Publications

In addition to extensive consulting and training, some of WaveGard’s best talent also spend time contributing to technical books, articles, and forums. These sections are periodically updated with new materials and links so check back regularly.

The Certified Wireless Security Professional (CWSP) Study Guide is a one stop shop for information related to 802.11 wireless security

Link to Publication

McGraw-Hill Book: Certified Wireless Security Professional Study Guide (CWSP)

Summarizes the core concepts of five Cisco security exams to aid IT professionals seeking the Cisco Certified Security Professional (CCSP) certification

Link to Publication

Cisco Press Book: CCSP Flash Cards and Exam Practice Pack

Performance, features, reliability and costs of UTM products

Link to Publication

IT Pro Ranking: Unified Threat Management
Download PDF

The traditional identity & access is totally out of date for companies dealing with mobile devices, cloud computing & BYOD

Link to Publication

The Fuzzy Future of Identity Management

One unmanaged access point at a remote office can make a huge security mess. The answer? Extend the corporate wireless LAN.

Link to Publication

Building Better Branch Office Wireless
Download PDF

The promise and reality of IEEE 802.11 wireless networks for remote offices. Sidebar on page 40.

Remote Wi-Fi, Do It Right
Download PDF

Smartphones are a compelling business opportunity or a potentially disastrous data leakage risk, depending on your perspective

Link to Publication

Rolling Review: Smartphone Security

In this report we’ll help IT come to grips with the daunting task of addressing the myriad controls involved with complying with two or more regulations.

Link to Publication

Affordable Conformance With Multiple Regulations
Download PDF

Discover if, and when, evolving wireless networks might replace wired connectivity for most employees.

Link to Publication

Why 802.11n Will Revolutionize Connectivity

When it comes to managing smartphones and other portable gear, since 2008, IT groups have gotten away with being on cruise control. The free ride is going to end, and sooner than you may think.

Link to Publication

MDM Strategies to Meet Mobility Demand

Even with a well thought out security program and a clear understanding of HIPAA and PCI mandates, some controls get overlooked.

Link to Publication

Healthcare Compliance Gotchas

Our take on what the coming months hold for IT teams charged with mobilizing, and improving the wireless user experience, for employees and guests

Link to Publication

Wireless Nation 2011
Download PDF

Deciding how to protect your assets means focusing in on what attackers are doing—and following our nine-step program to stop them.

Link to Publication

Perimeterization 2.0: 9 Critical Building Blocks

Employees want their own phones, and managers want them using apps for productivity. Your problem: Secure all this.

Link to Publication

Four Ways to Lower Mobility Risk
Download PDF

As one customer fondled the iPad, I heard him say to his wife, "I don't know why we even need a desktop computer anymore."

Link to Publication

Can Consumer Tech And Security Co-Exist?

Mobility was the hot topic at Interop Vegas 2011

Link to Publication

Mobile Security Gets The Spotlight At Interop

A comprehensive research report on the issues to consider with Mobile Device Management

Link to Publication

Mobile Device Management on the Edge
Download PDF

The tension between personal device ownership and corporate data protection

Link to Publication

App Freedom vs. Corporate Security

As network boundaries blur and longstanding design paradigms fall by the wayside, how do we assign accountability for virtualization security?

Link to Publication

Whose Job Is Virtualization Security?

A shift to flatter networks brings a familiar security conundrum: how to balance performance against risk.

Link to Publication

Securing Flat Networks
Download PDF

Control how Apple iOS devices access the Internet via established gateways regardless of their physical location

Link to Publication

Using Apple’s Global Proxy to Boost Mobile Security
Download PDF

InformationWeek Report by WaveGard about maintaining security while leveraging cloud, mobility.

Link to Publication

Cloud, Mobility Demand Better IAM
Download PDF