IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 
Definition continues below.
Wireless Security White Papers (View All Report Types)
1 - 25 of 136 Matches Previous Page  |  Next Page
Improve Organizational Security with End-to-End Mobile Protection
sponsored by MXN Corporation
WHITE PAPER: In this brief white paper, you will learn about a mobile operating system with built in end-to-end security that will transform your enterprise mobility. Learn how to prevent unauthorized access to your networks without the need for Network Access Control (NAC) software.
Posted: 16 Nov 2015 | Published: 31 Jul 2013

MXN Corporation

The 2015 State of the Market in Wireless Security
sponsored by Fortinet, Inc.
WHITE PAPER: This global survey studies the state of the market for wireless LAN security. Address the holes in your WLAN security strategy, as well as see how cloud-managed Wi-Fi stacks up to traditional security methods.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Fortinet, Inc.

A Guide to Delivering Secure Wireless LAN
sponsored by Fortinet, Inc.
WHITE PAPER: In this guide, you will learn how to deploy comprehensive wireless security to your LAN—regardless the size of your business, your network topology, and cloud-based Wi-Fi management. Discover a WLAN portfolio that will address the Wi-Fi needs of SMBs as well as large-scale enterprises.
Posted: 03 Nov 2015 | Published: 02 Nov 2015

Fortinet, Inc.

Embracing Strategic Mobility for Small to Midsize Businesses
sponsored by Cisco
WHITE PAPER: In this white paper, Nolan Greene, research analyst with IDC's Network Infrastructure group, breaks down the concerns with regards to adopting mobility in small to midsize businesses. Learn how to best adapt your SMB to current mobile trends.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Wireless Network Security - Next Gen Firewalls
sponsored by Dell Software
WHITE PAPER: In this white paper, examine the infrastructure of one next-gen wireless firewall.
Posted: 01 Jun 2015 | Published: 18 Dec 2014

Dell Software

Securing your small business
sponsored by Dell, Inc.
WHITE PAPER: Learn how to purchase, configure and maintain point solutions that deliver the comprehensive protection your business needs. Read this eBook to hear about the modern advances in Dell security technology, and how they achieve enterprise-level protection within your small business budget.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell, Inc.

Why Wi-Fi Quality is so Important to the End-user
sponsored by Extreme Networks
WHITE PAPER: This exclusive whitepaper offers an in-depth look at Wi-Fi's history, and where it's headed in the future. Read on to learn more.
Posted: 28 Oct 2014 | Published: 28 Oct 2014

Extreme Networks

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Thawte in Education
sponsored by Thawte Inc.
WHITE PAPER: Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track Security

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

Symantec Website Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

Symantec Corporation

Simplify Network Management with New Secure and Scable Wireless Solutions
sponsored by Dell, Inc.
WHITE PAPER: Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.
Posted: 05 Aug 2013 | Published: 31 Jul 2013

Dell, Inc.

Wireless Solutions for Tablets and Smartphones
sponsored by Xirrus
WHITE PAPER: As the popularity of mobility grows, so do the challenges for IT. This resource explores how you can transform mobility from an IT challenge into a business opportunity by designing and managing a better wireless network.
Posted: 02 Aug 2013 | Published: 31 Dec 2011


Application Control at the Wireless Edge
sponsored by Xirrus
WHITE PAPER: With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.
Posted: 31 Jul 2013 | Published: 31 Dec 2012


Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Network Rightsizing Blueprint for the Next-Generation Workplace
sponsored by Aruba Networks
WHITE PAPER: This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.
Posted: 17 Jul 2013 | Published: 20 May 2013

Aruba Networks

Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER: Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Accellion, Inc.

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013


Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013

Citrix Systems, Inc.

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by Dell, Inc.
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

Dell, Inc.

User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013


McAfee Endpoint Protection Suite
sponsored by Intel Security
WHITE PAPER: This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.
Posted: 31 May 2013 | Published: 31 May 2013

Intel Security
1 - 25 of 136 Matches Previous Page    1 2 3 4    Next Page
WIRELESS SECURITY DEFINITION (continued): …  as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.According to a ZDNet UK article, attackers are exploiting a problem with some implementations of the object exchange (OBEX) protocol, which is commonly used to exchange information between wireless devices. An attacker can synchronize … 
Wireless Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement