Standards  >   Security Standards  >  

Wired Equivalent Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Wired Equivalent PrivacyReports
 
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Mitigating Risks of Cloud Computing with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines an overview of cloud computing, highlighting its advantages as well as its concerns.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

CFO Research Study - Linking Numbers and Narratives
sponsored by IBM
ANALYST REPORT: This white paper explains the importance of understanding financial numbers and how to get the most out of your narrative analysis.
Posted: 16 Jul 2014 | Published: 31 Jul 2012

IBM

How Secure is Your Platform With the Evolving Threat Landscape?
sponsored by IBM
WHITE PAPER: This exclusive paper analyzes the business differentiators among the leading security vendors and examines how safe they can actually keep your data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

The Fortinet Security Census 2014
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper reveals the results of and IT security census of more than 1,600 qualified IT decision makers.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Fortinet, Inc.

Security Across the Enterprise: Protect and Empower Your Branch Offices
sponsored by Cisco Systems, Inc.
WHITE PAPER: Today's branch offices rely on business-critical applications to keep the workforce as efficient as possible. But they're also vulnerable to attacks that can harm productivity and breaches that can compromise sensitive information. Successfully defending the enterprise at its branch offices requires a collaborative, defense-in-depth approach.
Posted: 11 Jun 2013 | Published: 16 Oct 2008

Cisco Systems, Inc.

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement