Standards  >   Security Standards  >  

Wired Equivalent Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Wired Equivalent Privacy White Papers (View All Report Types)
 
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Understanding and Overcoming Cloud Security Threats
sponsored by Peak10
WHITE PAPER: The cloud doesn't have to be a security concern. This white paper dives into common security threats to the cloud and best practices on how to deal with them.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Peak10

A CISO’s Guide to Mobile Threat Prevention
sponsored by SingTel
WHITE PAPER: Learn the five major threats to mobile security, how they can damage your enterprise, and what you can do to stop them.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

SingTel

Reinventing Data Protection for Digital Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Uncover the strategies your organization can use to overcome the data complexities of the modern reality of data. Learn the growing importance of data as an asset, as well as the need for new data protection and management strategies fit for purpose.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Hewlett-Packard Enterprise

Your Guide to Advanced Persistent Threat Protection
sponsored by Forcepoint
WHITE PAPER: In this guide find a detailed breakdown of how individual vendors fit within the advanced-persistent threat market and who the top players, trail blazers, specialists, and mature players are. Discover market segmentation and an in-depth breakdown of each organization in the field.
Posted: 16 Feb 2017 | Published: 16 Apr 2016

Forcepoint

How Data Privacy Laws Impact Cloud Adoption In The UK
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Simplify and Accelerate Identity Protection on The Cloud
sponsored by IBM
WHITE PAPER: Striking a balance between usability and security can be challenging as organizations tackle mobile, social, and cloud adoptions. Access this white paper to learn the benefits of using a cloud-based delivery model for IAM.
Posted: 10 Feb 2017 | Published: 30 Jun 2015

IBM

Expert Viewpoints on Access Management and Federation
sponsored by IBM
WHITE PAPER: Learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement