The SecurEdge Blog

Helping businesses provide secure WiFi by sharing insights into WiFi design, network security, installation, and troubleshooting. You've got questions, we have answers.

5 Lesser-Known Benefits Captive Portals Offer Your Guest Wi-Fi Network
Security

5 Lesser-Known Benefits Captive Portals Offer Your Guest Wi-Fi Network

Castles have moats. Subways have turnstiles. Even houses have doors. When you have something people want, you need to control who has access to it. For many businesses and organizations offering guest wireless access, having a captive portal can play a major role in your overall mobility strategy, not only for network security reasons but for many other lesser-known benefits as well.

Read More
4 Things Your Next-Generation Firewall Should Do For You
Security

4 Things Your Next-Generation Firewall Should Do For You

In the olden days, the line between network security and business contingency fell on two basic choices — either block everything in the interest of network security, or enable everything in the interest of your business; and these choices left little room for compromise. Nowadays, the options have grown considerably, however, these new choices have also brought with them an array of more sophisticated, advanced threats that evade even traditional security mechanisms.

Read More
5 BYOD Policy Tips Every School Needs to Know to Stay Safe
Security

5 BYOD Policy Tips Every School Needs to Know to Stay Safe

BYOD has been a “buzzword” and current trend for quite some time now—and at this point it’s safe to say that bring your own device isn’t going anywhere. The popularity of BYOD is a direct result from the explosion of mobile devices that we’re still experiencing today and schools in particular have to be ready to support a BYOD policy, whether they want to or not.

Read More
Wireless Network Design Kit
How to Maximize Your School Wireless Network with Secure Mobility
Security

How to Maximize Your School Wireless Network with Secure Mobility

On June 29th, 2007 the world as we knew it had changed forever. This was day that the iPhone was first introduced and while some may argue this point, I believe that this day also introduced the world to what we now call “Secure Mobility”. Since the explosion of mobile devices and apps a lot has changed, especially when it comes to how we think about designing and building networks.

Read More
How Campus Wifi Is Shaping The College Experience [Infographic]
Security

How Campus Wifi Is Shaping The College Experience [Infographic]

When I look back at my college years I immediately think about how great of an experience I had. However, now, because of the explosion of mobile technology and better campus wifi performance, I’ve realized that higher education has become a vastly different environment and experience than the one I remember. The kicker is that its only been 7 years.

Read More
Top 3 Ways to Securely Deploy Technology in the Classroom
Security

Top 3 Ways to Securely Deploy Technology in the Classroom

One of the most important topics we speak to a lot of schools about almost every day, is how to safely implement mobile technology in the classroom. Most schools want to allow their students the world of possibility mobile classroom technology solutions can bring yet the fear of security breaches, misused tablet use (social media & gaming) and network overload leave them hesitant to jump into the world of mobility.

Read More
Bringing BYOD to a Hospital Wireless Network Securely
Security

Bringing BYOD to a Hospital Wireless Network Securely

Mobile devices continue to grow in popularity and as the competition increases for the “next big thing” in smartphones and tablets, many of the associated costs users experience could continue to decline. However, in the business enterprise and specifically the healthcare industry, the cool BYOD trend can often meet an icy reception from management.

Read More
Making Classroom Technology Safe with Mobile Device Management
Security

Making Classroom Technology Safe with Mobile Device Management

Schools today want technology for their students. Classroom technology costs money. Thus, schools require funding from the government to purchase costly technology.  The government has policies in place that do not allow schools to receive funding if those schools don’t properly show their classrooms are CIPA compliant.  Simple as that.

Read More
Security Protocols Essential for a Successful BYOD Solution
Security

Security Protocols Essential for a Successful BYOD Solution

Once your corporation or school has decided to allow employees or students to bring their own devices onto the network and a proper policy has been formulated it is essential to think of the security measures needed to take place within your wireless infrastructure before implementing a Bring Your Own Device (BYOD) solution. 

Read More
8 Ways to Protect your Network with a Next Generation Firewall
Security

8 Ways to Protect your Network with a Next Generation Firewall

So, you are planning your next adventure to a far away land. You’re scanning through your tablet’s browser looking for cheap flights to your desired destination. While downloading the best mobile travel applications, you are also texting your travel companion with thumbs spinning so fast, you start kicking up more dust than the jeep you will be driving in on that safari.

Read More
7 Keys to Planning a Secure BYOD Policy in Healthcare
Security

7 Keys to Planning a Secure BYOD Policy in Healthcare

Imagine for a moment that you are back in elementary school and have just been awarded the orange sash and badge, making you an official Safety Patrol Officer! White gloves and whistles may have stopped your peers from crossing the street but those adornments don’t do much in the way of halting to peer-to-peer file sharing on your hospital wireless network.

Read More
15 Features of Mobile Device Management in Healthcare
Security

15 Features of Mobile Device Management in Healthcare

Various studies and surveys have shown that the use of wireless devices continues to grow at exponential rates in the healthcare industry, which falls in line with the overall trend in society. Like the rest of the World, health care providers are not immune to the allure of the glowing tablet. There is no pill or injection that will slow the spreading trend like many of the diseases providers are trying to treat.

Read More
BYOD and HealthCare.gov: 5 Tips for Secure Access
Security

BYOD and HealthCare.gov: 5 Tips for Secure Access

If you have read or seen the national news lately, you may have noticed the rollout of President Obama’s Affordable Health Care Act website to be a bit of a cluster. On Monday, President Obama addressed the negative feedback by saying, “The website is too slow and people are getting stuck. And I think it's fair to say, nobody is more frustrated about that than I am. Nobody's madder than me about the web site not working as it should, which means, it's going to get fixed.”

Read More
11 Features to Look for in Your Next Generation Firewall
Security

11 Features to Look for in Your Next Generation Firewall

In our dealings with technology leaders at schools, universities and hospitals there are many different opinions as to how they would each go about solving an IT problem or challenge. Those who are successful at solving issues like BYOD, 1:1, web filtering or the simple lack of available bandwidth do have one thing in common: A need for updated infrastructure.

Read More
3 Key Features of a Palo Alto Firewall
Security

3 Key Features of a Palo Alto Firewall

Palo Alto is a city in the State of California. And, with the average number of wireless devices per person on the rise, wireless networks are starting to look like the streets of California during rush hour. That’s where the “other” Palo Alto comes into play.

Read More
Creating a BYOD Policy
Security

Creating a BYOD Policy

BYOD (Bring Your Own Device) isn’t just a fad, it’s here and its proliferation into almost every industry is accelerating. That’s why it is important to put BYOD policies into place as soon as possible. Forrester Research says the consumer-driven iPad is pouring into the enterprise at breakneck speeds with 81 percent of firms having tablet plans and 250 million tablets expected to be in employees’ hands by 2016.

Read More
6 Helpful Hints On Securing Your Hospital Wireless Network
Security

6 Helpful Hints On Securing Your Hospital Wireless Network

Healthcare technology is changing rapidly with new laws being implemented regarding Electronic Medical Records (EMRs). Medical providers want a quick, efficient, accurate and secure method of keeping and exchanging records with wifi-enabled devices such as iPads or other brands of tablets. Maybe you have been a little too relaxed about securing your hospital wireless network?

Read More