|
NEW!
Dedicated Distributed
Sensing
|
The Right Approach
to Wireless Intrusion Prevention
|
|
Motorola
|
|
Like most innovative technologies, using Wireless LANs
(WLANs) poses both opportunities and risks. The wireless explosion has given
momentum to a new generation of hackers who specialize in inventing and
deploying innovative methods of hijacking wireless communications, and in
using the wireless network to breach the wired infrastructure.
|
|
|
NEW!
Wireless LANs: Is My
Enterprise At Risk?
|
Motorola
|
|
The objective of this white paper is to provide an overall
understanding of the risks associated with wireless LANs. The white paper
also includes an overview of the inherent properties of wireless LANs and
what makes them different from wired networks. The paper concludes with a
list of recently published articles on real-life breaches and incidents
illustrating the need for proactive measures to mitigate wireless security
risks.
|
|
|
NEW!
PCI Wireless Compliance
Demystified
|
Best Practices for
Retail
|
|
Motorola
|
|
This white paper
discusses the new PCI Data Security Standard (DSS) wireless requirements and
provides an executive summary of Motorola’s Enterprise Wireless LAN solutions
designed to provide out-of-the-box PCI compliance, robust wireless security and
cost-effective compliance validation.
|
|
|
NEW!
Centralized WLAN
Troubleshooting
|
Maximizing Wireless
Network Availability
|
|
Motorola
|
|
This paper provides a
summary of some of the key wireless performance issues that affect enterprise
WLAN deployments. The Motorola AirDefense distributed WLAN monitoring system
provides a vendor agnostic, cost effective, centrally managed, WLAN
troubleshooting solution that can significantly improve the wireless network
availability for enterprises.
|
|
Note: Sponsor Spotlight
|
|
|
NEW!
802.11n
Demystified
|
Key consideration
for n-abling the Wireless Enterprise
|
|
Motorola
|
|
This white paper
examines the operation of current generation wireless LANs, explains key 802.11n
technology components along with their benefits, and explores 802.11n’s
potential for delivering a totally wireless enterprise.
|
|
|
NEW!
Wireless LAN
Security: What Hackers Know That You Don’t
|
Motorola
|
|
This white paper
describes the methods, skills, and tools that hackers use to exploit
vulnerabilities in 802.11 wireless LANs. A good understanding of hacker tools
and techniques and the vulnerabilities they exploit enables security managers to
take pro-active steps to properly secure their wireless networks and mitigate
security risks.
|
|
|
NEW!
802.11n:
Look Before You Leap
|
Key considerations
for moving to 802.11n
|
|
Motorola
|
|
With the introduction
of 802.11n, the field of wireless local area networks (WLANs) is undergoing a
paradigm shift as phenomenal as the beginning of WLANs themselves. The
extraordinary data rates that the final 802.11n standard will support solidify
the realization of an all-wireless enterprise network. Rich multimedia
applications will be seamlessly streamed to every point in a facility at better
performance than possible with legacy 802.11a/b/g technologies. In this paper,
we will provide guidance to help you choose the best implementation strategy for
your organization.
|
|
|
Update!
2008
Wireless LAN State-of-the-Market Report Series
|
NEW!
2008 WLAN State-of-the-Market Results Webcast
|
|
WLAN Application Trends
|
|
Enterprise Strategies for 802.11n
|
|
WLAN Deployment Trends: Networks, Devices, Security
|
|
Executive
Summary: Wi-Fi Attitudes Shift
|
|
Webtorials Editorial/Analyst Division
|
|
In August
2008, the Webtorials Editorial/Analyst Division surveyed the Webtorials
subscriber base for the fifth consecutive year concerning enterprise wireless
LAN (WLAN) deployment plans, attitudes and experiences. This report series
summarizes the findings, which were gathered from a Web-based response pool of
several hundred, geographically diverse Webtorials subscribers throughout the
world.
|
|
|
The Case for an
Untethered Enterprise
|
Motorola
|
|
Today, most
enterprises are running two separate networks – one wired, and one wireless.
Most enterprises have treated Wi-Fi as an ancillary tool, meant to complement,
but not replace, a company’s wired Ethernet network. However, several new
technological advancements and trends are encouraging IT administrators to
rethink their network strategies. In this respect, Wi-Fi has grown up a lot in
the past decade. The time has come for IT administrators to consider deploying
office networks that run entirely on Wi-Fi technology.
|
|
|
Enterprise Wireless LAN
Security
|
Motorola
|
|
This paper describes
the challenges today’s administrators face when planning data protection for
their wireless networks. Paramount in this discussion are the existing Motorola
solutions in place now to meet and exceed the data protection expectations of
enterprise-class administrators, and Motorola’s 802.11n support plan.
|
|
Note: Sponsor Spotlight
|
|
|
A Manager’s
Guide To Wireless Hotspots
|
How To Take Advantage Of Them While Protecting The Security Of Your
Corporate Network |
|
Motorola |
|
This paper discusses the security risks inherent in
public Wi-Fi Internet access and the best ways to mitigate these risks.
It also discusses the benefits of hosting a corporate hotspot of your
own.
|
|
|
A Guide to
Effectively Managing Enterprise Wi-Fi Networks
|
Motorola |
|
RF management is a daunting task, but with the right
tools and a holistic approach, it is easily manageable. Network
administrators can be assured of a secure, effectively-managed wireless
network by investing in a comprehensive RF Management Suite. The ability
to monitor, secure, and upgrade the wireless network from a single,
centralized console will save both time and money for any company with a
wireless LAN. |
|
|
Comprehensive
Management for Demanding Wireless Networks
|
Control Your Network |
|
Motorola |
|
Managing a wireless enterprise network can be complicated
- unless you have the right tools. Motorola’s network management tools
provide robust network planning, security, monitoring and analysis, and
device management. These components are greater than the sum of their
parts when used together to seamlessly provide complete wireless network
management. |
|
Note: Sponsor Spotlight
|
|
|
How to Achieve
PCI Compliance
|
Protecting Credit Card Data |
|
Motorola |
|
Any retailer that accepts, processes, or stores credit
card information must comply with the standards set by the Payment Card
Industry Security Standards Council, or risk a hefty penalty. The best
way to ensure standard compliance is to invest in technology that is PCI
capable. |
|
|
Building a
Unified Enterprise Mobility Strategy
|
Motorola |
|
This paper discusses the challenges of managing
multiple networks to access mobile data and outlines a step-by-step
approach to developing a unifi ed enterprise mobility strategy,
which enables a more cost-effective and effi cient delivery of
network connectivity to a larger mobile workforce. |
|