Publications

In addition to extensive consulting and training, some of WaveGard’s best talent also spend time contributing to technical books, articles, and forums. These sections are periodically updated with new materials and links so check back regularly.

One unmanaged access point at a remote office can make a huge security mess. The answer? Extend the corporate wireless LAN.

Link to Publication

Building Better Branch Office Wireless
Download PDF

The promise and reality of IEEE 802.11 wireless networks for remote offices. Sidebar on page 40.

Remote Wi-Fi, Do It Right
Download PDF

Control how Apple iOS devices access the Internet via established gateways regardless of their physical location

Link to Publication

Using Apple’s Global Proxy to Boost Mobile Security
Download PDF

Employees want their own phones, and managers want them using apps for productivity. Your problem: Secure all this.

Link to Publication

Four Ways to Lower Mobility Risk
Download PDF

The tension between personal device ownership and corporate data protection

Link to Publication

App Freedom vs. Corporate Security

When it comes to managing smartphones and other portable gear, since 2008, IT groups have gotten away with being on cruise control. The free ride is going to end, and sooner than you may think.

Link to Publication

MDM Strategies to Meet Mobility Demand

Mobility was the hot topic at Interop Vegas 2011

Link to Publication

Mobile Security Gets The Spotlight At Interop

As one customer fondled the iPad, I heard him say to his wife, "I don't know why we even need a desktop computer anymore."

Link to Publication

Can Consumer Tech And Security Co-Exist?

Even with a well thought out security program and a clear understanding of HIPAA and PCI mandates, some controls get overlooked.

Link to Publication

Healthcare Compliance Gotchas

As network boundaries blur and longstanding design paradigms fall by the wayside, how do we assign accountability for virtualization security?

Link to Publication

Whose Job Is Virtualization Security?

Deciding how to protect your assets means focusing in on what attackers are doing—and following our nine-step program to stop them.

Link to Publication

Perimeterization 2.0: 9 Critical Building Blocks

Smartphones are a compelling business opportunity or a potentially disastrous data leakage risk, depending on your perspective

Link to Publication

Rolling Review: Smartphone Security

InformationWeek Report by WaveGard about maintaining security while leveraging cloud, mobility.

Link to Publication

Cloud, Mobility Demand Better IAM
Download PDF