IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 
Definition continues below.
Wireless Security Reports
1 - 25 of 242 Matches Previous Page  |  Next Page
Improve Organizational Security with End-to-End Mobile Protection
sponsored by MXN Corporation
WHITE PAPER: In this brief white paper, you will learn about a mobile operating system with built in end-to-end security that will transform your enterprise mobility. Learn how to prevent unauthorized access to your networks without the need for Network Access Control (NAC) software.
Posted: 16 Nov 2015 | Published: 31 Jul 2013

MXN Corporation

The 2015 State of the Market in Wireless Security
sponsored by Fortinet, Inc.
WHITE PAPER: This global survey studies the state of the market for wireless LAN security. Address the holes in your WLAN security strategy, as well as see how cloud-managed Wi-Fi stacks up to traditional security methods.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Fortinet, Inc.

Secure Unified Access for the Distributed Enterprise
sponsored by Fortinet, Inc.
RESOURCE: Discover how to implement a unified access solution, in which comprehensive, multi-layered security extends automatically with each new network connection, wired or wireless. Access 5 key considerations for implementing this unified layer for your wireless security.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Fortinet, Inc.

A Guide to Delivering Secure Wireless LAN
sponsored by Fortinet, Inc.
WHITE PAPER: In this guide, you will learn how to deploy comprehensive wireless security to your LAN—regardless the size of your business, your network topology, and cloud-based Wi-Fi management. Discover a WLAN portfolio that will address the Wi-Fi needs of SMBs as well as large-scale enterprises.
Posted: 03 Nov 2015 | Published: 02 Nov 2015

Fortinet, Inc.

The Importance of Security in Cloud-Managed Wi-Fi Infrastructure
sponsored by Fortinet, Inc.
ANALYST REPORT: In this analyst report, you will compare the capabilities of controller-based Wi-Fi against those of cloud-managed, and address the security concerns that cloud-enabled wireless presents. Get the answers to your must-ask security questions about cloud-managed Wi-Fi.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Fortinet, Inc.

Embracing Strategic Mobility for Small to Midsize Businesses
sponsored by Cisco
WHITE PAPER: In this white paper, Nolan Greene, research analyst with IDC's Network Infrastructure group, breaks down the concerns with regards to adopting mobility in small to midsize businesses. Learn how to best adapt your SMB to current mobile trends.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Confront the Mobility Conundrums of the Hospitality Industry
sponsored by Cisco
PRODUCT OVERVIEW: This white paper reviews one mobility management solution perfect for the hospitality industry, complete with automated and simple Wi-Fi setup and security and app management tools. Learn how to capitalize on guest and hotel staff communications on a single combined network, and more.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Enable Fast IT by Accelerating Your Network
sponsored by Cisco
PRODUCT OVERVIEW: This white paper explains how to simplify and accelerate your Wi-Fi deployments with a wireless LAN. Learn how to manage up to 25 APs and 500 clients for each virtual controller you deploy, and deliver the same quality user experiences as large enterprises.
Posted: 19 Oct 2015 | Published: 19 Oct 2015


Where MDM Fits Into Your Enterprise Mobile Strategy
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide examines the roles MDM, mobile application management (MAM), and enterprise mobility management (EMM) play for several devices and operating systems. Access this exclusive resource now to learn how to best use this technology to secure the enterprise.
Posted: 22 Jun 2015 | Published: 10 Jun 2015

Dell, Inc. and Intel®

Wireless Network Security - Next Gen Firewalls
sponsored by Dell Software
WHITE PAPER: In this white paper, examine the infrastructure of one next-gen wireless firewall.
Posted: 01 Jun 2015 | Published: 18 Dec 2014

Dell Software

Case Study: Deploying Secure Public WiFi
sponsored by Dell Software
CASE STUDY: This brief case study examines how one Australian city council enabled secure WiFi in all public buildings using a next-gen firewall to protect endpoints, users, and sensitive data. Access now to learn how to mitigate mobile and network threats.
Posted: 27 May 2015 | Published: 13 May 2015

Dell Software

The Transformation of Wireless Network Security
sponsored by
EBOOK: This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Security University: Mobile Security
sponsored by
VIRTUAL ENVIRONMENT: Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOD to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by
EBOOK: In this Insider Edition, InfoSec pros will learn about enterprise mobile management, or EMM, the new approach to security in the BYOD age, which focuses on security data rather than devices.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Securing your small business
sponsored by Dell, Inc.
WHITE PAPER: Learn how to purchase, configure and maintain point solutions that deliver the comprehensive protection your business needs. Read this eBook to hear about the modern advances in Dell security technology, and how they achieve enterprise-level protection within your small business budget.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell, Inc.

How Can You Avoid a Web Security Breach? It's All in the Preparation
sponsored by
EGUIDE: In this e-guide, from, discover simple steps in order to avoid web security breaches.
Posted: 14 Nov 2013 | Published: 14 Nov 2013

Protecting Data on the Go
sponsored by
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Why Wi-Fi Quality is so Important to the End-user
sponsored by Extreme Networks
WHITE PAPER: This exclusive whitepaper offers an in-depth look at Wi-Fi's history, and where it's headed in the future. Read on to learn more.
Posted: 28 Oct 2014 | Published: 28 Oct 2014

Extreme Networks

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

How to Handle Mobile Devices' Impact on the Network
sponsored by
EBOOK: The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

IM Wireless Network Assessment
sponsored by Ingram Micro
ASSESSMENT TOOL: The need to protect your data and organization is now even more critical than before. Take a look at this brief white paper to learn how one company can help you secure your business.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

Ingram Micro

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by Symantec Corporation
EGUIDE: Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Symantec Corporation

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Thawte in Education
sponsored by Thawte Inc.
WHITE PAPER: Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.
1 - 25 of 242 Matches Previous Page    1 2 3 4    Next Page
WIRELESS SECURITY DEFINITION (continued): …  as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.According to a ZDNet UK article, attackers are exploiting a problem with some implementations of the object exchange (OBEX) protocol, which is commonly used to exchange information between wireless devices. An attacker can synchronize … 
Wireless Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement