IT Management  >   Systems Operations  >   Security  >   Network Security  >  

WLAN Security

RSS Feed    Add to Google    Add to My Yahoo!
WLAN Security Reports
 
Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition, InfoSec pros will learn about enterprise mobile management, or EMM, the new approach to security in the BYOD age, which focuses on security data rather than devices.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

SearchSecurity.com

802.1x - Implementing and Deploying Methods
sponsored by Global Knowledge
WHITE PAPER: You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have.
Posted: 26 Jul 2013 | Published: 09 Jul 2013

Global Knowledge

The Transformation of Wireless Network Security
sponsored by SearchSecurity.com
EBOOK: Learn how to integrate Wi-Fi security into your overall network strategy to help maintain security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

SearchSecurity.com

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by Dell, Inc.
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

Dell, Inc.

Mobile Device Security Lacking in Most Hospital Policy Discussions
sponsored by Essextec
EZINE: This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Essextec

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.
Posted: 17 Apr 2013 | Published: 31 Dec 2012

AirTight Networks, Inc.

Hot Tips for Securing Your Wireless Network
sponsored by Sophos, Inc.
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos, Inc.

Enterprise Mobility Management Options to Keep Corporate Data Safe
sponsored by MobileIron
EGUIDE: This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
Posted: 15 May 2013 | Published: 15 May 2013

MobileIron
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement