IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security White Papers (View All Report Types)
1 - 25 of 93 Matches Previous Page  |  Next Page
6 Ways to Make Your Security Stack Work Harder
sponsored by Cisco Umbrella
WHITE PAPER: The average company uses more than 50 security vendors. And sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. In this white paper, check out 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Cisco Umbrella

Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: It's no secret that the way people work has changed dramatically over the past few years. In this white paper, explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today's increasingly distributed enterprise.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cisco Umbrella

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Citrix

Trend Report: More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: Security leaders need to find a way to give users back their freedom while still protecting sensitive data. In this white paper, learn how a Secure Internet Gateway (SIG) can do just that by providing workers with safe access to the internet – no matter what device they're using or where they're located.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

Data Security for the Way People Work
sponsored by Dell
WHITE PAPER: Data security is at the top of the priority list for most organizations. The dangers of data loss, extortion and identity theft are real. In this white paper, learn how IT leaders can implement security strategies that keep data safe while enabling productivity and collaboration without compromising the user experience.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Dell

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

Exposing PeopleSoft Self-Service Applications to the Internet
sponsored by Appsian
WHITE PAPER: Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

Rethinking Data Security with a Risk-adaptive Approach
sponsored by Forcepoint
WHITE PAPER: In this white paper, learn how by using dynamic data protection, organizations can solve the fundamental challenges of traditional data loss prevention deployments and more effectively protect sensitive information, including regulated data sources and PII.
Posted: 06 Aug 2019 | Published: 30 Apr 2019

Forcepoint

Gaining a Strategic Endpoint Security Advantage in the Era of Advanced Threats
sponsored by Symantec
WHITE PAPER: Today's advanced threat landscape poses serious challenges for enterprises of any size. But the rising trend of attacks directed against midsized enterprises should bring security to the forefront of business planning for these organizations. In this report, learn how machine learning and AI can help in the fight against advanced threats.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Symantec

2019 IT Guide: Securing Email
sponsored by Inky Technology
WHITE PAPER: Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

The Digital Workspace: 3 Elements of Success
sponsored by Citrix
WHITE PAPER: When it comes to managing the digital workspace, IT leaders overwhelmingly selected security as the top challenge. However, when managed properly, the right cloud-based digital workspace can keep organizations secure. In this white paper, learn how a unified Citrix experience can help organizations expand their security.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Citrix

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Citrix

The Evolution of Mobile Security
sponsored by Symantec
WHITE PAPER: Given that emails containing sensitive information are routinely opened on a mobile device, implementing robust security controls on these devices should be a top priority. In this white paper, learn how to break down the barriers that separate mobile security from traditional security to ensure your organization has a seamless security ecosystem.
Posted: 08 May 2019 | Published: 08 May 2019

Symantec

Avoid Cyberattacks and Save Money by Holding Less Data
sponsored by Evident
WHITE PAPER: Now more than ever before, data is at the heart of every organization. However, cybercriminals have increasingly targeted data because it's both monetarily lucrative and easier to steal than actual dollars. In this white paper, learn how your company can protect itself from a breach, and how data minimization can reduce the risks of cyberattacks.
Posted: 29 Apr 2019 | Published: 29 Apr 2019

Evident

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by DomainTools
WHITE PAPER: Security teams and the organizations they support live in difficult times: they increasingly are the targets of sophisticated threats. In this white paper, learn about the top concerns of decision makers, the growing success of cyberthreats, security's need to improve and best practices to consider.
Posted: 10 Jan 2019 | Published: 30 Apr 2018

DomainTools

3 Secrets to Becoming a Mobile Security Superhero
sponsored by Symantec
WHITE PAPER: Organizations are advised develop a consensus about adopting modern, advanced security technologies to protect mobile devices. Download to reveal 3 secrets that'll help you convince business leaders to buy-into mobile cybersecurity.
Posted: 08 Aug 2018 | Published: 31 Dec 2017

Symantec

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

SearchSecurity.com

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track Security

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

Symantec Website Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

Symantec Corporation

Simplify Network Management with New Secure and Scable Wireless Solutions
sponsored by DellEMC and Intel®
WHITE PAPER: Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.
Posted: 05 Aug 2013 | Published: 31 Jul 2013

DellEMC and Intel®
1 - 25 of 93 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement