IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 
Definition continues below.
Wireless SecurityWhite Papers (View All Report Types)
101 - 125 of 142 Matches Previous Page  | Next Page
The CIO's Guide to Mobile Security
sponsored by BlackBerry
WHITE PAPER: Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Posted: 03 Mar 2009 | Published: 07 Apr 2010

BlackBerry

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Wireless Networking: Five Questions to Start With
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper answers five questions about wireless networking, allowing you and your employees to stay connected to your company's information resources virtually anytime, anywhere.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Getting the Most from Your Wireless Network
sponsored by WildPackets, Inc.
WHITE PAPER: Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee.
Posted: 26 Aug 2008 | Published: 26 Aug 2008

WildPackets, Inc.

Security for Wireless Networks: A Comparison among SSL, IPSec and Mobile VPNs
sponsored by NetMotion Wireless
WHITE PAPER: This paper outlines common threats and issues regarding wireless security in the context of typical uses of mobile devices over wireless networks and evaluates secure remote access solutions in comparison with NetMotion Mobility XE.
Posted: 27 Jun 2008 | Published: 01 Jun 2008

NetMotion Wireless

Enterprise Wireless LAN Security
sponsored by Motorola, Inc.
WHITE PAPER: This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.
Posted: 29 May 2008 | Published: 01 May 2008

Motorola, Inc.

Airspace Risk Assessment
sponsored by AirTight Networks, Inc.
WHITE PAPER: This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Myths about wireless security can be both dangerous and costly, this paper will revisit and debunk top ten wireless security myths.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

SSL VPN for Secure Wireless LAN Access
sponsored by F5 Networks
WHITE PAPER: For most deployment scenarios, an SSL VPN appliance can provide many of the features and benefits of a special purpose WLAN controller for wireless access, but at a much lower cost and with greater flexibility. This paper describes the key sell...
Posted: 28 Apr 2008 | Published: 01 Oct 2007

F5 Networks

Introduction to the IP Multimedia Subsystem (IMS): IMS Basic Concepts and Terminology
sponsored by F5 Networks
WHITE PAPER: IMS is a whole new way to deliver multimedia regardless of the device or the access medium. This paper will change the way you relate to an increasingly digital world.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

Wireless Site Survey Best Practices
sponsored by Fluke Networks
WHITE PAPER: This paper provides insight into best practices for executing wireless site surveys.
Posted: 24 Apr 2008 | Published: 01 Apr 2008

Fluke Networks

Increase Productivity and Reduce Security Risks for Teleworkers
sponsored by SonicWALL
WHITE PAPER: This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
Posted: 23 Jan 2008 | Published: 22 Jan 2008

SonicWALL

Managing Mobility: An IT Perspective
sponsored by Nokia
WHITE PAPER: Today's workforce is rapidly becoming mobile and businesses are looking at how to capitalize on the significant benefits of enterprise mobility. This white paper examines the issues surrounding the security, manageability and costof mobility.
Posted: 15 Oct 2007 | Published: 01 Jan 2006

Nokia

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Smart Mobile™: Next Generation WLAN Architecture for High-Performance Networks
sponsored by Trapeze Networks
WHITE PAPER: This white paper details the different approaches to wireless LAN (WLAN) architectures, planning for applications such as VoWLAN, preparing for 802.11n and recommending strategies for future wireless deployments.
Posted: 11 Jul 2007 | Published: 01 Jul 2007

Trapeze Networks

Data Center Physical Infrastructure for Enterprise Wireless LANs
sponsored by APC by Schneider Electric
WHITE PAPER: Understanding the unique Network-Critical Physical Infrastructure (NCPI) requirements of Wireless LAN (WLAN) equipment allows for a successful deployment. Discover how to plan for NCPI while deploying indoor WLANs, with emphasis on power and cooling.
Posted: 09 Jul 2007 | Published: 01 Feb 2005

APC by Schneider Electric

Beyond Corporate Walls: Motorola Enterprise Mesh Networks
sponsored by Motorola, Inc.
WHITE PAPER: Wireless mesh technology is flexible, secure and allows for easy control of user access. Read this paper to learn how mesh technology can help your enterprise cost effectively extend its wireless coverage without any extra cable or fiber.
Posted: 29 Jun 2007 | Published: 01 Mar 2007

Motorola, Inc.

The CIO's Guide to Mobile Security
sponsored by BlackBerry
WHITE PAPER: Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data.
Posted: 15 Jun 2007 | Published: 01 Oct 2006

BlackBerry

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications
sponsored by Sybase iAnywhere
WHITE PAPER: Mobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.
Posted: 06 Jun 2007 | Published: 01 Jun 2007

Sybase iAnywhere

Deploying a Wireless LAN
sponsored by BlackBerry
WHITE PAPER: Many factors must be considered when planning for a WLAN deployment. This paper provides a starting point for posing questions to WLAN equipment and service vendors.
Posted: 18 May 2007 | Published: 01 May 2007

BlackBerry

Managing the Mobile Enterprise: A Guide for Creative Effective Enterprise Wireless Strategies
sponsored by Palm, Inc.
WHITE PAPER: In this white paper, learn the five key requirements for choosing the right mobile solution provider, including delivering tangible ROI, flexible service and support and enterprise-class security.
Posted: 20 Apr 2007 | Published: 01 Apr 2007

Palm, Inc.

5-Step Plan for Securing Your Enterprise WLAN
sponsored by AirTight Networks, Inc.
WHITE PAPER: Read this white paper that details the five essential steps you must take to secure your enterprise WLAN.
Posted: 19 Mar 2007 | Published: 01 Nov 2006

AirTight Networks, Inc.
101 - 125 of 142 Matches Previous Page    3 4 5 6    Next Page
 
WIRELESS SECURITY DEFINITION (continued): …  as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.According to a ZDNet UK article, attackers are exploiting a problem with some implementations of the object exchange (OBEX) protocol, which is commonly used to exchange information between wireless devices. An attacker can synchronize … 
Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement