Access "Unplugged"
This article is part of the March 2006 issue of Captive to SOX compliance? A compliance guide for managers
Even if you don't have an unauthorized WLAN, you need protection now that your users are... There are two kinds of wireless networks: those you know about and those you don't. Wireless adapters have become commodities, embedded in every laptop moving in and out of your organization. Whether you are trying to enforce strict no-wireless policies or protecting your growing wireless infrastructure as an essential part of your business, you can't afford to allow unsecured Wi-Fi connections on your network. Wireless security products have rapidly evolved and matured to meet the rigorous security demands of the enterprise. When wireless IDSes/IPSes first hit the market, they were little more than RF scanners designed to identify 802.11 traffic within close proximity to their sensors. Now, they are overlay solutions integrated into existing WLAN infrastructure and mobile or hand-held devices. They sport a multitude of rich features such as compliance reporting and site assessment for sensor placement, in addition to accurately detecting and blocking numerous ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Compliance Guide for Managers
SPECIAL How to influence the C-suite, save your company money, please auditors and secure your data.
-
Recent Releases: Security product briefs, March 2006
Read about the security products that launched in March 2006.
-
Portable device security: Centennial Software's DeviceWall 3.1
Read a security product review of Centennial Software's DeviceWall 3.1.
-
Secure from the Start
SOFTWARE DEVELOPMENT Get off on the right foot by working with your developers to ingrain security in the coding process.
-
Integrated Security
Symantec's Gateway Security 5600 series
-
Compliance Guide for Managers
-
-
Recent Releases: Security product briefs, March 2006
Read about the security products that launched in March 2006.
-
Hot Pick: NFR Security's Sentivist 5.0
NFR Security's Sentivist 5.0
-
Google Hacking: Why being a Google dork is hurting your company
Are you a Google dork? A simple Google search engine query can expose corporate security secrets and private information. Black hats are aware of it. Are you? Learn how to prevent and defend against Google hacking.
-
Unplugged
PRODUCT REVIEW Even if you don't have an unauthorized WLAN, you need protection.
-
Recent Releases: Security product briefs, March 2006
-
Columns
-
Editor's Desk: The case for application-layer security
C++ - Security = 0
-
Layer 8: Military, defense sectors offer little security leadership
Military Madness
-
Prespectives
No Guarantee
-
Ping: William Pelgrin
William Pelgrin
-
Editor's Desk: The case for application-layer security
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO