cost-efficient wireless broadband video surveillance networks.

Tags : video surveillance, security, wireless broadband, safety, video camera, wireless security
By: Kaspersky     Published Date: Aug 17, 2016

Download our eBook to learn what you can expect from the oncoming wave of connected “things.”

Tags : kaspersky, iot, internet security, hackers, cybercrime, wireless security, network security, firewalls
By: Kaspersky     Published Date: Jul 22, 2016

Learn how you can maximize the performance and security of your virtualized machines.

Tags : kaspersky, virtual security, virtual environment, data breach, data protection, network security, email security, intrusion prevention
By: Kaspersky     Published Date: Jul 22, 2016

Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?

Tags : kaspersky, byod, mobile device management, mobile workers, mobile security, remote security, mobile computing, smart phones
By: MobileIron     Published Date: May 23, 2016

Managing your devices keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron makes your life much simpler and streamlines many traditional PC management responsibilities. 415

Tags : security, mobileiron, best practices, windows, device management, identity management, security management, mobile computing
By: Kaspersky     Published Date: May 11, 2016

You don't have to be a victim of ransomware. Get the facts you need to protect your company.

Tags : kaspersky, ransomware, encyyption, data access, email security, company security, network security, access control
By: Kaspersky     Published Date: May 11, 2016

As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.

Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall
By: IBM     Published Date: Apr 04, 2016

Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.

Tags : ibm, mobile, mobility, mobile risk mitigation, security, mobile computing, mobile data systems, wireless security
By: IBM     Published Date: Apr 04, 2016

In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.

Tags : ibm, mobile security, mobile security maturity, ismg, security, mobile computing, mobile data systems, wireless security
By: IBM     Published Date: Apr 04, 2016

When you think about mobile security and policies, do you ever think about all the places your enterprise data is going? We operate in a mobile economy, with an estimated 16M mobile devices infected by malware at any given time. There are more mobile devices connected to the Internet than human beings in the world. The question is: Are we prepared for that?

Tags : ibm, ciso, mobility, mobilephobia, mobile security, security, mobile computing, mobile data systems
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Security is a top priority at Citrix. This whitepaper is meant to delve into the technical details of the security around the Citrix XenMobile solution and each of its components. Details include how Citrix implements secure mobile device management, mobile application management, mobile content management and more

Tags : citrix, xenmobile, mobile, security, mobile device management, mobile app management, mobile content management, secure instant messaging
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.

Tags : citrix, enterprise, application, enterprise, network security, access control, mobile computing, mobile workers
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

To help IT regain control over employee file sharing, Citrix offers ShareFile—an enterprise-class, IT-managed, secure file sync and sharing service. ShareFile offers IT the ability to control sensitive corporate data while meeting the mobility and collaboration needs of users. Download white paper and learn more.

Tags : citrix, sharefile, enterprise, security, email security, internet security, mobile computing, smart phones
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

This whitepaper, written in collaboration with TAL Global (a leading security consulting and risk management firm), highlights five case studies to illustrate common legal and security issues associated with BYO.

Tags : citrix, security, mobile, password management, mobile computing, mobile workers, wireless phones, wireless security
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.

Tags : citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.

Tags : citrix, cyberthreat defense, report, 2015, network security, anti virus, compliance, identity management
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration.

Tags : citrix, netscaler, security, mobile, applications, network security, application security, smart phones
By: TheMarketingScope     Published Date: Nov 19, 2015

In this white paper, we will provide an overview of the present state of mobility in the enterprise and identify loopholes and key areas of concern for the Public Sector.

Tags : byod, mobile devices, mobile workers, smartphones, mobile computing, laptops, communications, ip networks
By: Aerohive     Published Date: Oct 27, 2015

Ce webinaire s’adresse à tous les professionnels de l’informatique qui veulent en savoir plus sur les réseaux sans fil, et souhaitent déployer ou étendre ces derniers dans leur entreprise

Tags : wlan, wi-fi, wireless networks, wireless architectures, networking, wifi, wireless application software, wireless infrastructure
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End