Search the Library
 
Home >

Wireless

>

Wireless Security


Results 1 - 25 of 47 matches Sort Results By : Published Date | Title | Company name
The CIO's Guide to Fixed Mobile Convergence
By : BlackBerry Published Date: Jun 12, 2009
Mobile working has transformed the business world, stimulating innovation, improving productivity and creating new opportunities. Industry analyst estimates suggest the mobile workforce could exceed 800 million in 2009. These workers can spend as much as 40% of their time away from their desk, complicating their communication needs and draining productivity. As businesses look to do more and encourage the best from their workforce, flexible, on-demand access to information has become a requirement.
Download Now
BlackBerry
Network and Endpoint Data Leak Prevention: Comprehensive Protection Using a Best-of-Breed Approach
By : Trend Micro, Inc. Published Date: Jan 16, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.

Download Now
Trend Micro, Inc.
Trend Micro LeakProof: Leveraging Data Leak Prevention Technology to Secure Corporate Assets
By : Trend Micro, Inc. Published Date: Dec 02, 2008
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won’t do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.

Download Now
Trend Micro, Inc.
When Encryption Is Not Enough
By : Trend Micro, Inc. Published Date: Dec 02, 2008
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.

Download Now
Trend Micro, Inc.
Applications, Virtualization and Devices: Taking Back Control
By : Sophos Published Date: Aug 13, 2008
Employees installing legitimate but unauthorized applications, are a real and growing threat to business security and productivity. Removable storage media and wireless protocols make the challenge of securing data even more complex. This paper explains why control is important and highlights how integrating this functionality into malware protection is the simplest and most cost-effective solution.
Download Now
Sophos
Securing Data on Laptops: Why Encryption Isn't Enough
By : Absolute Software Published Date: May 06, 2009
Missing laptops and mobile devices continue to be the number one cause of data breaches. Research indicates that over 60% of data breaches are caused by careless employees or insider theft. This white paper provides a case for endpoint security that remains effective regardless of end-user reliability.
Download Now
Absolute Software
The Human Factor in Laptop Encryption
By : Absolute Software Published Date: May 05, 2009
This Ponemon Institute whitepaper examines the behavior of non-IT employees when it comes to encryption policy. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Download Now
Absolute Software
Success Story: Data Breach Defense at Allina Hospitals
By : Absolute Software Published Date: May 05, 2009
With an electronic health record system spanning 11 hospitals, Allina required a way to protect 2,700 laptops. Using Computrace, Allina has improved tracking from 30% to over 95% of computers outside facilities, and has averted several possible data breaches.
Download Now
Absolute Software
Best Practices: LAN Security and 802.1X
By : Nevis Networks Published Date: Jun 22, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.

Download Now
Nevis Networks
Download The Wi-Fi Technical Poster
By : Xirrus Published Date: May 02, 2007
Get a technical foundation for deploying a high performance Wi-Fi network. Learn the details of how they work/compete, where they complement and where they're most effective.
Download Now
Xirrus
What's Missing from SEM? Security Management is More than Event Management
By : NetIQ Corporation Published Date: Jan 10, 2007
This white paper identifies what is required for a comprehensive and integrated security management solution and examines the difference between SEM, SIM and SIEM and the challenges of enterprise level security monitoring.
Download Now
NetIQ Corporation
Wired + Wireless: Smart Planning for New Network Infrastructures
By : Belden Published Date: Apr 16, 2009
This paper provides recommendations and tips for accomplishing this by discussing: considerations for the wiring closet, identification of all network requirements, trends and tools for planning the placement of Access Points, decision factors to consider for combined networks, technology trends and standards, power level requirements, cable deployment and many other factors that impact the optimization of performance and reliability of combine wired and wireless networks.  Learn more today!

