Standards  >   Security Standards  >  

Wireless Encryption Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Encryption Protocol Reports
 
Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

How to Harden Your Servers In Elastic Infrastructures
sponsored by CloudPassage
WEBCAST: Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Find out how you can deploy systems through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.
Posted: 19 Jul 2016 | Premiered: Jun 21, 2016

CloudPassage

Cyber Security 2016 and beyond
sponsored by ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

ESG Lab Review: User Behavior Analytics
sponsored by Exabeam
ANALYST REPORT: Discover the results of hands-on testing by of a User Behavior Analytics (UBA) platform. Learn only what such a platform should provide, but also how it should provide deep context, how it tracks its users, identifies anomalous behaviors, and more.
Posted: 26 Jul 2016 | Published: 31 Mar 2016

Exabeam

The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

5 Steps to Implement and Maintain PCI DSS Compliance
sponsored by AlienVault
RESOURCE: In this resource you'll find an easy to follow guide for success when it comes to the troubles Payment Card Industry Data Security Standards can cause your enterprise.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

AlienVault

Implementing Data Privacy Requirements For Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover how to give visibility to encrypted traffic, reducing the risk of malicious activity to go unnoticed. Also find out how to achieve simple, effective policy enforcement.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

Blue Coat Systems

Ensuring the Quality of Data in Motion: The Missing Link in Data Governance
sponsored by Infogix
WHITE PAPER: This white paper outlines a framework for ensuring the integrity of both transactional and non-transactional data using automated information controls and continuous monitoring. Click through now to discover how this system can help you detect and prevent information errors.
Posted: 24 Feb 2016 | Published: 24 Feb 2016

Infogix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement