IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Network Security

RSS Feed   
Wireless Network Security Reports
 
Pervasive Protection: Enabling Secure Work from Anywhere
sponsored by Malwarebytes
RESOURCE: The digitally transformed workplace consists of employees that expect to get their work done anywhere. This mix of onsite and remote workers, as well as the explosion of devices and applications they now use, presents a security challenge. In this infographic, find out what security managers need to know to defend against today’s cyberattacks.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Malwarebytes

Cisco Umbrella and Meraki MR – Effective protection for corporate and guest Wi-Fi
sponsored by Cisco Umbrella
DATA SHEET: In this solution brief, take a closer look at the integration of Cisco Umbrella and Meraki MR for simple and effective protection for corporate and guest Wi-Fi. Discover how it works and why you should consider deploying this integration.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Cisco Umbrella

WAFs Should Do More Than Cover the OWASP Top 10
sponsored by Radware
WHITE PAPER: As applications become more prevalent in everyday life, they become increasingly attractive targets for hackers. For organizations, securing applications is paramount to avoiding financial, legal and reputational cost. Read on to uncover 4 key application security challenges organizations face, underlining the importance of strong WAFs.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Radware

Remote Work Considerations: Securing the New Corporate Network
sponsored by EvolveIP
WHITE PAPER: Today’s environments have embraced SaaS offerings, realizing scalability and cost benefits. However, each additional SaaS provider adds another disparate system to the environment, potentially exposing security vulnerabilities. In this white paper, explore key considerations your security team should make when enabling remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

Intelligent Cloud Identity Platform
sponsored by SailPoint Technologies
WHITE PAPER: Digital transformation enables organizations to improve their agility and growth, allowing for increased productivity. However, this change also bring increasingly distributed workforces, which exposes an organization to potential risk. So, what can IT security leaders do to meet this risk? Download this white paper to find out.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

SailPoint Technologies

Top 5 Use Cases for Cisco Umbrella
sponsored by Cisco Umbrella
RESOURCE: The modern workplace has evolved to include remote access and mobile devices, while also introducing a new generation of complex security threats. In this e-book, 5 customers share the unique ways Cisco Umbrella protects their network. Read on to unlock the use cases.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Cisco Umbrella

Endpoint Protection
sponsored by Malwarebytes
WHITE PAPER: Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.
Posted: 17 Jan 2020 | Published: 30 Jun 2019

Malwarebytes

Symantec Website Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

Symantec Corporation

Simplify Network Management with New Secure and Scable Wireless Solutions
sponsored by DellEMC and Intel®
WHITE PAPER: Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.
Posted: 05 Aug 2013 | Published: 31 Jul 2013

DellEMC and Intel®

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info