Standards  >   Security Standards  >  

Wireless Encryption Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Encryption Protocol White Papers (View All Report Types)
 
WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

Toolkits, Apps, & Services Used Today to Launch DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: This paper delves down into what DDoS attacks are and how they work. Learn about the different types of DDoS attacks and the tools, apps, and services attackers take advantage of to get past your security measures and infect your network.
Posted: 24 May 2017 | Published: 24 May 2017

A10 Networks

Transitioning from Managed Services to Managed Security
sponsored by AlienVault
WHITE PAPER: Transitioning from MSP to MSSP is a well-trodden path and success is due to people, processes, and tech in equal proportions. In this white paper, learn about the current state of the MSSP market and best practices for new MSSPs.
Posted: 25 Apr 2017 | Published: 19 Dec 2016

AlienVault

Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

ITAD to Strengthen Data Protection
sponsored by Iron Mountain
WHITE PAPER: IT Asset Disposition is quickly becoming a one stop shop for mitigating end-of-lifecycle risks and data protection compliance. Learn the importance of ITAD in protecting data and meeting compliance requirements.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Iron Mountain

Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Discover recommendations towards a multilayered approach designed to reduce exposure to ransomware attacks, as well as to recover encrypted data more quickly and effectively. Access now for the 4 key steps to kidnap-proof your data.
Posted: 17 May 2017 | Published: 17 May 2017

Citrix

Identity Management: The Key to Stopping Breaches
sponsored by SailPoint Technologies
WHITE PAPER: With 43% of breaches caused by insiders, organizations need to find a better way to handle identity. Discover how to not only secure identities, but turn it into a business enabler, give your organization the power to build a modern security infrastructure that is centered around your users and their access to your data, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SailPoint Technologies

How to Deliver Comprehensive, End-to-End Mobile Security
sponsored by Citrix
WHITE PAPER: Learn how EMM could be your key to managing personal devices in a corporate setting at scale – without impacting user experience, and without inflating costs or introducing security risks.
Posted: 17 May 2017 | Published: 17 May 2017

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement