IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 
Definition continues below.
Wireless SecurityMultimedia (View All Report Types)
19 Matches
Decode MDM Solution Features: Must haves for security management
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Question #3 featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space if their products support mobile security management features
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

MDM Solutions for Dummies: Product Integration
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Question two featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space: Can your product integrate with enterprise infrastructure elements? Find out what these vendors have to say by accessing their answers to this question now.
Posted: 29 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Mobile Device Management IT Decision Center: Operating Systems
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: SearchSecurity.com’s expert resource asks: Does your product support any OEM extensions (e.g., Samsung SAFE)? Do you require or offer agent applications installed on managed devices? Find out what top vendors have to say by accessing their answers to these questions now.
Posted: 29 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Reducing Security Complexity
sponsored by Optus Business
VIDEO: In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.
Posted: 04 Sep 2013 | Premiered: 27 Aug 2013

Optus Business

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Mobility and Tablet Trends in Healthcare IT
sponsored by Intel
WEBCAST: Caregivers want the devices they work with to function like the devices in their pockets. And this is steadily becoming a reality. View today’s brief video and join Motion Computing’s Vice President of Marketing, Mike Stinson as he talks about the latest health IT trends in tablets and other mobile devices.
Posted: 14 Jun 2012 | Premiered: Jun 14, 2012

Intel

Mobile Remote access services from ATT Video
sponsored by AT&T Corp
WEBCAST: Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.
Posted: 13 Oct 2011 | Premiered: Oct 13, 2011

AT&T Corp

Introducing BlackBerry Balance™ Technology
sponsored by BlackBerry
WEBCAST: Learn more about how BlackBerry® Enterprise Server or BlackBerry® Enterprise Server Express, along with specific IT policies and features built into the device software, help keep personal information separate and business information highly secure.
Posted: 16 Sep 2011 | Premiered: Sep 16, 2011

BlackBerry

AirMagnet WiFi Analyzer
sponsored by AirMagnet
TRIAL SOFTWARE: AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise 802.11a/b/g/n networks. AirMagnet WiFi Analyzer solves end user WLAN issues while automatically detecting security threats and other wireless network vulnerabilities.
Posted: 08 Jun 2010 | Premiered: 15 Aug 2011

AirMagnet

Taking a Strategic Approach to Enterprise Mobility
sponsored by Sybase, an SAP company
WEBCAST: This webcast discusses everything you need to know about adopting a Mobile Enterprise Application Platform, such as the true value of adopting a Mobile Enterprise Application Platform, the trends you need to be tracking, and how to take a strategic approach to deployment.
Posted: 03 Sep 2009 | Premiered: Sep 3, 2009

Sybase, an SAP company

US Food Service - Streamline project includes Afaria
sponsored by Sybase, an SAP company
VIDEO: Watch this video to learn how US Food Service, the second largest food service provider, implemented Afaria from Sybase to streamline order entry and information management between their mobile sales force, distribution centers and the corporate office.
Posted: 11 May 2009 | Premiered: 11 May 2009

Sybase, an SAP company

Medical Office Increases Productivity with New Communications System
sponsored by Cisco Systems, Inc.
VIDEOCAST: This video case study showcases a physician's practice implementing a phone system and reducing time required for appointment reminder calls from four hours to 15 minutes per day and achieving efficient contact with insurance companies.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Housing Association Puts Staff into the Community, Increasing Personal Contact
sponsored by Cisco Systems, Inc.
VIDEOCAST: This case study showcases how The Community Gateway Association (CGA) became the first housing association in England to be set up as a 'community gateway'.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Trade Show Management Firm Increases Responsiveness
sponsored by Cisco Systems, Inc.
VIDEOCAST: Read how Everything Tradeshows utilized Cisco Smart Business Communications System to enable faster response to customer message, increase outbound telemarketing activity and reduce costs.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Eco-Friendly Materials Importer Uses Technology to Grow
sponsored by Cisco Systems, Inc.
VIDEOCAST: In this video case study watch how amaZulu, an eco-friendly company that imports natural architectural materials from villages all around the world, uses Cisco technology to improve customer service and productivity.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Automotive Repair Shop Increases Productivity and Improves Customer Service
sponsored by Cisco Systems, Inc.
VIDEOCAST: In this case study, read how Seyfer Automotive implemented a new communications system freed up 30 minutes daily for the service manager, resulting in one to two additional daily repair jobs worth US$200 to $US400.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
sponsored by Microsoft
PODCAST: Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 03 Nov 2006 | Premiered: Oct 27, 2006, 09:00 EDT (13:00 GMT)

Microsoft

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

Microsoft
19 Matches
 
WIRELESS SECURITY DEFINITION (continued): …  as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.According to a ZDNet UK article, attackers are exploiting a problem with some implementations of the object exchange (OBEX) protocol, which is commonly used to exchange information between wireless devices. An attacker can synchronize … 
Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement