• June 26, 2009 26 Jun'09

    802.1X Port Access Control: Which version is best for you?

    Which of the nearly 50 defined EAP Types would work best in your WLAN? In this tip, we compare the most popular EAP Types used with 802.1X, authentication methods that can be supported by each, known vulnerabilities and suitable usage environments.  Continue Reading

  • June 26, 2009 26 Jun'09

    How to compartmentalize WiFi traffic with a VLAN

    Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag ...  Continue Reading

  • June 26, 2009 26 Jun'09

    Risky Business: Understanding WiFi threats

    Interested in taking your enterprise wireless, or securing the wireless network you already have? Look no further. In this first of a four-part video series, Lisa Phifer of Core Competence explains WiFi threats, including some common attacks.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close