Standards  >   Security Standards  >  

Wireless Encryption

RSS Feed   
Wireless Encryption Reports
 
Smart Mobile™: Next Generation WLAN Architecture for High-Performance Networks
sponsored by Trapeze Networks
WHITE PAPER: This white paper details the different approaches to wireless LAN (WLAN) architectures, planning for applications such as VoWLAN, preparing for 802.11n and recommending strategies for future wireless deployments.
Posted: 11 Jul 2007 | Published: 01 Jul 2007

Trapeze Networks

Think beyond the traditional approach to security
sponsored by Cylance
VIDEO: Always being a step behind the hackers is a losing battle – it's time to think beyond the traditional approach of security and consider a new prevention strategy.
Posted: 07 Jun 2018 | Premiered: 30 Jan 2018

Cylance

Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs
sponsored by InteliSecure
WHITE PAPER: In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

InteliSecure

Deploy Silent Security to Protect Identities and future-proof your IAM
sponsored by IBM
WHITE PAPER: Find out how you can deploy silent, nonintrusive identity and access management (IAM) that can weed out the bad actors without hindering employee productivity.
Posted: 24 Jul 2018 | Published: 30 Nov 2017

IBM

3 Microsegmentation Challenges Facing NetOps and SecOps
sponsored by Plixer
RESOURCE: Learn about 3 key microsegmentation challenges and find out how organizations can further improve their network's defense with cooperation and open communication across their app/virtualization, NetOps, and SecOps teams.
Posted: 01 Jun 2018 | Published: 29 Mar 2018


CW ASEAN - March 2018: Time to dial up defences
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

ComputerWeekly.com

The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

The City of Frankfurt Enables Work from Home with Two-Factor Authentication
sponsored by One Identity
CASE STUDY: Find out how the City of Frankfurt created a better work-life balance for its employees by enabling secure work from home with effective, user-friendly two-factor authentication.
Posted: 12 Feb 2018 | Published: 31 Dec 2015

One Identity

Beyond Device Recognition
sponsored by iovation, Inc.
VIDEO: Find out how to strike the balance between cybersecurity and user accessibility for devices on-the-go with advanced device intelligence that uses device behavior, content, and reputation to stop fraud in its tracks.
Posted: 18 Jun 2018 | Premiered: 18 Jun 2018

iovation, Inc.

What are the Business Value and IT Impact of Visibility and Control?
sponsored by ForeScout Technologies, Inc.
RESEARCH CONTENT: As the number of devices connecting to your network continues to grow, so does your attack surface. In this IDC research report, learn about the business value of pervasive device and network visibility.
Posted: 17 May 2018 | Published: 31 Dec 2016

ForeScout Technologies, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement