WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises
sponsored by Global Knowledge

While the TJX story was an extreme case of faulty wireless encryption, questionable data protection practices, and the Russian mafia combining to create a once-in-a-blue-moon theft, the fact is that many WLANs are vulnerable to intrusion. Even if you don't have a couple hundred million credit card numbers to protect, it's still important to choose the correct WLAN authentication method and configure it properly. This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise.

Available Resources from Global Knowledge
See what other users are reading via our Daily Top 50 Report

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement