Information Security Research Library

Powered by Bitpipe.com

Wireless SecurityResearch

  • Why and How You Should Use a VPN

    Sponsored by: Global Knowledge

    This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.

  • A Wireless LAN that Works for Mobile Business

    Sponsored by: Dell, Inc.

    Businesses need a robust, consistent, and high-performing WLAN if they want to keep up with the constant changes that redefine wireless.  There are a lot of options out there, so its important to find a solution that gives you more features at a lower cost.

  • Securing the Small Business Network

    Sponsored by: Dell Software

    This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.

  • ESG Research: Security Management and Operations

    Sponsored by: Hewlett-Packard Company

    The prevalent approach to security management and operations is to implement on an ad hoc and technology-focused basis. This haphazard approach is no longer adequate.  This report details the current state of the market and what to expect moving forward.

  • Top Tips for Managing a Mobile Workforce

    Sponsored by: GFI Cloud

    This white paper introduces several tips for managing and protecting a mobile workforce, including solutions compatible with cloud computing.

  • Network protection and UTM Buyers Guide

    Sponsored by: Sophos, Inc.

    This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.

  • A Step-by-Step Survival Guide to Data Protection

    Sponsored by: Druva Software

    This white paper provides step-by-step advice on how organizations can protect their corporate data from threats like lost devices and eDiscovery issues.

  • Transforming Your WiFi Network Into A Secure Wireless LAN

    Sponsored by: Fortinet, Inc.

    With businesses utilizing WLAN for BYOD strategies, it is more important than ever to secure your wireless networks. This guide explores a solution that allows a network of any size to take advantage of wireless technology without compromising the network's security.

  • How Can You Avoid a Web Security Breach? It's All in the Preparation

    Sponsored by: SearchSecurity.com

    In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.

  • A New Set of Network Security Challenges

    Sponsored by: Dell Software

    This new IDG survey reveals optimism about the ability of next-generation firewalls to help IT balance productivity and security. With both productivity and security becoming increasingly crucial, IT faces conflicting mandates from the business.

  • Delivering enhanced BYOD infrastructure with the Dell Networking W-Series Wireless portfolio

    Sponsored by: Dell, Inc.

    Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.

  • Decode MDM Solution Features: Must haves for security management

    Sponsored by: SearchSecurity.com

    Question #3 featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space if their products support mobile security management features

  • MDM Solutions for Dummies: Product Integration

    Sponsored by: SearchSecurity.com

    Question two featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space: Can your product integrate with enterprise infrastructure elements? Find out what these vendors have to say by accessing their answers to this question now.

  • How to Handle Mobile Devices' Impact on the Network

    Sponsored by: SearchNetworking.com

    The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months.

  • BYOD File Sharing – Go Private Cloud to Mitigate Data Risks

    Sponsored by: Accellion, Inc.

    Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.

  • IM Wireless Network Assessment

    Sponsored by: Ingram Micro

    The need to protect your data and organization is now even more critical than before. Take a look at this brief white paper to learn how one company can help you secure your business.

  • Explaining How Trusted SSL Certificates and Forged SSL Certificates Work

    Sponsored by: Symantec Corporation

    Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.

  • Why Switch to Thawte?

    Sponsored by: Thawte Inc.

    This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.

  • Thawte in Education

    Sponsored by: Thawte Inc.

    Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.

  • Antivirus Evaluation Guide

    Sponsored by: Threat Track Security

    In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.

  • PBS Engineering and Environmental Bolsters Virtualized Environment with Disaster Recovery Efforts and Cuts 40 Percent in Energy Costs

    Sponsored by: Dell and VMware

    Learn how one firm improved diaster recovery efforts with virtualization and cut energy costs by 40%.

  • Symantec Website Security Threat Report

    Sponsored by: Symantec Corporation

    This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.

  • Reducing Security Complexity

    Sponsored by: Optus Business

    In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.

  • Wireless Solutions for Tablets and Smartphones

    Sponsored by: Xirrus

    As the popularity of mobility grows, so do the challenges for IT. This resource explores how you can transform mobility from an IT challenge into a business opportunity by designing and managing a better wireless network.

  • Application Control at the Wireless Edge

    Sponsored by: Xirrus

    With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.