Features

Features

Wireless network security

  • Rogue AP containment methods

    Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these ...  Continue Reading

  • How to monitor WLAN performance with WIPS

    "Wireless intrusion prevention" -- the very name brings to mind security. But many WIPS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to...  Continue Reading

  • The role of VPN in an enterprise wireless network

    Given improvements in Wi-Fi security, does VPN still have a role to play in enterprise wireless? What are the practical benefits and limitations of using VPN over wireless? This tip discusses where to make best use of VPNs and how to smooth over ...  Continue Reading

  • Wireless AP placement basics

    Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security perspective, WLANs should be treated like the Internet...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close