Standards  >   Security Standards  >  

Wireless Encryption Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Encryption Protocol White Papers (View All Report Types)
 
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Cybersecurity: Shift from a Position of Acknowledgement to Leadership
sponsored by SingTel
WHITE PAPER: Learn how to effectively address and oversee decisions relating to cyber security using a top-down approach and establish a well-defined security posture for your organization.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

SingTel

Worldwide DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: Learn more about today's DDoS landscape, running trends, lessons learned from previous attacks, and what you can do to protect your company.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

Neustar

A Look at How Data Privacy Laws Impact Cloud Expansion in Germany
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gain a rare glance into the issues that arise when an organization hoping to implement cloud application services in Germany must navigate in order to remain compliant.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

Email-borne Malware Highlights Danger of Over-reliance on Sandboxes
sponsored by Mimecast North America
WHITE PAPER: Gain an in-depth understanding of a recent email malware attack and how both strategy and effectiveness of weaponized attachments have evolved recently. Learn how to both prevent these kinds of attacks from crippling your organization and uncover recommendations to keep yourself safe from the future trends of malware.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

How to Implement Practical Security Assessments
sponsored by ModoModo
WHITE PAPER: This white paper covers ways to gain perspective about your security based on developing a proper and balanced perspective in the rather oblique world of assessments.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ModoModo

Keep Business Data Secure, and Employees Productive
sponsored by SOTI Inc.
WHITE PAPER: The rate of mobile devices coming into the workplace is rapidly driving the need for secure enterprise mobility management. Learn how to make it easier than ever for your organization to support Android as a part of a BYOD or corporate owned personally enabled (COPE) device program.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SOTI Inc.

App Security: Shore up the Weaknesses in Your WAF
sponsored by tCell
WHITE PAPER: Delve into the shortcomings of web application firewalls (WAFs) and how to shore up your defenses. Uncover the top 5 requirements for an application immune system and how to protect your web applications and modernize your security policy to stand firm against today's threats landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

tCell
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement