Wireless Whitepapers


Sort by: Date | Company | Title


Delivering Secure Guest Access and Mobile Internet Device (MID) Management with HiveOS 4.0
By Aerohive Networks | 16/6/2011
Mobile Internet Devices (MIDs) are easily the most exciting development in computing devices in the post-laptop era. By combining portability near to that of a phone with a larger screen, it is possible to interact with much larger data sets and to perform previously inaccessible computing tasks. From the user perspective, one set of credentials is used on all devices, including MIDs. However, only corporate-owned devices have access to the corporate network. Personal devices can be restricted to only Internet access, or can be given access only to a restricted set of resources such as a virtual desktop infrastructure. Read on.
Download this now


Building Secure Wireless LAN
By Aerohive Networks | 16/6/2011
Security of a wireless network still ranks as one of the largest concerns of IT professionals planning to roll out an enterprise wireless LAN. Many people erroneously believe that a wireless LAN is inherently insecure. This is largely due to security flaws in early Wi-Fi protocols like WEP (Wired Equivalency Protocol), more recent vulnerabilities found in TKIP and lack of awareness as to how to deploy a secure WLAN. This whitepaper will help the wireless network administrator or security manager to understand the security capabilities in a modern Wi-Fi solution, where they should be used and how the WLAN integrates with other security devices in the network.
Download this now


A Practical Approach to Wireless 2.0
By Aerohive Networks | 16/6/2011
While all Wi-Fi vendors understand the need for and are taking steps in the directions of a fully-distributed architecture, crossing the bridge from controller-based to controller-less takes a significant amount of time and effort because all system features and the user interface must be re-architected for a fully-distributed platform. We invite you to take the road less traveled: controller-less. Read on.
Download this now


The Economics of Cooperative Control - Protocols are Free
By Aerohive Networks | 16/6/2011
Today's de facto standard architecture is commonly referred to as the, “controller-based” architecture, sometimes referred to as the “split MAC” architecture. It involves one or more controllers and controller-based (lightweight, thin) APs. The controller-based architecture was created to solve manageability, mobility (as opposed to portability), control-plane inadequacies, and high operational expenditure (OPEX) problems that were prevalent in autonomous (fat, thick, standalone) AP implementations. Find out how to eliminate the need to redesign your network in order to introduce a controller-based overlay infrastructure. That’s one less thing to manage, and one less thing to pay for.
Download this now


Risk and Reward: Business Opportunities and the IT Security Challenge
By SonicWall | 24/9/2010
SonicWALL and CIO magazine’s custom solutions group recently conducted a series of facilitated conversations with dozens of CIOs and senior IT executives throughout the United States. The upshot: Most IT leaders are now building their technology infrastructure for growth. Their issue: How to seize new business opportunities while mitigating risk.
Download this now


Wireless LANs: Is My Enterprise At Risk?
By Motorola Australia | 2/6/2009
This paper details the risks associated with wireless LANs, and offers an overview of the inherent properties of wireless LANs and differences from wired networks. Read about real-life breaches and incidents and strengthen your own defence.
Download this now
CIO
ARN
Techworld
CMO