Standards  >   Security Standards  >  

Wireless Encryption Protocol

RSS Feed   
Wireless Encryption Protocol Reports
 
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

High-Velocity Cloud Security at Scale
sponsored by BreakFree Solutions
WHITE PAPER: The key to realizing the full benefits of a cloud migration lies in striking a balance between transformative cloud capabilities and effective cloud security. Read this insight report to learn about BreakFree’s cloud security framework and discover how to implement it with JupiterOne.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

BreakFree Solutions

The Security Implications of Running Software in Containers
sponsored by Red Hat
VIDEO: It’s no surprise that most software development teams prefer the speed, scalability and flexibility of containers. However, it’s critical to consider the security implications of running software in containers. Watch this webinar for a closer look at the security considerations your organization needs to make when it comes to containers.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat

How To Protect Your Business By Limiting Attack Dwell Time
sponsored by Viavi
WHITE PAPER: For security teams, it may be more realistic to assume that successful attacks against your IT resources can and will occur, rather than trying to prevent them altogether. For such an approach to work, you must minimize the dwell time of attacks. Examine this white paper to see how VIAVI’s Observer platform could help you do so.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Viavi

Simplify and Strengthen your Strategy with Intrinsic Security
sponsored by VMware
EBOOK: Organizations are hampered by having to manage too many bolted-on security solutions. Teams are often siloed, so they work with limited context and information on the potential impact of threats. Intrinsic security lets your leverage your existing infrastructure to unify security and IT. Dive into this e-book to see how it works.
Posted: 01 Mar 2021 | Published: 31 Jul 2020

VMware

Unboxing CSPM As The Answer To IaaS Security Risks
sponsored by Horangi
RESOURCE: From lack of controls and misconfiguration to cloud sprawl, there are several cybersecurity risks facing organizations migrating to the cloud. Cloud Security Posture Management (CSPM) tools can help, but it may not be ideal for your organization. Read this article to learn about cloud risks, the benefits of CSPMs and who should use them.
Posted: 03 Feb 2021 | Published: 03 Feb 2021

Horangi

How To Enhance A Data Loss Prevention Strategy Using Argon For Email
sponsored by Clearswift
EGUIDE: Organizations need to secure sensitive data and prevent cyberattacks, while maintaining communication with customers and suppliers. The following guide highlights why email security is a critical part of any data loss prevention (DLP) strategy and offers an inside look at the key features and capabilities of ARgon for Email.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Clearswift

The Journey from EDR to MDR
sponsored by Bitdefender
VIDEO: Managed Detection and Response (MDR) represents the fastest growing sector of cybersecurity and it is very clear that security has now become even more important than ever before. This video provides an overview of Endpoint Detection And Response (EDR), MDR and how to know when it’s time to make the switch to MDR.
Posted: 05 Feb 2021 | Premiered: 27 Nov 2020

Bitdefender

Ciso’s Survival Guide 5 Tips To Make Your Operations More Efficient
sponsored by Cisco
DATA SHEET: Juggling security and business risks is a challenge when you’re facing talent shortage, evolving threats, and a sprawling vendor landscape. This datasheet was written to help CISOs go from overwhelmed to empowered in 5 easy steps – read on to get started.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Cisco

Secure processing of personal data in the healthcare sector; making staff aware of the importance of privacy
sponsored by Zivver
EGUIDE: Data protection and compliance starts with streamlining internal processes, especially in the healthcare sector. This helpful e-guide provides a comprehensive set of the considerations and insights healthcare organizations (of any size) should make in order to create awareness for the secure processing of personal data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Zivver
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences