IT Management  >   Systems Operations  >   Security  >   Network Security  >  

WLAN Security

RSS Feed    Add to Google    Add to My Yahoo!
WLAN Security Reports
 
Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

App-Centric Security — Meeting the Needs of the Modern Mobile Enterprise
sponsored by Blue Cedar
WHITE PAPER: IT security executives must constantly assess the best ways to secure mobile devices. Check out this white paper to learn about strategies to increase your mobile security posture.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Blue Cedar

SDN Can Help Unify Wired and Wireless Campus Networks
sponsored by Brocade
EGUIDE: In this expert e-guide, learn how SDN controllers can give your Wi-Fi and Ethernet switch-based campus networks the support they need for a successful unification.
Posted: 01 Feb 2017 | Published: 31 Jan 2017

Brocade

Wireless Security Protocols: The Difference Between WEP, WPA, WPA2
sponsored by Brocade
EGUIDE: In wireless security, passwords are only half the battle. Choosing the proper level of encryption is just as vital. In this expert e-guide, learn the differences between the three wireless encryption standards: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access (WPA).
Posted: 01 Feb 2017 | Published: 31 Jan 2017

Brocade

Expert Discussion: Mobile device security in health care
sponsored by Hewlett Packard Enterprise
EGUIDE: This E-Guide discusses some of the most significant trends and themes concerning mobile device security in health IT. Discover what it will take to deploy a stable, cost-efficient mobile security system in your hospital.
Posted: 12 Apr 2012 | Published: 12 Apr 2012

Hewlett Packard Enterprise

Top 10 Reasons Enterprises Prefer Juniper Wireless
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover the ten characteristics and features any WLAN solution should offer to support the transformational trends your business is making and meet the many challenges of today's enterprises.
Posted: 21 Aug 2012 | Published: 31 Jul 2012

Juniper Networks, Inc.

The CIO’s Guide to Building a Mobile Device Management Strategy – And How to Execute on It
sponsored by BlackBerry
WHITE PAPER: As the mobility trend continues to take over the business world, CIOs are left with the difficult task of figuring out the best way to manage the drastic increase in mobile users. Discover how mobile device management (MDM) strategies can enable you to improve mobile security, increase productivity, reduce TCO, and more.
Posted: 13 Sep 2012 | Published: 13 Sep 2012

BlackBerry

BYOD and the Wireless Revolution
sponsored by Avaya
WHITE PAPER: BYOD and the wireless revolution are changing the modern enterprise – are you ready? This resource explores how to ready your network for BYOD in order to reap the most benefits while simultaneously maintaining control over your network and corporate assets.
Posted: 30 Apr 2012 | Published: 30 Dec 2011

Avaya

Network Rightsizing Blueprint for the Next-Generation Workplace
sponsored by Aruba Networks
WHITE PAPER: This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.
Posted: 17 Jul 2013 | Published: 20 May 2013

Aruba Networks

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement