Standards  >   Security Standards  >  

Wireless Encryption

RSS Feed   
Wireless Encryption Reports
Smart Mobile™: Next Generation WLAN Architecture for High-Performance Networks
sponsored by Trapeze Networks
WHITE PAPER: This white paper details the different approaches to wireless LAN (WLAN) architectures, planning for applications such as VoWLAN, preparing for 802.11n and recommending strategies for future wireless deployments.
Posted: 11 Jul 2007 | Published: 01 Jul 2007

Trapeze Networks

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

End the Struggle with InfoSec Policies and Standards through Risk & Compliance Integration
sponsored by Edgile
WHITE PAPER: Information security policies and standards can oftentimes cause confusion and even liability within an organization. This resource details 4 pitfalls of a compliance-only approach and offers a secure method to complying with policies and standards through a risk-integrated approach.
Posted: 25 Jan 2018 | Published: 25 Jan 2018


5 strategies for modernizing security policy
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of proactive security policies, evolving compliance needs, and expanding corporate infrastructure have all made traditional security policies ineffective. Inside, discover 5 strategies for upgrading your existing policies to remediate these threats, and help make your decision makers confident in your cybersecurity again.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Fortinet, Inc.

Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY: In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015


Extending DLP to the Cloud
sponsored by InteliSecure
WHITE PAPER: Uncover how your organization can protect its data on the cloud through the use of data loss prevention (DLP).
Posted: 24 May 2017 | Published: 24 May 2017


Develop Your Information Security Management System
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
RESEARCH CONTENT: This Forrester Research report explores how to use an information security management system (ISMS) to improve risk management and strengthen security processes. Find out how to derive daily value from an ISMS, increase customer data protection, leverage KPIs and threat intelligence, and more.
Posted: 01 Jun 2017 | Published: 19 Jan 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

Application Development Security Requires Forethought
sponsored by Veracode, Inc.
EGUIDE: Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017


SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement