AES

AES News

AES Get Started

Bring yourself up to speed with our introductory content

Evaluate AES Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage AES

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve AES Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • The transformation of wireless network security

    Wi-Fi has revolutionized the enterprise by not only extending network coverage in a particular building or campus, but also by enabling on-the-go working, be it from a coffee shop or a hotel room. Yet, while these improvements reduce employee downtime and increase efficiency, Wi-Fi has had a significant impact on network security; many security measures of yesteryear are simply ineffective today.

    Whether your enterprise has already adopted Wi-Fi or is evaluating the technology, there are several considerations to keep in mind.

    In this Technical Guide, wireless security expert Lisa Phifer examines the rise in Wi-Fi popularity and explains why going beyond the basics is essential to Wi-Fi security. Then, Phifer outlines tools that can help enterprises overcome the difficult task of provisioning WLAN access to the plethora of mobile devices and platforms infiltrating the enterprise that require corporate network access. Finally, expert Brad Casey discusses the effects 802.11ac, commonly referred to as Gigabit Wi-Fi, will have on enterprise wireless network security.

    As the corporate environment grows more disparate and globally divided, it will become more critical than ever to use Wi-Fi to maintain connectivity, productivity and profitability. However, without the proper security measures in place, enterprises risk falling victim to wireless intruders, having sensitive data stolen and more.

    This Technical Guide offers the expertise you need to integrate Wi-Fi security into your enterprise's overarching network security strategy and maintain security in the age of wireless connectivity. Continue Reading

  • Gigabit Wi-Fi security: Is the new 802.11ac standard worth an upgrade?

    Will Gigabit Wi-Fi significantly alter network security, or will it mean business as usual? Expert Brad Casey discusses the new 802.11ac standard. Continue Reading

  • Symmetric key encryption algorithms and hash function cryptography united

    Can a secure symmetric key encryption algorithm be used in hash function cryptography? Learn more about these data encryption techniques. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close