Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2006

Unplugged

Even if you don't have an unauthorized WLAN, you need protection now that your users are... There are two kinds of wireless networks: those you know about and those you don't. Wireless adapters have become commodities, embedded in every laptop moving in and out of your organization. Whether you are trying to enforce strict no-wireless policies or protecting your growing wireless infrastructure as an essential part of your business, you can't afford to allow unsecured Wi-Fi connections on your network. Wireless security products have rapidly evolved and matured to meet the rigorous security demands of the enterprise. When wireless IDSes/IPSes first hit the market, they were little more than RF scanners designed to identify 802.11 traffic within close proximity to their sensors. Now, they are overlay solutions integrated into existing WLAN infrastructure and mobile or hand-held devices. They sport a multitude of rich features such as compliance reporting and site assessment for sensor placement, in addition to accurately detecting...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Secure from the Start

    SOFTWARE DEVELOPMENT Get off on the right foot by working with your developers to ingrain security in the coding process.

  • Unplugged

    PRODUCT REVIEW Even if you don't have an unauthorized WLAN, you need protection.

  • Integrated Security

    Symantec's Gateway Security 5600 series

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close