Standards  >   Security Standards  >  

Wireless Encryption

RSS Feed   
Wireless Encryption Reports
 
Smart Mobile™: Next Generation WLAN Architecture for High-Performance Networks
sponsored by Trapeze Networks
WHITE PAPER: This white paper details the different approaches to wireless LAN (WLAN) architectures, planning for applications such as VoWLAN, preparing for 802.11n and recommending strategies for future wireless deployments.
Posted: 11 Jul 2007 | Published: 01 Jul 2007

Trapeze Networks

Updating Legacy Protection Measures against Encrypted Attacks
sponsored by Radware
CASE STUDY: Find out how to enable cybersecurity that scales on-demand to combat against advanced DDoS and SSL encrypted attacks.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

Radware

Cutting BitLocker Complexity and Helpdesk Headaches
sponsored by WinMagic
WHITE PAPER: Find out how you can streamline BitLocker deployments and cut helpdesk time spent on security tasks like password resets by as much as 75% with tools like the SecureDoc Enterprise Server (SES).
Posted: 10 Aug 2018 | Published: 10 Aug 2018

WinMagic

Leveraging the Benefits of Cloud Web Application Security
sponsored by Oracle Dyn
RESOURCE CENTER: This custom article examines the recent advances in web app security and explores how you can leverage cloud-based technologies to mitigate the risk to your company's critical assets.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

Deconstructing a Modern Bank Heist: the [not] Carbanak Source Code Leak
sponsored by Illusive Networks
RESOURCE: In August 2018, part of the source code leaked for Buhtrap/Ratopak/Pegasus malware threats – creating a rare opportunity to see how these attacks work and are executed by bad actors. This resource analyzes the leaked source code and takes a look at how it sneaks through network defenses.
Posted: 12 Sep 2018 | Published: 03 Aug 2018

Illusive Networks

3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

OneLogin

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESEARCH CONTENT: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 30 Jun 2017

IBM

Protect yourself from antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Legacy antivirus (AV) software often fails to prevent security breaches across endpoints – it simply wasn't designed with today's advanced threats in mind. This white paper explores the costs of operating a legacy antivirus system and details 5 security requirements that any AV replacement technology must meet.
Posted: 29 May 2018 | Published: 31 Dec 2017

Palo Alto Networks

Weightmans Reduces Security Noise while Strengthening Defenses
sponsored by MASERGY
CASE STUDY: Find out how the network security team at Weightmans LLP enabled 24/7 monitoring, took a proactive stance on threat detection, and simplified compliance.
Posted: 01 Jun 2018 | Published: 01 Jun 2018

MASERGY

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESOURCE: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 07 Jun 2017

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement