IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 
Definition continues below.
Wireless SecurityReports
151 - 175 of 243 Matches Previous Page  | Next Page
Engineering the Wireless Hospital
sponsored by Aerohive Networks
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. However, there are security, infrastructure, and connectivity obstacles to overcome. Check out this e-book to learn more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Aerohive Networks

5 Steps to Secure the Wireless Network
sponsored by NETGEAR Inc.
WHITE PAPER: Today’s organizations increasingly rely on the ease and lower cost of wireless networking. Schools and businesses are investing in Wi-Fi to leverage benefits including more flexible network connectivity, improved productivity, and reduced capital expense. Read this white paper to learn how to incorporate wireless connectivity into your everyday.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

NETGEAR Inc.

Successful Mobile Deployments Require Robust Security
sponsored by BlackBerry
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 15 Oct 2010 | Published: 20 May 2009

BlackBerry

Implementing a Secure Wireless Network in an Educational Setting
sponsored by NETGEAR Inc.
WHITE PAPER: Wireless connectivity has become a necessity in educational institutions of all levels. Students require Internet connectivity to conduct research, download assignments and communicate with their instructors. Likewise, educators utilize web portals to post assignments, and update class materials. Read this white paper to learn more. 
Posted: 11 Oct 2010 | Published: 11 Oct 2010

NETGEAR Inc.

Building Mobility into Your Network
sponsored by NETGEAR Inc.
WHITE PAPER: Business environments have become increasingly dynamic and have created the demand for unprecedented levels of workforce mobility. These demands for business mobility require networks and data to be securely accessible anytime and anywhere − throughout the office, as well as from remote locations. Read this white paper to find out more.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

NETGEAR Inc.

How Advanced is Your Enterprise’s iPhone, BlackBerry and Android Management?
sponsored by BoxTone
WHITE PAPER: With an explosion of iPhone, BlackBerry & Android devices entering your workplace, how advanced is your team’s ability to secure, manage and support them? Read this Aberdeen report to learn how the best-in-class are benefiting from leveraging mobility management.
Posted: 01 Sep 2010 | Published: 01 Sep 2010

BoxTone

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
sponsored by Symantec Corporation
WHITE PAPER: This paper discusses common security shortfalls found through a survey of U.S. small businesses, and provides five important tips for a security-aware business.
Posted: 01 Sep 2010 | Published: 31 Aug 2010

Symantec Corporation

E-Book: Engineering the Wireless Hospital
sponsored by SearchHealthIT.com
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this exciting E-Book to learn more about topics like device security, running your network, and more.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

SearchHealthIT.com

Employee-owned Smartphones: Seize the Opportunity
sponsored by BlackBerry
WHITE PAPER: With the increasing demand for employees to use personal smartphones for work-related duties, IT management must take a leadership role in setting up mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources. Continue reading to learn more.
Posted: 27 Jul 2010 | Published: 27 Jul 2010

BlackBerry

Understanding High Availability for the BlackBerry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: Read this technical white paper to learn about the evolution of mobile devices and the introduction of high availability in a mobile context. Also learn about the Blackberry as well as load balancing, failover thresholds, and limited downtime upgrades.
Posted: 23 Jun 2010 | Published: 06 Aug 2009

BlackBerry

AirMagnet WiFi Analyzer
sponsored by AirMagnet
TRIAL SOFTWARE: AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise 802.11a/b/g/n networks. AirMagnet WiFi Analyzer solves end user WLAN issues while automatically detecting security threats and other wireless network vulnerabilities.
Posted: 08 Jun 2010 | Premiered: 15 Aug 2011

AirMagnet

How to Unify Your Wireless Architecture Without Limiting Performance or Flexibility
sponsored by D-Link
WHITE PAPER: So much is happening today to give you a chance to rethink your wireless architecture. Learn what to look for in a wireless architecture that not only provides the mobility and performance today’s applications need, but also lowers your costs of operations while increasing wireless security.
Posted: 26 Apr 2010 | Published: 26 Apr 2010

D-Link

Secure Smartphone Apps: The Next Generation
sponsored by BlackBerry
WHITE PAPER: The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

BlackBerry

The CIO's Guide to Fixed Mobile Convergence
sponsored by BlackBerry
WHITE PAPER: Organizations seeking solutions that provide high-performance access while addressing security needs can leverage fixed mobile convergence (FMC) systems to enhance communication. This document explores why your organization should implement an FMC solution, the benefits of FMC and considerations for methods of implementation.
Posted: 06 Apr 2010 | Published: 07 Apr 2010

BlackBerry

Smart Policies for Personal-Liable Smartphones
sponsored by BlackBerry
WHITE PAPER: This white paper addresses how businesses and employees can compromise between personal and business smartphone use, as well as benefit by establishing personal-liable smartphone policies.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

BlackBerry

Presentation Transcript: PCI DSS v1.2: Best Practices and Useful Tips
sponsored by ESET
PRESENTATION TRANSCRIPT: While there are multiple regulatory compliance standards, the Payment Card Industry Data Security Standard (PCI DSS) addresses a sector with the greatest number of data breaches. Check out this Presentation Transcript to discover key differences between PCI DSS version 1.1 and 1.2, best practices for ensuring compliance, and tips.
Posted: 15 Jan 2010 | Published: 15 Jan 2010

ESET

Mobile Security Report 2009
sponsored by McAfee, Inc.
WHITE PAPER: Device manufacturers are balancing control with innovation, a dynamic that often controls the mobile ecosystem. This is why the McAfee Mobile Security Report 2009 is taking a closer look at manufacturers’ security experiences, their concerns and priorities, and their approach to major security challenges that lie ahead of them in the near future.
Posted: 08 Dec 2009 | Published: 07 Dec 2009

McAfee, Inc.

Closing Wireless Loopholes for PCI Compliance and Security
sponsored by AirMagnet
WHITE PAPER: Merchants who process payment cards need dedicated wireless monitoring systems that offer full traffic analysis and comprehensive security solutions to identify wireless security loopholes, provide solutions, and document compliance for audits. Read this white paper to learn more about ensuring PCI compliance in your wireless network.
Posted: 02 Dec 2009 | Published: 02 Dec 2009

AirMagnet

Addressing Mobile Threats: Effective Detection and Response
sponsored by ArcSight, an HP Company
WHITE PAPER: Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more.
Posted: 19 Oct 2009 | Published: 07 Mar 2007

ArcSight, an HP Company

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

Information Security Magazine

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
sponsored by CDW Corporation
WHITE PAPER: Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
Posted: 08 Sep 2009 | Published: 16 Mar 2009

CDW Corporation

Taking a Strategic Approach to Enterprise Mobility
sponsored by Sybase, an SAP company
WEBCAST: This webcast discusses everything you need to know about adopting a Mobile Enterprise Application Platform, such as the true value of adopting a Mobile Enterprise Application Platform, the trends you need to be tracking, and how to take a strategic approach to deployment.
Posted: 03 Sep 2009 | Premiered: Sep 3, 2009

Sybase, an SAP company

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
sponsored by Motorola, Inc.
WHITE PAPER: This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
Posted: 19 Aug 2009 | Published: 01 May 2007

Motorola, Inc.

Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions
sponsored by Sunbelt Software
PRESENTATION TRANSCRIPT: In this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor.
Posted: 18 Aug 2009 | Published: 18 Aug 2009

Sunbelt Software
151 - 175 of 243 Matches Previous Page    5 6 7 8 9 10    Next Page
 
WIRELESS SECURITY DEFINITION (continued): …  as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.According to a ZDNet UK article, attackers are exploiting a problem with some implementations of the object exchange (OBEX) protocol, which is commonly used to exchange information between wireless devices. An attacker can synchronize … 
Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement