For some time now, there's been no question in my mind that the best route to establishing a secure wireless LAN goes through an AAA server. Also known as a remote authentication dial in user service ...
PALM DESERT, Calif. — Corporate IT managers continue to grapple with wireless LAN security issues, including the battle against the installation of unauthorized WLAN access points by employees who are ...
Best practices in WLAN security hinge on your specific security needs and the technologies you choose to satisfy those needs. Not long ago, the complaint heard about wireless LAN security was that ...
Let me start off by saying that there is absolutely no way achieve total security in a WLAN. By deploying a WLAN in a network, you are increasing your security risks over a purely wired network.
The metamorphosis of the wireless LAN switch companies will soon leave enterprises wondering from whom they should procure some of their primary networking capabilities. It has long been challenging ...
WPA brings several security improvements to the airwaves. WPA uses Temporal Key Integrity Protocol (TKIP), which replaces WEP's 40-bit static key with a 128-bit dynamically assigned key. That ...
Over the past few years, a significant penetration of Voice over IP (VoIP) systems has occurred in both enterprise and residential markets. VoIP enables the convergence of data and voice networks into ...
It turns out that not all WLAN switch vendors see their devices as both wired and wireless security aggregates. Trapeze allowed for full 802.1x wire-speed functionality, but Aruba designates its ...
Highwall Technologies said it is shipping its Rogue Detection System 2.0, which it claimed in a statement makes it easier for network managers to detect and locate rogue devices. The company said that ...
During the past few weeks, I’ve dedicated a significant amount of time to creating wireless LAN (WLAN) policies and standards. A WLAN site survey I conducted a few weeks ago convinced me to accelerate ...
Recent global events have emphasized the need for adequate security—both in the real world and in cyberspace. Hacking into a wireless 802.11b network is often easy. In fact, it's too easy. So how do ...