Standards  >   Security Standards  >  

Wireless Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Encryption Reports
 
Smart Mobile™: Next Generation WLAN Architecture for High-Performance Networks
sponsored by Trapeze Networks
WHITE PAPER: This white paper details the different approaches to wireless LAN (WLAN) architectures, planning for applications such as VoWLAN, preparing for 802.11n and recommending strategies for future wireless deployments.
Posted: 11 Jul 2007 | Published: 01 Jul 2007

Trapeze Networks

Can a CASB Protect You from the 2016 Treacherous 12?
sponsored by Palerra Inc.
WHITE PAPER: Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

Securing Agile IT: Common Pitfalls, Best Practices and Surprises
sponsored by CloudPassage
WEBCAST: Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general such as security as a "secondary layer", removing layers from the bottom up, reducing attack surface, and more.
Posted: 18 Jul 2016 | Premiered: Jun 23, 2016

CloudPassage

Executive Viewpoint: Getting Tough on Security Threats
sponsored by F5 Networks
WHITE PAPER: In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

F5 Networks

5 Foundations For Managing Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

A letter from the CEO: Connected Health Cloud Release
sponsored by CloudMine
WHITE PAPER: If you've been struggling to derive meaningful data insights, now you can with a HIPAA-compliant cloud solution that won't break the bank. It connects with big-data analytics platforms to help you gain a better understanding of patient data and take action to improve outcomes (all with impeccable threat detection capabilities).
Posted: 28 Jun 2016 | Published: 01 Mar 2016


IBM Security QRadar Incident Forensics
sponsored by IBM
WHITE PAPER: Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2014

IBM

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Top Security Concerns and Trends Takeaways
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Laptop Management for Windows
sponsored by IBM
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement