This article can also be found in the Premium Editorial Download "Information Security magazine: Captive to SOX compliance? A compliance guide for managers."

Download it now to read this article plus other related content.

Even if you don't have an unauthorized WLAN, you need protection now that your users are...

There are two kinds of wireless networks: those you know about and those you don't. Wireless adapters have become commodities, embedded in every laptop moving in and out of your organization. Whether you are trying to enforce strict no-wireless policies or protecting your growing wireless infrastructure as an essential part of your business, you can't afford to allow unsecured Wi-Fi connections on your network.

Wireless security products have rapidly evolved and matured to meet the rigorous security demands of the enterprise. When wireless IDSes/IPSes first hit the market, they were little more than RF scanners designed to identify 802.11 traffic within close proximity to their sensors. Now, they are overlay solutions integrated into existing WLAN infrastructure and mobile or hand-held devices. They sport a multitude of rich features such as compliance reporting and site assessment for sensor placement, in addition to accurately detecting and blocking numerous wireless attacks.

    Requires Free Membership to View

Making the Grade
Click here for the evaluation results. (PDF).
In this review, Information Security evaluates four stand-alone wireless IDS/IPS products in the lab and in a live testing environment. These products are AirDefense Enterprise 7.0 from AirDefense; AirMagnet Enterprise 6.5 from AirMagnet; AirTight Networks' SpectraGuard Enterprise 4.0; and Network Chemistry's RFprotect 5.0.

We then graded each product based on its ability to identify and thwart common wireless attacks, as well as its features, such as policy enforcement, tracking and blocking, response automation, reporting, installation and ease-of-use (see "Making the Grade" PDF).

This was first published in March 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: