WLAN Security News
September 09, 2014
AirTight's latest 802.11ac access point delivers gigabit speeds to users, with wireless intrusion prevention services to IT.
July 17, 2014
Apple iOS 8 will add a MAC address spoofing feature to iPhones and iPads for wireless privacy. It could interfere with Wi-Fi location-based services used by many consumer-facing businesses.
June 10, 2014
Juniper, Aruba announced a partnership to converge their respective wired and wireless LAN technology for simplified network management.
April 04, 2014
Enterprise IT teams must address security pitfalls, assign BYOD policies for personal devices in the workplace, says vendor panel at Interop 2014.
WLAN Security Get Started
Bring yourself up to speed with our introductory content
The growth of bring your own applications means IT has to find new ways to reassert control over software introduced into the workplace. Continue Reading
A dead zone (Wi-Fi dead zone) is an area within a wireless LAN location where Wi-Fi does not function, typically due to radio interference or range issues. Because Wi-Fi is a radio signal the same things that disrupt radio tend to affect Wi-Fi. ... Continue Reading
Hotspot 2.0 and the IEEE 802.11u protocol could allow mobile device users to securely roam between Wi-Fi and cellular networks without stopping to authenticate. Continue Reading
Evaluate WLAN Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Aerohive adds the ability to manage mobile devices to its Wi-Fi management platform, combining mobile device management and network management. Continue Reading
Analysts discuss data center, cloud encryption and Wi-Fi trends that can be expected in 2014. Continue Reading
Security expert Michele Chubirka shares low-cost and free options available to help your company guard its wireless LANs against threats. Continue Reading
Manage WLAN Security
Learn to apply best practices and optimize your operations.
Faster wireless technology is now widely available, but are your network's security policies up to the task? Continue Reading
Enterprises need device and operating-system-agnostic BYOD management. Ruckus offers device-agnostic networking software for enterprise WLANs. Continue Reading
Mobile workers are more productive than their peers, but still are frustrated by confusing BYOD policies and lack of ubiquitous Wi-Fi. Continue Reading
Problem Solve WLAN Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Will Gigabit Wi-Fi significantly alter network security, or will it mean business as usual? Expert Brad Casey discusses the new 802.11ac standard. Continue Reading
IT shops lacking resources to manually configure hundreds of personal devices can automate wireless LAN access provisioning for BYOD with the right tools. Continue Reading
To handle 46,000 clients and 20,000 concurrent connections, UPenn had to automate wireless LAN access provisioning, but that was only a first step. Continue Reading