This resource is no longer available

Who goes there: Securing wireless access

Cover

Wireless encryption is essential, but addresses only part of the security problem. Security measures are also needed to permit or deny WLAN access, authenticate stations and users, and determine the destinations and applications that each is authorized to reach.

This webcast describes readily-available alternatives, from MAC ACLs and captive portals to Preshared Secret Keys and 802.1X Port Access Control By understanding the pros/cons and target environments of each alternative, you can choose the best method to control, authenticate and authorize access to your own WLAN.

Speaker

Lisa Phifer President, Core Competence Inc.

Session 3: Diverse Mobile Platforms, Complicated Security

Session 4: Safeguarding Mobile Applications

Lisa Phifer has been involved in the design, implementation, and evaluation of networking, security, and management products for over 25 years. Since joining Core Competence in 1995, she has advised companies large and small regarding security needs, product assessment, and the use of emerging technologies and best practices. Lisa teaches about wireless LANs and mobile device security and management, and has written extensively for numerous publications, such as enterpriseNetworkingPlanet, Information Security Magazine, SearchMobileComputing, SearchSecurity, and more.

Vendor:
Nokia
Posted:
06 Apr 2006
Premiered:
Apr 13, 2006, 09:00 EDT (13:00 GMT)
Format:
Audio
Type:
Podcast
Language:
English

This resource is no longer available.