More advanced products are available for larger enterprises where key management issues make straight WPA impractical....
For example, 802.1x technology allows administrators to require individual user authentication against a centralized authentication service, such as Active Directory. Such a mechanism facilitates the management of authorization privileges. Devices that don't support 802.1x may use "captive portal" mechanisms -- similar to those found in hotels -- to manage authentication through a Web-based interface.
Dig Deeper on Handheld and Mobile Device Security Best Practices
Related Q&A from Mike Chapple, Enterprise Compliance
The HHS security risk assessment tool is designed to help healthcare providers meet the HIPAA security requirement. Expert Mike Chapple explains how ...continue reading
PCI DSS requirement 6.6 demands application security compliance through one of two options: an application firewall or a code review. Expert Mike ...continue reading
Are HIPAA-compliant hosting services a better option for compliance than a secure storage API? Expert Mike Chapple analyzes.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.