IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 
Definition continues below.
Wireless Security Reports
1 - 25 of 251 Matches Previous Page  |  Next Page
Deploying a Multiā€Gigabit Web Filtering Architecture
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites.
Posted: 08 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Web Filtering and Security: Capital Area Intermediate Unit Case Study
sponsored by ContentKeeper
CASE STUDY: This case study explores how to implement a web filtering and security system that can inspect SSL encrypted web page requests and enable more granular control over website access. Discover how to unlock better insight into and control over the use of Web 2.0 tools and SSL encrypted sites.
Posted: 03 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

5 Reasons that You Are Overpaying for Your Wi-Fi
sponsored by Aerohive Networks
EBOOK: This e-Book serves as a guide for any organization looking to deploy next generation Wi-Fi connectivity, while avoiding hidden costs and complexity. Learn the 5 reasons vendors might be charging you too much upfront or why you may end up paying too much down the road.
Posted: 02 Feb 2017 | Published: 30 Dec 2016

Aerohive Networks

Wi-Fi is Easy, Secure Wi-Fi is the Challenge.
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this eBook, learn about the increasing demand for Wi-Fi, and more importantly, how to secure your wireless network.
Posted: 13 Jan 2017 | Published: 10 Oct 2016

WatchGuard Technologies, Inc.

How to Address IoT, Mobile, and Endpoint Security Challenges
sponsored by SOTI Inc.
WHITE PAPER: This white paper examines the security challenges of IoT and how they affect mobile strategies. Discover how to go beyond unified endpoint management (UEM), address issues of interoperability, and more.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SOTI Inc.

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

SDN Can Help Unify Wired and Wireless Campus Networks
sponsored by Brocade
EGUIDE: In this expert e-guide, learn how SDN controllers can give your Wi-Fi and Ethernet switch-based campus networks the support they need for a successful unification.
Posted: 01 Feb 2017 | Published: 31 Jan 2017

Brocade

Wireless Security Protocols: The Difference Between WEP, WPA, WPA2
sponsored by Brocade
EGUIDE: In wireless security, passwords are only half the battle. Choosing the proper level of encryption is just as vital. In this expert e-guide, learn the differences between the three wireless encryption standards: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access (WPA).
Posted: 01 Feb 2017 | Published: 31 Jan 2017

Brocade

Cyber Threats to Online Shopping Cheer
sponsored by Neustar
WHITE PAPER: Learn how to protect your brand and stay online during high-volume occasions. See statistics on current online shopping trends and discover how to stop fraudulent actors before they can damage your organization.
Posted: 03 Oct 2016 | Published: 31 Dec 2016

Neustar

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

It's time to tackle IoT security
sponsored by Ruckus Wireless
EGUIDE: The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless

Securing Your Network in the Wireless Age
sponsored by Aruba Networks
EGUIDE: In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Secure Wireless LAN for Uninterrupted Clinical Applications
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a solution that addresses the security and performance requirements for uninterrupted clinical applications, with the least amount of administrative complexity.
Posted: 16 Feb 2016 | Published: 29 Jul 2015

Fortinet, Inc.

Consolidating Security to Increase Performance and Lower Costs
sponsored by Fortinet, Inc.
CASE STUDY: This case study describes the solution that enabled a healthcare organization to compress, accelerate, and encrypt connections to low bandwidth remote locations without the need for additional devices.
Posted: 16 Feb 2016 | Published: 21 May 2015

Fortinet, Inc.

Secure Wi-Fi for K-12 Education
sponsored by Fortinet, Inc.
WHITE PAPER: Mobile devices present new security challenges for schools that need to protect their network integrity as well as restrict students' access to dangerous sites. Access this resource to learn about a solution that unifies network and application security and delivers maximum control at a low cost.
Posted: 16 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone

The 2015 State of the Market in Wireless Security
sponsored by Fortinet, Inc.
WHITE PAPER: This global survey studies the state of the market for wireless LAN security. Address the holes in your WLAN security strategy, as well as see how cloud-managed Wi-Fi stacks up to traditional security methods.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Fortinet, Inc.

Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchSecurity.com

Information Security Magazine: August Issue
sponsored by SearchSecurity.com
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchSecurity.com

The Transformation of Wireless Network Security
sponsored by SearchSecurity.com
EBOOK: This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

SearchSecurity.com

Why Wi-Fi Quality is so Important to the End-user
sponsored by Extreme Networks
WHITE PAPER: This exclusive whitepaper offers an in-depth look at Wi-Fi's history, and where it's headed in the future. Read on to learn more.
Posted: 28 Oct 2014 | Published: 28 Oct 2014

Extreme Networks

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

SearchSecurity.com
1 - 25 of 251 Matches Previous Page    1 2 3 4    Next Page
 
WIRELESS SECURITY DEFINITION (continued): …  as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.According to a ZDNet UK article, attackers are exploiting a problem with some implementations of the object exchange (OBEX) protocol, which is commonly used to exchange information between wireless devices. An attacker can synchronize … 
Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement