IT Management  >   Systems Operations  >   Security  >   Network Security  >  

WLAN Security

RSS Feed   
WLAN Security Reports
 
DNS Security with Meraki MR & Umbrella
sponsored by Cisco Meraki - APAC
WHITE PAPER: This white paper explores how to update DNS security so that you can address the potential attacks from malicious actors hiding in the bevy of DNS traffic. Find out what steps you can take to improve your security posture, and learn about the integration of Cisco Umbrella and Meraki's wireless access points.
Posted: 12 Dec 2018 | Published: 30 Sep 2018

Cisco Meraki - APAC

The Business Case for MobileIron Threat Defense
sponsored by MobileIron
RESOURCE: Uncover some of the best practices that other organizations, like yours, have used to implement a layered security strategy, to improve their mobile security.
Posted: 03 Oct 2018 | Published: 03 Oct 2018

MobileIron

The Criminal Justice Information Services (CJIS) Compliance for Mobile Devices
sponsored by MobileIron
RESOURCE: The FBI's Criminal Justice Information Services (CJIS) Security Policy defines security requirements for the entire industry. Download this resource to learn how your organization's mobile device management policy can comply with CJIS standards.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

MobileIron

SDN Can Help Unify Wired and Wireless Campus Networks
sponsored by Brocade
EGUIDE: In this expert e-guide, learn how SDN controllers can give your Wi-Fi and Ethernet switch-based campus networks the support they need for a successful unification.
Posted: 01 Feb 2017 | Published: 31 Jan 2017

Brocade

Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You
sponsored by Insight
WHITE PAPER: Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more.
Posted: 06 May 2013 | Published: 06 May 2013

Insight

Predictive Mobile Threat Defense
sponsored by Symantec
WHITE PAPER: Explore the next-generation mobile security technologies and threat defense strategies that leverage pervasive analytics to predictively identify threats and proactively stop attacks without disrupting users' mobile productivity.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Symantec

How to Handle Mobile Devices' Impact on the Network
sponsored by SearchNetworking.com
EBOOK: The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

SearchNetworking.com

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Hot Tips for Securing Your Wireless Network
sponsored by Sophos
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos

Why Wi-Fi Quality is so Important to the End-user
sponsored by Extreme Networks
WHITE PAPER: This exclusive whitepaper offers an in-depth look at Wi-Fi's history, and where it's headed in the future. Read on to learn more.
Posted: 28 Oct 2014 | Published: 28 Oct 2014

Extreme Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement