Deploying first-rate wireless security tools is a worthless endeavor if the enterprise is not diligent in keeping them current. Not updating security in access points and other gear can be worse than ...
Best practices in WLAN security hinge on your specific security needs and the technologies you choose to satisfy those needs. Not long ago, the complaint heard about wireless LAN security was that ...
WPA brings several security improvements to the airwaves. WPA uses Temporal Key Integrity Protocol (TKIP), which replaces WEP's 40-bit static key with a 128-bit dynamically assigned key. That ...
WLAN switches have deposed the intelligent access points of yesteryear. Are they really better? And which WLAN switch is best? Three years ago, when we launched the Advanced Network Computing ...
During the past few weeks, I’ve dedicated a significant amount of time to creating wireless LAN (WLAN) policies and standards. A WLAN site survey I conducted a few weeks ago convinced me to accelerate ...
The National Institute of Standards and Technology, the federal agency responsible for defining security standards and practices for the government, plans to issue new guidelines pertaining to ...
Editor’s note: This column is a follow-up to an earlier article titled: Securing the Air: Recognizing Risk in Wireless. The mobility and productivity benefits of 802.11 wireless LANs don’t have to put ...
In this issue of Industry Insider, ZDNet's David Berlind says just because your company hasn't deployed wireless networks doesn't mean you shouldn't be concerned with at least one form of wireless ...
Establishing a sound policy is the first step to implementing effective wireless network security. Good security starts with understanding your potential areas of vulnerability. As with most emerging ...
Over the past few years, a significant penetration of Voice over IP (VoIP) systems has occurred in both enterprise and residential markets. VoIP enables the convergence of data and voice networks into ...
RFG believes wireless local area network (WLAN) security is on the threshold of providing acceptable security for many enterprise applications, but only if the security requirements for ...