Email Alerts
-
Forgot your password? FIDO Alliance works on authentication alternatives
Password-based authentication is becoming more taxing for users, especially on mobile devices. The FIDO Alliance is developing alternatives. News
-
Networking blogs: Better BYOD policies, Aerohive updates HiveManager
In this networking blog roundup, learn why better BYOD policies are user-oriented, and find out what the HiveManager update means for WLAN security. Fast packet
-
BYOD networking guide: WLAN management and access policies
It'll take new WLAN management strategies and BYOD policies to tackle the challenges that arise when personal devices connect to the network en masse. Guide
-
Gigabit Wi-Fi security: Is the new 802.11ac standard worth an upgrade?
Will Gigabit Wi-Fi significantly alter network security, or will it mean business as usual? Expert Brad Casey discusses the new 802.11ac standard. Tip
-
The importance of WLAN testing: From planning to documentation
This chapter on WLAN testing covers WLAN test planning and documentation and crucial testing methods for performance, security and signal coverage. Book Chapter
-
Provisioning wireless LAN access for BYOD requires integrated tools
IT shops lacking resources to manually configure hundreds of personal devices can automate wireless LAN access provisioning for BYOD with the right tools. Expert Tip
-
How UPenn tackled wireless LAN access for 46,000 BYOD clients
To handle 46,000 clients and 20,000 concurrent connections, UPenn had to automate wireless LAN access provisioning, but that was only a first step. Expert tip
-
Need seamless Wi-Fi roaming? Research orgs find an answer with eduroam
With eduroam, universities enable Wi-Fi roaming between disparate campus networks without requiring manual login. Why can't enterprises do the same? News
-
Balancing wireless LAN troubleshooting strategies for BYOD
Security is only half the challenge when it comes to supporting a BYOD WLAN. The rest depends on WLAN troubleshooting to handle personal device drain. Feature
-
Four IT shops, four approaches to BYOD network security
With no single solution for BYOD network security, engineers are getting crafty at integrating varied technologies to handle the challenge. Feature
Network Management Strategies for the CIO