Wireless networks are a favorite target of malicious hackers, making wireless intrusion prevention systems (WIPS) an essential element of every enterprise’s network security strategy.
In this mini learning guide, which is a part of the SearchSecurity.com IDS/IPS Security Guide, security managers and staff will learn more about wireless intrusion detection systems and WLAN security, including how to use a WIPS to monitor wireless traffic to prevent attacks and detect malicious access, as well as best practices on setting up and managing a WIPS.
Table of contents:
Wireless LAN Intrusion Prevention Systems can monitor wireless traffic. While overlay WIPS use dedicated wireless integrated network sensors to do this, embedded WIPS use whichever wireless access point is open on the network.
This tip, which is a part of the SearchSecurity.com Wireless Lunchtime Learning Security School, compares wireless network intrusion prevention systems and explains how an enterprise can choose between them
A wireless local area network (WLAN) switch, which can manage hundreds of access points, can be useful when setting up an enterprise wireless network.
In this video, Joel Snyder reviews WLAN switch technology and explains why wireless intrusion detection systems and firewalls need to be carefully added to ensure "defense-in-depth" is incorporate into a baseline network configuration.
Unfortunately, WLANs remain vulnerable to denial-of-service (DoS) attacks. While enterprises may not be able to prevent DoS attacks, a wireless IDS can help detect when DoS attacks occur and where they came from.
This tip, which is a part of the SearchSecurity.com Wireless Lunchtime Learning Security School, offers practical advice on how to recognize, respond to and prevent DoS attacks launched against your WLAN.
The security benefits of using a WIPS are obvious, but WIPS products can also be used to monitor WLAN performance, which can offer valuable insight to security staff for troubleshooting, service assurance, fine-tuning and usage planning.
This tip, which is a part of the SearchSecurity.com Wireless Lunchtime Learning Security School, Lisa Phifer explains how a WLAN and WIPS can work together to monitor and analyze WLAN performance and wireless Internet traffic samples.
Different from a typical enterprise wireless network, a wireless guest network has its own security threats and therefore should be monitored and managed differently.
In this expert response, Mike Chapple explains the differences between an enterprise network and a guest network and discusses why detecting mobile devices on a wireless guest network involves the use of captive portal software.
Security managers often rely on WLAN security tools to monitor wireless networks and keep their enterprise secure.
This tip reviews the features and capabilities of a variety of the vulnerability assessment, traffic monitoring and network discovery tools on the market today and explains how enterprise network and security managers can use these tools to keep their networks secure.