Best Practices For Securing Your WLAN
by Airmagnet - Thursday, 22 July 2004.
The steady growth of Wi-Fi in the enterprise demands that corporate IT teams learn and adopt new security methodologies tailored to the unique requirements and weaknesses of wireless networks. Network and security staff must first evaluate a potentially confusing set of authentication and encryption mechanisms to be used in the network. Depending on the security selected, IT will then need to establish and document the corporate WLAN security policy, including mechanisms to validate user compliance and monitor for inherent network vulnerabilities. With a defined policy in place, IT staff can turn their attentions to protecting the network from snooping and an ever-expanding list of wireless attacks.

In this paper, we will address each of these areas in detail and identify the real-world best practices needed to deploy and maintain a secure wireless network.

Download the paper in PDF format here.

Spotlight

Behavioral analysis and information security

Posted on 22 September 2014.  |  In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security and how behavioral analysis can influence the evolution of security technologies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //