White Papers: Wi-Fi
BYOD in Healthcare
By HP | 1/5/2013
In today’s healthcare environment, more and more people are bringing their Wi-Fi devices into the hospital’s infrastructure. This presents a unique challenge to the hospital IT administrator. This paper discusses the challenges and solutions on how HP addresses the security and management of multiple Wi-Fi devices being introduced into the wireless/wired network. Click for more!Download this now
Case Study: Microsoft Corporate Headquarters Runs Lync Over Aruba Wi-Fi
By Aruba | 30/1/2013
As one of the world’s leading unified communications solution vendors, Microsoft has high expectations for the performance and robustness of the IT infrastructure on which its Microsoft Lync application runs. So when it came time to roll out Lync voice and video services over Wi-Fi at Microsoft’s own headquarters in Redmond, Washington, the bar was set high. Very high. Learn more.Download this now
The New Normal: Mobile Device and App Behaviour Over Wi-Fi and Best Practices for Wireless Networks
By Aruba | 17/1/2013
Use of more mobile devices and hence more mobile applications at work create an ever-changing number of challenges for wireless network administrators and engineers. With smartphones, tablets and latest generation of laptops entering the workplace, a wide variety of smartphones and tablets access the network, almost always using Wi-Fi as the preferred – and sometimes the only – way to connect. Find out more about the New Normal of Wi-Fi Networking.Download this now
Everybody Loves Wi-Fi
By Aruba | 14/1/2013
Rapid and escalating growth in demand for wireless connectivity is fast becoming a major issue in large enterprises, putting ever more pressure on Wi-Fi infrastructures already creaking under the strain. Pressure that, in turn, has implications when it comes to business agility, productivity and, ultimately, profitability. Read more.Download this now
Protecting Users from Firesheep and other Sidejacking Attacks with SSL
By Symantec | 17/2/2012
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to web sites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise. Read on.Download this now
Service Level Assurance - Wireless Fidelity Achieved
By Aerohive | 16/6/2011
Before Wi-Fi protocol analyzers, administrators and consultants alike were only able to troubleshoot by continually reviewing the network design of and device operation within the network infrastructure. With the introduction of Wi-Fi protocol analyzers, these professionals had the equivalent of RF goggles. They could now see what was happening and could reactively troubleshoot problems. Read on.Download this now
Get exclusive access to Invitation only events CIO, reports & analysis.
Sign up now »
Sign up now »
Enterprises and government agencies are under virtually constant attack today. It is clear that the cybercriminals, nation-states, and hacker activists waging these attacks are growing increasingly sophisticated and more effective ...
Most Popular Whitepapers
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- AusCERT 2013: What's it like to be a 'Nigerian scam' victim?
- AusCERT 2013: Ashley Deuble: Network Security Monitoring with Security Onion
- Lack of information, skills hinder finance-business partnering: Deloitte
- Apple defends offshore decisions that result in low taxes
- Vodafone revenue and profit drop as European troubles continue
- Apple to tell Senate it pays every cent of its taxes
- Cash visibility tops list in first Asia-Pacific treasury report