> Technology > Wireless
 

Wireless

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.
Results 1 - 25 of 393Sort Results By: Published Date | Title | Company Name
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, it management
     XO Communications
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : mobile security, apps, cyber criminals, cyber security, trend micro
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : security solution, cyber attack, mobile devices, business security, user protection
     CDW-Trend Micro
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Volume III: Now that you know the app management basics, it’s time to learn not all apps are developed equally. Nor should they be; learn the layered security options for apps based on the privacy of data passing.
Tags : app management, app security, privacy, data passing, mobile app
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : mobile application lifecycle, application lifecycle management, security, malm, app protection
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : nist requirements, dod requirements, mobile device management, federal affairs, government
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : mobile device management, manufacturing, mobile devices, smartphone, tablet
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.
Tags : mobile device management, education, educators, students, app management
     MaaS360 by Fiberlink
By: IBM     Published Date: Jul 07, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs. It also charts our four capabilities and the modular services aligned to them.
Tags : ibm, developer, app, platform, it manager
     IBM
By: IBM     Published Date: Jul 07, 2015
By 2018, company-supplied mobile phones will exceed 228 million and mobile devices will replace 63% of desktops. Are you ready?
Tags : ibm, mobile, devices, strategy, infrastructure
     IBM
By: Verisign     Published Date: May 19, 2015
To help meet the performance, availability and functional requirements of operating critical Internet infrastructure, Verisign developed its innovative DDoS mitigation platform, called Athena™.
Tags : ddos mitigation platform, internet infrastructure, cloud, athena, it management
     Verisign
By: Verisign     Published Date: May 19, 2015
Download this infographic to see observations and insights about attack size and frequency derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and insights from iDefense Security Intelligence Services, from October-December 2014.
Tags : ddos attack trends, ddos protection services, security, it management, wireless
     Verisign
By: Verisign     Published Date: May 19, 2015
Download this case study to see why Verisign asserts that such adaptable and well-orchestrated DDoS attacks point to a rapidly evolving threat landscape, where asymmetries afforded to adversaries require rapid response and layered security defenses that can accommodate an ever-expanding array of attack vectors.
Tags : ddos attack, security defenses, attack vectors, it management, wireless
     Verisign
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : endpoint security, desktop devices, mobile devices, byod, corporate data
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : cloud security, virtualization security, virtualization, data center, it management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands— while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Read this white paper to learn more about virtualization and cloud computing.
Tags : security, virtualization, cloud computing, trend micro, it management
     CDW-Trend Micro
By: Intacct Corporation     Published Date: Mar 31, 2014
Thinking about moving your financial apps to the cloud? Chances are, you've asked yourself the same crucial question that's applied to every strategic decision in your business: What's the ROI? A solid business case not only unlocks budget dollars, it provides a roadmap for successful deployment and maximum value.
Tags : roi, finance, cloud based financial applications, finance applications, financial management
     Intacct Corporation
By: CenturyLink     Published Date: Jul 29, 2015
Written for IT decision-makers with responsibility for eCommerce infrastructure, this CenturyLink-commissioned survey by Forrester Consulting evaluates the current adoption trends and challenges with hosted eCommerce solutions. Read this report to ensure you are investing in solutions that will bolster your eCommerce infrastructure for a superior customer experience - while also driving the agility and operational efficiency you need to stay competitive.
Tags : web and mobile performance, operation efficiency, ecommerce solutions, ecommerce infrastructure, customer experience
     CenturyLink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
To maximize mobility, a nuanced strategy is the order of the day. For mobility’s transformative potential to be realized, IT needs to become a business partner that understands business drivers and then devises the technology roadmap to support everyone’s goals. Read this paper to learn more about mobility management.
Tags : enterprise mobility management, technology roadmap, mobile devices, it management, wireless
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.
Tags : byod, mobile devices, smartphone, tablet, it management
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : magic quadrant, enterprise mobility management, emm, mobility security, vendors
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : enterprise mobile management, emm, ibm, vendors, mobile management strategy
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.
Tags : enterprise mobility management, emm, ovum, vendors, tablet
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : google, google mobile os, android, hackers, security
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
iOS: The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : ios 8, apple, macintosh, security, information sharing
     MaaS360 by Fiberlink
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search