IT Management  >   Systems Operations  >   Security  >   Network Security  >  

WLAN Security

RSS Feed    Add to Google    Add to My Yahoo!
WLAN Security Reports
 
Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition, InfoSec pros will learn about enterprise mobile management, or EMM, the new approach to security in the BYOD age, which focuses on security data rather than devices.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

SearchSecurity.com

Hands-On Teams: Computrace Protects the Laptops of the Intelligrated Mobile Workforce
sponsored by Absolute Software
CASE STUDY: This case study reveals how Intelligrated found a solution that would allow them to track and secure laptops in the field, in order to avoid any potential laptop theft.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

Absolute Software

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

McAfee Endpoint Protection Suite
sponsored by McAfee, Inc.
WHITE PAPER: This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.
Posted: 31 May 2013 | Published: 31 May 2013

McAfee, Inc.

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Conquering Today's Bring-Your-Own-Device Challenges
sponsored by Aruba Networks
WHITE PAPER: It is vital to consider the effect BYOD will have on your network before allowing it in your enterprise. In this resource discover the new networking requirements of BYOD to help you embrace it for the better of your enterprise.
Posted: 15 Apr 2012 | Published: 23 Mar 2012

Aruba Networks

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Symantec Website Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

Symantec Corporation

Can Your Security Keep Up with 70,000 New Malware Strains a Day?
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This timely white paper takes a look at some of the year's top security trends as well as sound advice for managing the risk associated with the emerging threats brought about by the proliferation of consumer mobile devices within the enterprise.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

CenturyLink Technology Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement