Meraki

Displaying 1-7 of 7 results

  • White Papers // Nov 2011

    PCI V2.0 Compliance for Wireless LAN

    The Payment Card Industry Data Security Standard is a worldwide information security standard assembled by the Payment Card Industry Security Standards Council (PCI SSC). The standard was created to help organizations that process card payments prevent credit card fraud through enhanced security measures. The standard applies to all organizations which...

    Provided By Meraki

  • White Papers // Aug 2009

    Cloud + Wireless LAN = Easier + Affordable

    This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for higher education institutions vs the traditional wireless LAN architecture. Cloud-based IT has proven itself easier to setup and maintain, more affordable, and more flexible than traditional client-server solutions. As a result "The Cloud" has...

    Provided By Meraki

  • White Papers // Mar 2009

    Meraki White Paper: Wireless LAN Security

    While security is important for all networks, wireless LANs deserve special consideration since they are subject to an increased level of risk. First, since wireless extends beyond the walls of an organization, physical security is less effective than with wired networks. Second, wireless network abuse has become more common, with...

    Provided By Meraki

  • White Papers // Mar 2009

    Meraki White Paper: 802.11n Technology

    The 802.11n draft 2.0 standard offers several technical benefits over previous technology generations, which result in improved throughput to 802.11n-based clients, as well as greater reliability for legacy 802.11a/b/g clients. 802.11n is much more than just a new radio for 802.11. In addition to providing higher bit rates (as was...

    Provided By Meraki

  • White Papers // Mar 2009

    Meraki Hosted Architecture

    As wireless devices become more ubiquitous, organizations need to provide faster, more comprehensive, and more robust wireless coverage throughout their facilities. However, constructing these wireless networks has traditionally been complex, time-consuming, and costly. In the same way that hosted software applications, or Software-as-a-Service (SaaS), offer significant advantages over the client-server...

    Provided By Meraki

  • White Papers // Mar 2009

    Wireless Guest Access at the Office

    Internet connectivity has made it to the list of mandatory guest amenities in offices, hotels, and other public spaces. With the growth in the number, importance, and pervasiveness of Internet applications - from hosted services like SalesForce.com, to FaceBook applications that run on iPhones - visitors no longer view Internet...

    Provided By Meraki

  • White Papers // Feb 2009

    Wireless User Authentication

    Authentication enables administrators to identify the users connecting to a wireless network. Authentication can be at the device level (blocking or allowing a MAC address) or at the user level (validating a username and password). Compared to user authentication, device authentication is trivial (and insecure, since MAC addresses can be...

    Provided By Meraki

  • White Papers // Mar 2009

    Meraki White Paper: Wireless LAN Security

    While security is important for all networks, wireless LANs deserve special consideration since they are subject to an increased level of risk. First, since wireless extends beyond the walls of an organization, physical security is less effective than with wired networks. Second, wireless network abuse has become more common, with...

    Provided By Meraki

  • White Papers // Mar 2009

    Meraki White Paper: 802.11n Technology

    The 802.11n draft 2.0 standard offers several technical benefits over previous technology generations, which result in improved throughput to 802.11n-based clients, as well as greater reliability for legacy 802.11a/b/g clients. 802.11n is much more than just a new radio for 802.11. In addition to providing higher bit rates (as was...

    Provided By Meraki

  • White Papers // Feb 2009

    Wireless User Authentication

    Authentication enables administrators to identify the users connecting to a wireless network. Authentication can be at the device level (blocking or allowing a MAC address) or at the user level (validating a username and password). Compared to user authentication, device authentication is trivial (and insecure, since MAC addresses can be...

    Provided By Meraki

  • White Papers // Mar 2009

    Meraki Hosted Architecture

    As wireless devices become more ubiquitous, organizations need to provide faster, more comprehensive, and more robust wireless coverage throughout their facilities. However, constructing these wireless networks has traditionally been complex, time-consuming, and costly. In the same way that hosted software applications, or Software-as-a-Service (SaaS), offer significant advantages over the client-server...

    Provided By Meraki

  • White Papers // Mar 2009

    Wireless Guest Access at the Office

    Internet connectivity has made it to the list of mandatory guest amenities in offices, hotels, and other public spaces. With the growth in the number, importance, and pervasiveness of Internet applications - from hosted services like SalesForce.com, to FaceBook applications that run on iPhones - visitors no longer view Internet...

    Provided By Meraki

  • White Papers // Aug 2009

    Cloud + Wireless LAN = Easier + Affordable

    This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for higher education institutions vs the traditional wireless LAN architecture. Cloud-based IT has proven itself easier to setup and maintain, more affordable, and more flexible than traditional client-server solutions. As a result "The Cloud" has...

    Provided By Meraki

  • White Papers // Nov 2011

    PCI V2.0 Compliance for Wireless LAN

    The Payment Card Industry Data Security Standard is a worldwide information security standard assembled by the Payment Card Industry Security Standards Council (PCI SSC). The standard was created to help organizations that process card payments prevent credit card fraud through enhanced security measures. The standard applies to all organizations which...

    Provided By Meraki