roaming

Results 1 - 25 of 28Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
Published By: Red Hat APAC     Published Date: Jul 16, 2019
https://asset.madisonlogic.com/production/asset-approval/35341_78975_preview.html?v=1563344610178 Red Hat CTO for global service providers, Ian Hood, and TelecomTV talk about multi edge compute capacity and the fundamental need to have a common platform to deliver future services. ‘If you are not feeling some pain, you are not driving fast enough’, says Red Hat CTO, Global Service Provider, Ian Hood. The race to 5G is definitely on, and the use cases are clear. You can talk about multi edge compute capacity and other technical issues, but the fundamental thing is to have a common platform to deliver future services. We need to get to the point where IoT Everywhere, virtualized video and all the applications that come from new 5G services are delivered seamlessly. Even blockchain has a clear future within the telco environment where the world of eSIMs, secure roaming charges and identity management can alls be based on blockchain technology.
Tags : 
    
Red Hat APAC
Published By: Sophos     Published Date: Oct 07, 2015
This paper looks at BYOD security challenges posed by employees working beyond the company's secure perimeter, exposes the main BYOD security risks and proposes transitioning to a cloud-based security service.
Tags : 
security, byod security, bring your own device security, byod security challenges
    
Sophos
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: iPass     Published Date: Jun 15, 2009
In this Webcast, Brownlee Thomas, Ph.D., Principal Analyst from Forrester Research, Inc., talks about current enterprise mobility trends, shows you what other companies are doing in response to these trends and gives you best practices for reducing your own mobility costs. Don't miss this timely and insightful Webcast.
Tags : 
ipass, wifi, smartphones, roaming, web portal, vpn, ethernet, connection detail records, cdrs
    
iPass
Published By: iPass     Published Date: Sep 22, 2009
A few short years after 3G service brought us anytime, anywhere broadband-and before Apple rolled out its 3G iPhone-4G networks began raising the bar in select markets. This latest evolution in wireless networking offers faster wireless data transmission speeds, vastly superior coverage and support for a new generation of mobile applications and services.
Tags : 
ipass, wifi, smartphones, roaming, web portal, vpn, ethernet, connection detail records, mobility, mobile workers, cdrs
    
iPass
Published By: SES     Published Date: Oct 12, 2016
SES Plus comprises a series of differentiated solutions designed to offer enterprises more. Flexibility and more scalability to meet their connectivity needs.
Tags : 
connectivity, enterprise, ses plus, collaboration, business connectivity, roaming
    
SES
Published By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
    
Symantec
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Our Customer Advocacy team have just finalized another customer video with Spanish Partner OmniAccess. The video will be translated in Italian and Spanish. The content is that Omnicasse is using Umbrella to secure connectivity for private yachts and cruise ships in the Mediterranean and beyond. OmniAccess utilizes many capabilities within Umbrella, including the roaming client, the reporting API and Investigate. This is a great one for EMEA and we are looking into getting this translated for Spain.
Tags : 
    
Cisco Umbrella EMEA
Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Aberdeen details how best-in-class organizations equip and manage their mobile workforce. You can also determine the steps your organization needs to take in order to maximize productivity for your road warriors.
Tags : 
mobility, wireless, remote workers, road warrior, global roaming connectivity, mobile device, cellular data cards, vpn, motorola, motorola good
    
Motorola
Published By: Plantronics     Published Date: Oct 18, 2013
Wireless technology surrounds us — in the workplace, at home, and many places in between. Mobile phones, WiFi networks, wireless computer accessories, and cordless phones all use radio transmissions for wireless communication. Even devices not used for communication, such as microwave ovens and lighting systems, emit radio frequency energy that can impact wireless devices. In this crowded radio environment, two technologies have emerged as the standard for wireless voice communication in UC and enterprise applications.
Tags : 
plantronics, audio device technology, wireless technology, digital telecommunications, wireless headset success, influence deployment, analogue modulation, business conversations, dect, dect architecture, wireless technologies, bluetooth headsets, interference avoidance, roaming range, radio spectrum, channel sharing, density effects, wideband operation, wireless, telecom
    
Plantronics
Published By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : 
aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing, mobile device access management, network management, wlan policy, network access layer, wireless mobility, iphone, smart phones, wlan, layer 2 roaming, vpn, byod
    
Aerohive
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : 
ibm, ibm bigfix, risk management, data security, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : 
cyberattack, ibm, security, access protection, business technology
    
IBM
Published By: Basho     Published Date: Apr 13, 2015
Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : 
riak, basho, telecommunications service provider, license fees, scalability, availability, data usage, big data, service operations system, networking, security, it management, wireless, data management
    
Basho
Published By: Ruckus Wireless     Published Date: Oct 16, 2008
This free white paper clearly explains how to optimize existing networks for Voice Over Wi-Fi (VoFi). Learn how to fight both known and hidden sources of RF voice interference; how to prioritize traffic flows, so voice always comes first; how properly planning your WLAN can dramatically improve handset battery life; how to arrange for roaming without annoying dropouts; and more. Download your free copy now.
Tags : 
ruckus, access points, wifi, wi-fi, wlan, aps, networking, wireless, 802.11n, 802.11
    
Ruckus Wireless
Published By: SpectorSoft     Published Date: Apr 22, 2014
Remote employees have more opportunity for distraction, lack of training, and inability to be refocused on task than their in-office counterparts, so companies need to get serious about ways to gain visibility into the activities of their remote employees to gauge productivity
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification, ssid, authentication, virtual local area network, vlan, switches, wids, wips, wireless security, wlan security, trapeze networks, cisco, aruba
    
Trapeze Networks
Previous   1 2    Next    
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com