IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security White Papers (View All Report Types)
1 - 25 of 87 Matches Previous Page  |  Next Page
Employee Habits that Can Put Your Company at Risk
sponsored by Panda Security
WHITE PAPER: While maintaining secure devices and networks is critical to an organization's cybersecurity, it's not the only thing companies should focus on. When it comes to keeping an organization secure, employees are often the weakest link. Download this white paper to learn how employees are threatening your company and ways to prevent it.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
Panda Security

Cryptojacking: A Hidden Cost
sponsored by Panda Security
WHITE PAPER: Cryptojacking is one of the newest threats to cybersecurity in the last two years. Easy to carry out and difficult to detect, these attacks involve cybercriminals taking control of a third-party device's CPU to mine valuable cryptocurrencies. Download this white paper to learn more about the threat and how to protect your devices.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
Panda Security

Asset Management for Cybersecurity: 10 Essential Questions to Answer
sponsored by Axonius
WHITE PAPER: When Axonius built their cybersecurity asset management platform, they had conversations with hundreds of security professionals about the challenges they face around seeing and securing all assets. In this post, they cover the 10 most common questions they heard, why they are difficult to answer, and how to overcome the obstacles.
Posted: 23 Jan 2019 | Published: 23 Jan 2019

TOPICS: 
Axonius

Building a Business Case for Cybersecurity Asset Management
sponsored by Axonius
WHITE PAPER: With many competing priorities facing information security teams, any new project must be prioritized against risk, net new capabilities, and ROI. Another challenge is the increasing number and types of devices on corporate networks. In this white paper, learn how to manage these challenges by using a cybersecurity asset management tool.
Posted: 23 Jan 2019 | Published: 31 Aug 2018

TOPICS: 
Axonius

Device Discovery for Vulnerability Assessment: Automating the Handoff
sponsored by Axonius
WHITE PAPER: While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are only able to scan and analyze those assets they know about. In this white paper, we'll highlight how automating both device discovery and making VA tools aware of new devices that should be scanned can help your security efforts.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

TOPICS: 
Axonius

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by DomainTools
WHITE PAPER: Security teams and the organizations they support live in difficult times: they increasingly are the targets of sophisticated threats. In this white paper, learn about the top concerns of decision makers, the growing success of cyberthreats, security's need to improve and best practices to consider.
Posted: 10 Jan 2019 | Published: 30 Apr 2018

TOPICS: 
DomainTools

DNS Security with Meraki MR & Umbrella
sponsored by Cisco Meraki - APAC
WHITE PAPER: This white paper explores how to update DNS security so that you can address the potential attacks from malicious actors hiding in the bevy of DNS traffic. Find out what steps you can take to improve your security posture, and learn about the integration of Cisco Umbrella and Meraki's wireless access points.
Posted: 12 Dec 2018 | Published: 30 Sep 2018

TOPICS: 
Cisco Meraki - APAC

Bringing Security to the Perimeter of your Cloud Network
sponsored by Cisco Umbrella
WHITE PAPER: With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.
Posted: 07 Sep 2018 | Published: 31 May 2016

TOPICS: 
Cisco Umbrella

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

TOPICS: 
SearchSecurity.com

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

TOPICS: 
Sophos

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

TOPICS: 
Accellion, Inc.

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

TOPICS: 
Thawte Inc.

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

TOPICS: 
Threat Track Security

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

TOPICS: 
Symantec Corporation

Symantec Website Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

TOPICS: 
Symantec Corporation

Simplify Network Management with New Secure and Scable Wireless Solutions
sponsored by DellEMC and Intel®
WHITE PAPER: Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.
Posted: 05 Aug 2013 | Published: 31 Jul 2013

TOPICS: 
DellEMC and Intel®

Wireless Solutions for Tablets and Smartphones
sponsored by Xirrus
WHITE PAPER: As the popularity of mobility grows, so do the challenges for IT. This resource explores how you can transform mobility from an IT challenge into a business opportunity by designing and managing a better wireless network.
Posted: 02 Aug 2013 | Published: 31 Dec 2011

TOPICS: 
Xirrus

Application Control at the Wireless Edge
sponsored by Xirrus
WHITE PAPER: With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.
Posted: 31 Jul 2013 | Published: 31 Dec 2012

TOPICS: 
Xirrus

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

TOPICS: 
Symantec Corporation

Network Rightsizing Blueprint for the Next-Generation Workplace
sponsored by Aruba Networks
WHITE PAPER: This resource provides a blueprint for the workplace of the future, explaining in-depth the four key characteristics of the network in a next-gen enterprise. View now to learn how to prepare for, embrace, and enjoy the many benefits of a mobile enterprise.
Posted: 17 Jul 2013 | Published: 20 May 2013

TOPICS: 
Aruba Networks

Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER: Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

TOPICS: 
Accellion, Inc.

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

TOPICS: 
OpenTrust

Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013

TOPICS: 
Citrix Systems, Inc.

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

TOPICS: 
DellEMC and Intel®

User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

TOPICS: 
Webroot
1 - 25 of 87 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement