Standards  >   Security Standards  >  

Wired Equivalent Privacy

RSS Feed   
Wired Equivalent Privacy Reports
 
Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Your Guide to Integrated Risk Management Vendors
sponsored by ServiceNow
RESEARCH CONTENT: In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.
Posted: 30 Jul 2018 | Published: 16 Jul 2018

ServiceNow

Combatting Botnet Traffic with Behavioral Analysis
sponsored by ThreatX
RESOURCE: Find out how to detect and block a number of different distributed attacks with a robust security approach that's designed to grant you visibility into malicious traffic.
Posted: 29 Aug 2018 | Published: 28 Jun 2018

ThreatX

Predictive Intelligence: Pre-Crime for IT
sponsored by Cisco Umbrella
EBOOK: Find out how to take a proactive stance against phishing and advanced malware attacks with a cloud-based security service that identifies and predicts attack infrastructure before bad actors can negatively impact your organization.
Posted: 29 Aug 2018 | Published: 31 Dec 2016

Cisco Umbrella

Endpoint Detection & Response Is Not Enough
sponsored by Arctic Wolf
WHITE PAPER: Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Arctic Wolf

Defending against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: In a world dominated by SSL/TLS encrypted traffic, find out how to overcome various challenges with inbound and outbound traffic inspection so that you can effectively neutralize malware attacks, intelligently route traffic, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESOURCE: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 07 Jun 2017

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement