Standards  >   Security Standards  >  

Wi-Fi Protected Access

RSS Feed    Add to Google    Add to My Yahoo!
Wi-Fi Protected Access Reports
Smart Mobile™: Next Generation WLAN Architecture for High-Performance Networks
sponsored by Trapeze Networks
WHITE PAPER: This white paper details the different approaches to wireless LAN (WLAN) architectures, planning for applications such as VoWLAN, preparing for 802.11n and recommending strategies for future wireless deployments.
Posted: 11 Jul 2007 | Published: 01 Jul 2007

Trapeze Networks

Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

How One SIEM Strategy Stacks Up
sponsored by LogRhythm, Inc.
WHITE PAPER: This resource takes a look at one SIEM strategy and rates its features, performance, documentation, support, and value. Access now to determine if it's time for your organization to consider a different approach to SIEM technology.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

LogRhythm, Inc.

Assessing and Sharpening your Security Controls
sponsored by eTECH Channel
WHITE PAPER: Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

eTECH Channel

A New Approach to the Security Ecosystem
sponsored by Unisys
WHITE PAPER: Discover how micro-segmentation can firmly handle your enterprise's approach to security and connecting the disparate parts of your network. Learn how endpoint security, network protection, mobile devices, and more can all coexist effectively and safely in your organization's infrastructure.
Posted: 10 Oct 2016 | Published: 10 Oct 2016


The Current and Future States of Cybersecurity in the Digital Economy: Part 1
sponsored by Unisys
WHITE PAPER: In part 1 of this 3-part cybersecurity report, explore the vulnerabilities in ICS systems, as well as methods for assessing risk in your ICS cybersecurity plan – helping you combat costly and damaging attacks to critical ICS systems.
Posted: 11 Oct 2016 | Published: 16 Sep 2016


Phillip Morris International Mobilizes a Global Workforce
sponsored by MobileIron
WHITE PAPER: Discover how Philip Morris secured its corporate-issued and employee-owned devices, maintains an accurate device count across 60 countries, resets employee passcodes in seconds, and manages its growing lineup of productivity apps.
Posted: 14 Sep 2016 | Published: 14 Sep 2016


Beyond Certificate Management for Enterprises
sponsored by Certified Security Solutions (CSS)
WEBCAST: Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)

Mitigating OWASP Automated Threats
sponsored by Imperva
WHITE PAPER: Learn how automated threats can cripple an enterprise, and how to gain effective protection against them. Find how automated threats put a knife to the throat of their targets and what you can do to mitigate their dangers.
Posted: 31 Aug 2016 | Published: 31 Aug 2016


What's the Best Way to Handle External Security Auditors?
sponsored by Dell Software
EGUIDE: A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement