This resource is no longer available
There are two kinds of wireless networks: those you know about and those you don't. Wireless adapters have become commodities, embedded in every laptop moving in and out of your organization. Whether you are trying to enforce strict no-wireless policies or protecting your growing wireless infrastructure as an essential part of your business, you can't afford to allow unsecured Wi-Fi connections on your network.
Wireless security products have rapidly evolved and matured to meet the rigorous security demands of the enterprise. When wireless IDSes/IPSes first hit the market, they were little more than RF scanners designed to identify 802.11 traffic within close proximity to their sensors. Now, they are overlay solutions integrated into existing WLAN infrastructure and mobile or hand-held devices. They sport a multitude of rich features such as compliance reporting and site assessment for sensor placement, in addition to accurately detecting and blocking numerous wireless attacks.
Sandra Kay Miller
Contributor, Information Security Magazine
Sandra Kay Miller is a technical editor for Information Security magazine with fifteen years of experience in developing and deploying leading edge technologies throughout the petroleum, manufacturing, luxury resort and software industries, and a decade as an independent information security technology analyst.
- Information Security Magazine
- 03 Oct 2006
- 01 Mar 2006
- 6 Page(s)
- Journal Article