Whitepapers


Sort by: Date | Company | Title


Building Secure Wireless LAN
By Aerohive Networks | 16/6/2011

Security of a wireless network still ranks as one of the largest concerns of IT professionals planning to roll out an enterprise wireless LAN. Many people erroneously believe that a wireless LAN is inherently insecure. This is largely due to security flaws in early Wi-Fi protocols like WEP (Wired Equivalency Protocol), more recent vulnerabilities found in TKIP and lack of awareness as to how to deploy a secure WLAN. This whitepaper will help the wireless network administrator or security manager to understand the security capabilities in a modern Wi-Fi solution, where they should be used and how the WLAN integrates with other security devices in the network.

Download this now


Service Level Assurance - Wireless Fidelity Achieved
By Aerohive Networks | 16/6/2011

Before Wi-Fi protocol analyzers, administrators and consultants alike were only able to troubleshoot by continually reviewing the network design of and device operation within the network infrastructure. With the introduction of Wi-Fi protocol analyzers, these professionals had the equivalent of RF goggles. They could now see what was happening and could reactively troubleshoot problems. Read on.

Download this now


The Network Impact of 802.11n
By Aerohive Networks | 16/6/2011

802.11n is delivering on promises to bring revolutionary advances in throughput and capacity to the wireless LAN. For the first time in the history of the development of IEEE 802.11 networks, wireless LAN speeds are comparable to commonly used wired technologies. Now that wireless LAN users have access to speeds well in excess of 100 Mbps, wireless LANs can no longer be treated as an afterthought.

Download this now


A Practical Approach to Wireless 2.0
By Aerohive Networks | 16/6/2011

While all Wi-Fi vendors understand the need for and are taking steps in the directions of a fully-distributed architecture, crossing the bridge from controller-based to controller-less takes a significant amount of time and effort because all system features and the user interface must be re-architected for a fully-distributed platform. We invite you to take the road less traveled: controller-less. Read on.

Download this now


Delivering Secure Guest Access and Mobile Internet Device (MID) Management with HiveOS 4.0
By Aerohive Networks | 16/6/2011

Mobile Internet Devices (MIDs) are easily the most exciting development in computing devices in the post-laptop era. By combining portability near to that of a phone with a larger screen, it is possible to interact with much larger data sets and to perform previously inaccessible computing tasks. From the user perspective, one set of credentials is used on all devices, including MIDs. However, only corporate-owned devices have access to the corporate network. Personal devices can be restricted to only Internet access, or can be given access only to a restricted set of resources such as a virtual desktop infrastructure. Read on.

Download this now


The Economics of Cooperative Control - Protocols are Free
By Aerohive Networks | 16/6/2011

Today's de facto standard architecture is commonly referred to as the, “controller-based” architecture, sometimes referred to as the “split MAC” architecture. It involves one or more controllers and controller-based (lightweight, thin) APs. The controller-based architecture was created to solve manageability, mobility (as opposed to portability), control-plane inadequacies, and high operational expenditure (OPEX) problems that were prevalent in autonomous (fat, thick, standalone) AP implementations. Find out how to eliminate the need to redesign your network in order to introduce a controller-based overlay infrastructure. That’s one less thing to manage, and one less thing to pay for.

Download this now


Evolving Threats Demand New Approaches to Security
By Akamai Technologies | 23/1/2014

As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.

Download this now


Security in a Faster Forward World
By Akamai Technologies | 23/1/2014

Organizations today operate in a Faster Forward world, as they experience a shift towards an increasingly mobile workforce. Following this, an evolving stream of attackers are now targeting mobile devices where they can more easily access a larger number of high-value corporate and government assets. This paper will guide you through finding the right Web security partner that can improve efficiency while reducing risks and improving web experience.

Download this now


Evolving Threats Demand; New Approaches To Security
By Akamai Technologies | 28/10/2013

As the world becomes increasingly hyper-connected, the opportunities for innovation and new business models are virtually limitless. However, with so much business-critical information at stake, the need to protect a company's IT assets is more important than ever before. This paper aims to profile the emerging players who comprise today’s emerging threat ecosystem; today's trends and the latest insights into the future.

Download this now


Video: How to Integrate Conferencing Systems & Unified Communications
By Alcatel-Lucent | 27/10/2011

This 2 minute video by Peter Anderhom, Product Manager for Unified Communications ( Alcatel-Lucent) demonstrates the integration between Alcatel-Lucents' video conferencing systems and Alcatel-Lucents unified communications.

Download this now

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?