ComputerWeekly.com Research Library

Powered by Bitpipe.com

Wireless Security Research

  • The development of wired and wireless LANs in a hybrid work model

    Sponsored by: TechTarget ComputerWeekly.com

    Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).

  • Mobile Payments Using Host Card Emulation with NFC

    Sponsored by: TechTarget ComputerWeekly.com

    In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.

  • How Can You Avoid a Web Security Breach? It's All in the Preparation

    Sponsored by: TechTarget Security

    In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.

  • What secure email gateways can do for your enterprise

    Sponsored by: TechTarget Security

    It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.

  • Why EDR Technologies are Essential for Endpoint Protection

    Sponsored by: TechTarget Security

    While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.

  • Malware Hitching a Ride on Mobile Apps?

    Sponsored by: TechTarget Security

    The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.

  • Mastering the Top Enterprise Mobility Challenges

    Sponsored by: Microsoft

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

  • It's time to tackle IoT security

    Sponsored by: RUCKUS Networks

    The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.

  • Securing Your Network in the Wireless Age

    Sponsored by: Aruba Networks

    In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.

  • Secure Your Internal Corporate Networks With ABAC

    Sponsored by: Cryptzone

    In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.

  • Protecting Data on the Go

    Sponsored by: TechTarget Security

    This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.

  • Information Security Magazine: August Issue

    Sponsored by: TechTarget Security

    Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.

  • The Transformation of Wireless Network Security

    Sponsored by: TechTarget Security

    This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.

  • Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD

    Sponsored by: TechTarget Security

    Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.

  • Network Protection and UTM Buyer's Guide

    Sponsored by: Sophos

    This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.

  • How to Handle Mobile Devices' Impact on the Network

    Sponsored by: TechTarget Networking

    The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months.

  • BYOD File Sharing – Go Private Cloud to Mitigate Data Risks

    Sponsored by: Accellion, Inc.

    Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.

  • IM Wireless Network Assessment

    Sponsored by: Ingram Micro

    The need to protect your data and organization is now even more critical than before. Take a look at this brief white paper to learn how one company can help you secure your business.

  • Explaining How Trusted SSL Certificates and Forged SSL Certificates Work

    Sponsored by: Symantec Corporation

    Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.

  • Why Switch to Thawte?

    Sponsored by: Thawte Inc.

    This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.

  • Antivirus Evaluation Guide

    Sponsored by: Threat Track Security

    In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.

  • Protecting Your Website With Always On SSL

    Sponsored by: Symantec Corporation

    This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.

  • PBS Engineering and Environmental Bolsters Virtualized Environment with Disaster Recovery Efforts and Cuts 40 Percent in Energy Costs

    Sponsored by: Dell and VMware

    Learn how one firm improved diaster recovery efforts with virtualization and cut energy costs by 40%.

  • Symantec Website Security Threat Report

    Sponsored by: Symantec Corporation

    This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.

  • Reducing Security Complexity

    Sponsored by: Optus Business

    In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.