Download Now
Belden
Wireless Networking Five Questions to Start With
By : Cisco Published Date: Oct 09, 2008
Wireless networking is an essential productivity tool for today's mobile workforce. With wireless networking, you and your employees can stay connected to your company's information resources virtually anytime, anywhere.
Download Now
Cisco
Enable Your Mobile Workforce without Putting Your Data at Risk
By : McAfee Published Date: Aug 08, 2008
As the global workforce becomes increasingly mobile, it's more important than ever to prevent that workforce from becoming a liability to your organization. If just one employee loses a laptop, USB drive, or handheld device or uses sensitive data in unintended ways, your entire company could risk a highly public breach incident. In this environment you need new breeds of security applications to help shield your organization and employees from the latest mobile threats.
Download Now
McAfee
Are We Doomed? Security Predictions For 2008
By : ESET Published Date: Dec 17, 2007
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.

Download Now
ESET
MobilePass - Authenticating Users on the Go!
By : Secure Computing Published Date: Dec 14, 2007
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Download Now
Secure Computing
Securing Mobile Connectivity with Two-Factor Authentication
By : Secure Computing Published Date: Nov 09, 2007
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Download Now
Secure Computing
Security for the Wireless Network
By : WatchGuard Technologies Published Date: Sep 24, 2007
Wireless is becoming less an option and more of a standard corporate communication strategy.  Learn how to keep to keep it secure with this white paper.

Download Now
WatchGuard Technologies
Good Architecture and Security
By : Motorola Good Technology Published Date: Jun 19, 2007
Maintaining security while providing mobile workers with access to the information they need, when and where they need it, is complex. This white paper helps you understand the risks associated with mobile applications, handhelds and wireless networks—then shows you how Good Mobile Messaging helps you address these issues.
Download Now
Motorola Good Technology
Mobile Device Security: Securing the Handheld, Securing the Enterprise
By : Motorola Good Technology Published Date: Mar 27, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Download Now
Motorola Good Technology
Managing the Mobile Enterprise: A Guide for Creating Effective Enterprise Wireless Strategies
By : Motorola Good Technology Published Date: Mar 27, 2007
Wireless access to enterprise information is going mainstream. However, while the groundswell of enthusiasm for wireless access is coming from the bottom up, the management of wireless access needs to be driven from the top down. Learn how you can build a solid wireless strategy for your organization.
Download Now
Motorola Good Technology
Safeguard Data Loss
By : Utimaco Published Date: Mar 12, 2007
If company laptops, PDAs, or other mobile devices can't be found, it doesn't always mean that they've been stolen. Companies often lose track of these IT assets because there's no clear record of them. Encryption and inventory management can help to safeguard against the loss of confidential data.
Download Now
Utimaco
The Enterprise Mobile Messaging Benchmark Report
By : Motorola Good Technology Published Date: Dec 29, 2006
In this report, Aberdeen takes an in-depth look at how best-in-class organizations are using mobile messaging to improve productivity and customer service. They also define the steps that can help your organization deploy a best-in-class enterprise mobile messaging solution.
Download Now
Motorola Good Technology
Enterprise Mobile Adoption
By : Motorola Good Technology Published Date: Nov 08, 2006
This White Paper outlines how mobile solutions help organizations work efficiently in a global business environment. It also discusses how organizations can best create processes around device usage, data/service access and security.
Download Now
Motorola Good Technology
Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance
By : AirDefense Published Date: Apr 05, 2006
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Download Now
AirDefense
 
Results 1 - 25 of 47 matches Sort Results By : Published Date | Title | Company name
Home >

Wireless

>

Wireless Security

<< Start < Previous 1 2 Next > End >>

More Wireless Topics

802.11

,

Bluetooth

,

CDMA

,

GPS

,

Mobile Computing

,

Mobile Data Systems

,

Mobile Workers

,

PDA

,

RFID

,

Smart Phones

,

WiFi

,

Wireless Application Software

,

Wireless Communications

,

Wireless Hardware

,

Wireless Infrastructure

,

Wireless Messaging

,

Wireless Phones

,

Wireless Security

,

Wireless Service Providers

,

WLAN

SUBSCRIBE FORM
Receive an email alert whenever new research is added into:
Wireless Security
Enter your email below:

RELATED TOPICS
IT Management
386 Documents
Networking
233 Documents
Security
482 Documents
Wireless
85 Documents

Search the Library
White Papers powered by
   Wireless Security White Papers
   Learn about White Paper Lead Generation opportunities
Quick Links
Ziff Davis Media