Standards  >   Security Standards  >  

Wired Equivalent Privacy

RSS Feed   
Wired Equivalent Privacy Reports
 
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Case Study: Ledn
sponsored by Clearedin
CASE STUDY: In this case study, discover how Ledn, a cryptocurrency company, was able to achieve better email security and industry-specific compliance requirements through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Clearedin

Customer Attitudes to Digital Identity
sponsored by Onfido
WHITE PAPER: Digital identity is often discussed in the context of the benefits it provides the organization – but what about its impact on the customer? This report provides a closer look at the importance of digital identity for customer relationships, general perception and current solutions that may be worth your consideration – read on to get started.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Onfido

Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE: As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020

Atakama

ESG White Paper Reimagining Endpoint Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: New cyberthreats, cloud migrations, digital transformations, and the rise of the remote workforce has had a profound impact on the endpoint security landscape. The following ESG article from Cisco dives deeper into these changes and provides an overview of Cisco’s modern endpoint security platform – read on to get started.
Posted: 09 Dec 2020 | Published: 30 Jun 2020

Cisco Systems, Inc.

ClearedIn for Slack
sponsored by Clearedin
PRODUCT OVERVIEW: The shift towards remote work has led to a rise in the use of cloud collaboration tools, like Slack. This solution brief highlights how ClearedIn can enhance security and compliance capabilities to keep your Slack users safe and productive – read on to get started.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

Smarter Data Protection with Machine Learning
sponsored by HelpSystems
WHITE PAPER: As data grows in its volume and value, organizations should ensure their data privacy capabilities are poised to address today’s cyberthreats and compliance requirements. Read this white paper and discover how machine learning and artificial intelligence can enhance data security programs.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

HelpSystems

A Next-Generation Approach to KYC
sponsored by Socure
WHITE PAPER: While KYC has become an essential practice in the fight against financial crime, programs can often be burdensome and resource intensive. This whitepaper highlights 3 essential elements required for a safe, seamless and successful KYC program – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure

Identity and Access Management: Good for Cybersecurity, Not So Much for Information Security
sponsored by Atakama
RESOURCE: The objectives and applications of cybersecurity and information security are inherently different. While there is significant overlap, tools like identity and access management (IAM) tend to favor cybersecurity while putting information security at greater risk. Read this article to learn more about IAM and the cybersecurity-infosec disparity.
Posted: 11 Dec 2020 | Published: 11 May 2020

Atakama

2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT: Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info