IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wi-Fi Security

RSS Feed   
Wi-Fi Security Reports
 
Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps
sponsored by Arxan
ANALYST REPORT: This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research report, explore key takeaways from the study which can be used as a guide to help you secure your mobile applications.
Posted: 24 Jul 2019 | Published: 30 Apr 2019

Arxan

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Citrix

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Citrix

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Webroot

Network Security Technologies Technical Guide
sponsored by SearchSecurity.com
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

SearchSecurity.com

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.
Posted: 17 Apr 2013 | Published: 31 Dec 2012

AirTight Networks, Inc.

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by DellEMC and IntelĀ®
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

DellEMC and IntelĀ®
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement