Wireless LAN Design and Setup

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Rogue AP containment methods

    Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these contai... 

  • Wireless AP placement basics

    Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security perspective, WLANs should be treated like the Internet ... 

  • The role of VPN in an enterprise wireless network

    Given improvements in Wi-Fi security, does VPN still have a role to play in enterprise wireless? What are the practical benefits and limitations of using VPN over wireless? This tip discusses where to make best use of VPNs and how to smooth over conf... 

  • Wireless Security Lunchtime Learning with Lisa Phifer

    It's official: Wireless networks have infiltrated corporations around the globe. But the question is: What security measures need to be put in place to prevent malware from infiltrating those wireless networks? The Wireless Lunchtime Learning Securit... 

  • A wireless network vulnerability assessment checklist

    Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. 

  • An introduction to wireless security

    Don't let Wi-Fi become the weak link in your network's armor! Learn the business risks posed by wireless, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure WLANs. 

  • Lesson 1: How to counter wireless threats and vulnerabilities

    How secure is your enterprise wireless network? What wireless threats lurk unseen through your company's halls? In Lesson 1 of SearchSecurity.com's Wireless Lunchtime Learning security school, check out a list of wireless network attacks, a wireless ... 

  • 802.1X Port Access Control: Which version is best for you?

    Which of the nearly 50 defined EAP Types would work best in your WLAN? In this tip, we compare the most popular EAP Types used with 802.1X, authentication methods that can be supported by each, known vulnerabilities and suitable usage environments. 

  • Lesson 2 quiz: From the ground up

    Find out how much you learned in Lesson 2 of Wireless Security Lunchtime Learning. 

  • Lesson 3 quiz: Who goes there?

    Put your new knowledge of wireless access to the test.