Wireless Local Area Networks Reports

Deployment Strategies for 802.11n: Key Considerations for the Next Generation of Wireless Networking
sponsored by Brocade
WHITE PAPER: While 802.11n wireless networks let enterprises create a seamless working environment by combining the mobility of wireless with the performance of wired networks, the best ways for deploying 802.11n—while minimizing acquisition and operational costs—may still be unclear. Read this white paper to learn more.
Posted: 05 Oct 2010 | Published: 05 Oct 2010

Brocade

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.
Posted: 17 Apr 2013 | Published: 31 Dec 2012

AirTight Networks, Inc.

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
sponsored by Motorola Solutions
WHITE PAPER: This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
Posted: 19 Aug 2009 | Published: 01 May 2007

Motorola Solutions

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

TechTarget Security

WLAN Access Control and Wi-Fi Network Needs
sponsored by TechTarget Security
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

TechTarget Security

Bring Your Own Design: Simplifying BYOD with Ruckus Wireless
sponsored by RUCKUS Networks
PRESENTATION TRANSCRIPT: Uncover how to use the right Wi-Fi access points (APs) in your organization to embrace the bring your own device (BYOD) movement without sacrificing the security or manageability of your wireless network.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

RUCKUS Networks

SD-WAN: Is This a Secure Line?
sponsored by TechTarget Networking
EZINE: In this issue of Network Evolution, learn how software-defined WAN is helping enterprises maintain secure networks while embracing hybrid WAN architectures at the branch.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

TechTarget Networking

Riding Wave 2
sponsored by TechTarget Networking
EBOOK: Making the switch to Wave 2 wireless, and 802.11ac products, will require design and other adjustments by enterprise networking pros.
Posted: 22 Nov 2016 | Published: 15 Nov 2016

TechTarget Networking

Tech Guide: Desktop Virtualization and the Network
sponsored by DellEMC and Intel®
EGUIDE: Discover the impact desktop virtualization and virtual desktop infrastructure have on your network.
Posted: 02 Jan 2013 | Published: 23 Feb 2012

DellEMC and Intel®

Healthcare Reference Architecture – Mobile Access Solutions for Point-of-Care Applications
sponsored by Aerohive Networks
WHITE PAPER: In this white paper, discover a set of solutions that enable healthcare providers with reliable, high-performance mobile voice and data access to help improve point-of-care delivery.
Posted: 24 Mar 2014 | Published: 31 Dec 2012

Aerohive Networks