Standards  >   Security Standards  >  

Wireless Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Encryption Reports
Smart Mobile™: Next Generation WLAN Architecture for High-Performance Networks
sponsored by Trapeze Networks
WHITE PAPER: This white paper details the different approaches to wireless LAN (WLAN) architectures, planning for applications such as VoWLAN, preparing for 802.11n and recommending strategies for future wireless deployments.
Posted: 11 Jul 2007 | Published: 01 Jul 2007

Trapeze Networks

When Retention Schedules Shouldn't Live Up to their Name
sponsored by Iron Mountain
WHITE PAPER: This white paper will help you understand how retention schedules have unintentionally misled companies into keeping unneeded data. Learn why taking the leap to get rid of excess information is a solid way to govern it, lessen risk, and save money.
Posted: 19 Apr 2015 | Published: 20 Apr 2015

Iron Mountain

Encrypting Data with Confidence, Across the Enterprise and Beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013


Security Has Failed Us - But it's not Too Late
sponsored by Unisys
VIDEO: Watch this brief video as security solutions expert Tom Patterson explains the failures of the security industry and how they've worsened due to new threats and environments. Tune in and discover the surprising way to overcome these failures.
Posted: 23 Nov 2015 | Premiered: 09 Nov 2015


The ESG Cybersecurity Maturity Model
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 12 Nov 2015 | Published: 22 Oct 2014

Hewlett Packard Enterprise

PCI 101: A Beginner’s Guide to PCI DSS Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast covers everything you need to know about the payment card industry data security standard.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

Solving the Scalability Problem with Big Data
sponsored by WANdisco
EGUIDE: A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.
Posted: 03 Sep 2013 | Published: 03 Sep 2013


How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE: This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014


The Consumerization of IT: Security Challenges of the New World Order
sponsored by CA Technologies.
WHITE PAPER: Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them.
Posted: 22 Aug 2012 | Published: 31 May 2012

CA Technologies.

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement