IT Management  >   Systems Operations  >   Security  >   Network Security  >  

WLAN Security

RSS Feed    Add to Google    Add to My Yahoo!
WLAN SecurityIT Downloads (View All Report Types)
 
AirMagnet WiFi Analyzer
sponsored by AirMagnet
TRIAL SOFTWARE: AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise 802.11a/b/g/n networks. AirMagnet WiFi Analyzer solves end user WLAN issues while automatically detecting security threats and other wireless network vulnerabilities.
Posted: 08 Jun 2010 | Premiered: 15 Aug 2011

AirMagnet

IBM Tivoli Endpoint Manager: Unified Lifecycle Management for Distributed Endpoints
sponsored by IBM
SOFTWARE DEMO: Explore this menu interface that provides a high-level overview, product demonstration, expert interviews, and resource links for a top vendor's endpoint manager solution. View now to see what unified endpoint management can deliver to your organization.
Posted: 20 Mar 2014 | Premiered: 20 Mar 2014

IBM

MobilEcho Trial Download
sponsored by Acronis
PRODUCT DEMO: This software demo will help you find out if Acronis mobileEcho is right for your mobile needs.
Posted: 16 Oct 2013 | Premiered: 16 Oct 2013

Acronis

Evaluate: IBM Endpoint Manager
sponsored by IBM
TRIAL SOFTWARE: This 30-day trial offers an endpoint manager that provides a single-agent, single-console approach to lifecycle management, security, and endpoint protection.
Posted: 21 Mar 2014 | Premiered: 21 Mar 2014

IBM

IBM Tivoli Live Monitoring Services Demo
sponsored by IBM
PRODUCT DEMO: Watch this demo to see how Tivoli Live can help you manage the health and performance of your data center's resources—including operating systems, virtualized servers, middleware and applications.
Posted: 20 May 2011 | Premiered: 20 May 2011

IBM

Application Discovery Tool
sponsored by Sophos, Inc.
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos, Inc.

Sophos Computer Security Scan
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos, Inc.

Symantec Protection Suite Challenge
sponsored by Symantec Corporation
SOFTWARE DEMO: Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009

Symantec Corporation

EtherScope Series II Network Assistant
sponsored by Fluke Networks
PRODUCT DEMO: EtherScope Series II Network Assistant helps first responders solve network problems on both sides of the access point - fast. This virtual demo will show you an ideal portable platform for rogue hunting and troubleshooting.
Posted: 01 Jun 2007 | Premiered: 01 Jan 2006

Fluke Networks

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement