Feature

Controlling the Uncontrollable

Ezine

This article can also be found in the Premium Editorial Download "Information Security magazine: Top forensics tools for tracking down cybercriminals."

Download it now to read this article plus other related content.

Security managers must feel like they're living in the Wild West. Weak encryption standards and uncontrolled Wi-Fi devices turn enterprises into lawless frontiers. But that's finally changing, as new security protocols arm managers with the weapons to restore law and order.

"Good hardware, excellent vendor support and proper policy--as long as you stick with it--will help minimize security risks," says Arek Alszko, IT manager for The Mad Science Group, a Canadian-based children's educational science entertainment franchise.

Alszko waited until he felt WLAN security protocols and products were ready for prime time; the dynamic key encryption and mutual authentication provided by Wi-Fi Protected Access (WPA) convinced him that wireless security was finally strong enough to meet his company's requirements.

Stronger security comes none too soon, as business imperatives for wireless deployment slams head-on into security issues, such as flawed encryption, unauthorized access and signal interruption.

"Wireless security products are finally catching up to the issues that prevented their use in security-sensitive businesses," says Rick Beaupre, director of technology at Massachusetts-based Mortgage Financial, "but there is more to wireless security than a piece of software or an appliance." To secure their WLANs, managers are using a layered approach, including strong encryption for authentication, tighter access control and IDS/IPS tools. Tough policy enforcement

    Requires Free Membership to View

and configuration management round out a comprehensive WLAN security strategy.

This was first published in December 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: