Standards  >   Security Standards  >  

Wireless Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Wireless EncryptionReports
 
Smart Mobile™: Next Generation WLAN Architecture for High-Performance Networks
sponsored by Trapeze Networks
WHITE PAPER: This white paper details the different approaches to wireless LAN (WLAN) architectures, planning for applications such as VoWLAN, preparing for 802.11n and recommending strategies for future wireless deployments.
Posted: 11 Jul 2007 | Published: 01 Jul 2007

Trapeze Networks

Multiple Country Implementation — Influencing Factors and Approaches
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

ComputerWeekly.com

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems

February Technical Guide on Cloud Compliance
sponsored by SearchSecurity.com
EGUIDE: In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

The Open Group - Cloud Computing guide to interoperability and portability
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from the Open Group offers advice to businesses on how to avoid supplier "lock-in" when you move data into the cloud.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

ComputerWeekly.com

How to Align your Security Needs with Business Objectives
sponsored by Hewlett-Packard Limited
WHITE PAPER: This whitepaper covers the emphasis on security that is growing in IT and offers a solution that can provide data protection that is in line with your business goals.
Posted: 12 Feb 2014 | Published: 10 Apr 2013

Hewlett-Packard Limited

Compliance Driven Security
sponsored by Dell, Inc.
WHITE PAPER: With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell, Inc.

Improving WAN Performance: Best Practices
sponsored by F5 Networks
EGUIDE: In this exclusive expert E-Guide from SearchNetworking.com, explore how you really can find the right balance between offering your users the performance and quality they want and having the security your organization needs.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

F5 Networks

Webroot  Endpoint Security eBook
sponsored by Webroot
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

Computer Weekly - 3 April 2012: Data security best practice
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.
Posted: 02 Apr 2012 | Published: 03 Apr 2012

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement