IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Network Security Reports
 
Tablets & Smartphones in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend.
Posted: 28 Jan 2013 | Published: 01 Jan 2013

SearchSecurity.com

Network Security Visibility and Analysis Technical Guide
sponsored by SearchSecurity.com
EZINE: This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology. Read on now to secure the data traveling across your network with these monitoring strategies.
Posted: 11 Jun 2013 | Published: 10 Jun 2013

SearchSecurity.com

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Network Rightsizing Blueprint for the Next-Generation Workplace
sponsored by Aruba Networks
WHITE PAPER: This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.
Posted: 17 Jul 2013 | Published: 20 May 2013

Aruba Networks

June Information Security Magazine
sponsored by SearchSecurity.com
EZINE: Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

SearchSecurity.com

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues.
Posted: 21 Aug 2012 | Published: 31 Jan 2012

Juniper Networks, Inc.

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

SearchSecurity.com

Computer Weekly - 15 May 2012: Overhauling banking IT
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital?
Posted: 14 May 2012 | Published: 15 May 2012

ComputerWeekly.com

User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Webroot

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement