Standards  >   Security Standards  >  

Wi-Fi Protected Access

RSS Feed    Add to Google    Add to My Yahoo!
Wi-Fi Protected Access White Papers (View All Report Types)
 
Smart Mobile™: Next Generation WLAN Architecture for High-Performance Networks
sponsored by Trapeze Networks
WHITE PAPER: This white paper details the different approaches to wireless LAN (WLAN) architectures, planning for applications such as VoWLAN, preparing for 802.11n and recommending strategies for future wireless deployments.
Posted: 11 Jul 2007 | Published: 01 Jul 2007

Trapeze Networks

IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER: In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013

IBM

Safeguarding Business in a Time of Expanding and Evolving Cyber Threats
sponsored by Verizon
WHITE PAPER: This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions
sponsored by netForensics
WHITE PAPER: This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

netForensics

IBM WebSphere MQ File Transfer Edition
sponsored by IBM
WHITE PAPER: This solution brief describes how you can lower business risk and increase productivity with trusted and secured file transfers.
Posted: 07 Jul 2011 | Published: 10 Dec 2010

IBM

Strategy Guide to Risk Mitigation for Midsize Businesses
sponsored by HP & Intel®
WHITE PAPER: This strategy guide offers concrete risk mitigation techniques specifically designed for midsize organizations. Learn how to proactively manage physical and virtual systems and see the early signs of infrastructure trouble to avoid outages.
Posted: 29 Jun 2010 | Published: 29 Jun 2010

HP & Intel®

PGP Encryption Platform - Delivering cost-effective, comprehensive encryption for enterprise data protection
sponsored by PGP Corporation
WHITE PAPER: The PGP Encryption Platform reduces the complexities of protecting business data by enabling organizations to deploy and manage multiple encryption applications cost-effectively. The PGP Encryption Platform makes installing additional systems unnecessary when organizational needs for encryption expand.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

Reinventing Branch Office Security: Configuration-less UTM protection for small offices
sponsored by Astaro
WHITE PAPER: When it comes to IT security, almost all businesses using IP networks to transmit data will know that they have to protect themselves, and they will have systems in place to keep their data secure. However, this is often focused at the head office. For workers that are not at the central office, the question of security is a harder one to answer.
Posted: 27 Sep 2010 | Published: 15 Jul 2010

Astaro

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

How Secure is Your Platform With the Evolving Threat Landscape?
sponsored by IBM
WHITE PAPER: This exclusive paper analyzes the business differentiators among the leading security vendors and examines how safe they can actually keep your data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement