Standards  >   Security Standards  >  

Wireless Encryption Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Encryption ProtocolReports
 
WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

e-Guide: Conquering Advanced Persistent Threat Attacks
sponsored by CDW Corporation
EGUIDE: This expert e-Guide clears up common misconceptions about the dangers and characteristics of advanced persistent threats (APTs), and also explains how context-aware security can improve the detection of APTs within enterprises.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

Samaritan Medical Center: CIOs Approach to Consolidating Hospital Data
sponsored by BridgeHead Software
WHITE PAPER: This case study on Samaritan Medical Center highlights their experience with a single, standardized data management platform, and how they were able to offer constant data availability even during disaster recovery. Click now to see how else they're benefiting.
Posted: 26 Dec 2013 | Published: 26 Dec 2013

BridgeHead Software

MDM for a Secure Mobile Workforce
sponsored by BlackBerry
EGUIDE: This expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

BlackBerry

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

Safeguarding Business in a Time of Expanding and Evolving Cyber Threats
sponsored by Verizon
WHITE PAPER: This paper explores how advanced cybersecurity threat management techniques can help companies better prepare for, respond to, and detect advanced cybersecurity threats. It also explores how more advanced cybersecurity threat management capabilities can help organizations detect and respond to threats within days instead of months.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Verizon

Tripwire VIA System State Intelligence executive brief
sponsored by Tripwire, Inc.
WHITE PAPER: What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Security Across the Enterprise: Protect and Empower Your Branch Offices
sponsored by Cisco Systems, Inc.
WHITE PAPER: Today's branch offices rely on business-critical applications to keep the workforce as efficient as possible. But they're also vulnerable to attacks that can harm productivity and breaches that can compromise sensitive information. Successfully defending the enterprise at its branch offices requires a collaborative, defense-in-depth approach.
Posted: 11 Jun 2013 | Published: 16 Oct 2008

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement