Standards  >   Security Standards  >  

Wired Equivalent Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Wired Equivalent Privacy Reports
 
Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

HPE Enterprise Secure Key Manager Best Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to use the HPE Enterprise Secure Key Manager. The HPE Enterprise Secure Key Manager environment will provide an effective and secure repository for your encryption keys environment.
Posted: 26 Jan 2017 | Published: 26 Jan 2017

Hewlett Packard Enterprise

6 Questions Every CIO Should Ask About Cloud Security
sponsored by IBM
WEBCAST: Delve into IT security risks, concerns, and troubles that enterprises run into when looking to secure their cloud in conjunction with their cloud providers. Discover why these issues arise, and what can be done about them.
Posted: 10 Feb 2017 | Premiered: Feb 10, 2017

IBM

Tackling Insider Threats
sponsored by Intel Security
WHITE PAPER: Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.
Posted: 13 Feb 2017 | Published: 30 Nov 2016

Intel Security

Today's State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Absolute

Five Ways to Protect Your Digital Assets
sponsored by Hewlett-Packard Enterprise
RESOURCE: Discover not only a rundown of the threats that you need to prepare for if disaster strikes, but also the data backup and recovery strategies that will ensure business continues as normal as quickly as possible afterwards.
Posted: 19 Jan 2017 | Published: 01 Jan 2016

Hewlett-Packard Enterprise

Worldwide DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: Learn more about today's DDoS landscape, running trends, lessons learned from previous attacks, and what you can do to protect your company.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

Neustar

Top 5 Risk Mitigations In a Cloud-First World
sponsored by Forcepoint
WEBCAST: Dive head-first into risk mitigation on the cloud with this webcast featuring experts Neil Thacker and Adrian Sanabria as they discuss 5 ways to make sure your cloud is secure and handled properly.
Posted: 16 Feb 2017 | Premiered: Feb 16, 2017

Forcepoint
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement