Standards  >   Security Standards  >  

Wireless Encryption Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Encryption Protocol Reports
 
WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

Biometrics: A Modern Method Of Authentication
sponsored by Comarch
WHITE PAPER: Get a thorough understanding of biometrics and how it can serve as an effective method of user authentication for your organization's security strategy.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Comarch

Threat Intelligence Platforms: A Research Report
sponsored by AlienVault
WHITE PAPER: Find how a social media-esque, community-focused approach to threat intelligence has proven to be effective at identifying and analyzing emerging threats.
Posted: 17 Nov 2016 | Published: 12 Oct 2016

AlienVault

A Guide for Building PCI DSS & HIPAA Compliant Businesses in the Cloud
sponsored by ThreatStack
WHITE PAPER: Where do you begin your cloud compliance journey? In this guide, learn to better understand the complexities of cloud compliance requirements, without all the headaches and confusion. Uncover how compliance differs in the cloud, why security monitoring is critical to achieving compliance, and more.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

ThreatStack

Securing Hybrid Networks for Dummies
sponsored by Forcepoint
EBOOK: Discover how to secure digital networks and take a deep dive into complex infrastructures that deploy various methods of connectivity. Learn how to understand a next-generation network, run an efficient hybrid network, manage hybrid connection challenges, and more.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Forcepoint

Database Audit and Protection Tips
sponsored by Imperva
EBOOK: Discover an actionable set of tips for organizations looking to implement a data-centric security strategy that addresses database audit and protection. Get tangible data security benefits while simplifying the compliance audit process.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Imperva

An MSP's Guide to selling IT Security
sponsored by LogicNow
WHITE PAPER: By enhancing your security capabilities, you can add additional value to your offerings. Learn how to evolve into a Managed Security Service Provider (MSSP) and enable various security strategies that complement each other.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

LogicNow

Create a Customized Testing Strategy
sponsored by IBM
WHITE PAPER: Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement