A wireless network in your business gives your team the convenience of being able to use their mobile devices or computers from anywhere in your building. Unfortunately, without the proper security, ...
Deploying first-rate wireless security tools is a worthless endeavor if the enterprise is not diligent in keeping them current. Not updating security in access points and other gear can be worse than ...
Many IT managers have heard the news that there are people out there who live to spam corporate networks, send malicious viruses, and take over enterprise Web sites. We don't have to live in fear and ...
802.11b security is the buzz in the industry right now. The way some describe it, you'd think "802.11b" and "security" are mutually exclusive. Integrated Solutions, September 2002 Written by: Chuck ...
For some time now, there's been no question in my mind that the best route to establishing a secure wireless LAN goes through an AAA server. Also known as a remote authentication dial in user service ...
WPA brings several security improvements to the airwaves. WPA uses Temporal Key Integrity Protocol (TKIP), which replaces WEP's 40-bit static key with a 128-bit dynamically assigned key. That ...
The National Institute of Standards and Technology, the federal agency responsible for defining security standards and practices for the government, plans to issue new guidelines pertaining to ...
Despite the ratification of key wireless standards, the actual use of stronger security mechanisms in current WLAN deployments is low, reports In-Stat. That may soon change, however, as many companies ...
As expected, Cisco Systems Inc. has beefed up security for its wireless LAN product line to help prevent hackers from hijacking a user’s identity during an authentication session. Cisco today will ...
Best practices in WLAN security hinge on your specific security needs and the technologies you choose to satisfy those needs. Not long ago, the complaint heard about wireless LAN security was that ...
Today, wireless architecture has evolved to fit better with enterprise network management. The WLAN switch takes the burden of security off tiny, sweating CPUs in access points and places it squarely ...
Editor’s note: This column is a follow-up to an earlier article titled: Securing the Air: Recognizing Risk in Wireless. The mobility and productivity benefits of 802.11 wireless LANs don’t have to put ...