Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "AirTight Networks"

Total Search Results : 5

The 'New' Enterprise WLAN Vendor

July 29, 2013 01:20 PM
AirTight Networks is grabbing attention as a new player in the WLAN market but it's no wireless newbie.

What Do We Do Now That All Wireless Security Protocols Are Busted?

July 26, 2010 09:30 AM
Just like that, the last bastion of wireless security went in the toilet. By now, anyone in the wireless game has likely heard about the Hole 196 attack that renders WPA2--depending on your tolerance for the parameters of the exploit--useless. Sure, the Advanced Encryption Standard (AES) used in WPA2 is still sound enough to have the confidence of the US government for its beefiest encryption needs, but WPA2 itself now has a black eye. A big one.

AirTight Adds Partners To Deliver Wireless Security

May 23, 2007 08:41 PM
Provider of wireless intrusion detection and prevention systems broadens its partner program to extend reach of wireless security products.

Wi-Fi Security Vendors Sound Desperate

September 08, 2006 04:00 AM
A recent Wi-Fi exploit prompted two vendors to quickly claim their products protect against such vulnerabilities. In truth, the security market is rife with vendors trading on fear and

WLAN Security Market Heats Up With Product Launches

November 30, 2004 06:30 PM
Highwall Technologies and AirTight Networks both release tools for securing Wi-Fi networks.

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers