New & Notable
WLAN Security News
July 17, 2014
Apple iOS 8 will add a MAC address spoofing feature to iPhones and iPads for wireless privacy. It could interfere with Wi-Fi location-based services used by many consumer-facing businesses.
June 10, 2014
Juniper, Aruba announced a partnership to converge their respective wired and wireless LAN technology for simplified network management.
April 04, 2014
Enterprise IT teams must address security pitfalls, assign BYOD policies for personal devices in the workplace, says vendor panel at Interop 2014.
April 03, 2014
Motorola has enhanced its WLAN cloud services with new virtual and hardware controllers, a new switch family and security upgrades at Interop 2014.
WLAN Security Get Started
Bring yourself up to speed with our introductory content
A dead zone (Wi-Fi dead zone) is an area within a wireless LAN location where Wi-Fi does not function, typically due to radio interference or range issues. Because Wi-Fi is a radio signal the same things that disrupt radio tend to affect Wi-Fi. ... Continue Reading
Hotspot 2.0 and the IEEE 802.11u protocol could allow mobile device users to securely roam between Wi-Fi and cellular networks without stopping to authenticate. Continue Reading
Learn how to secure your enterprise wireless local area network (LAN) in this guide of industry best practices. Wireless networking expert Lisa Phifer explains how network security is improved by the wireless IEEE 802.11n protocol; how to secure ... Continue Reading
Evaluate WLAN Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Aerohive adds the ability to manage mobile devices to its Wi-Fi management platform, combining mobile device management and network management. Continue Reading
Analysts discuss data center, cloud encryption and Wi-Fi trends that can be expected in 2014. Continue Reading
Security expert Michele Chubirka shares low-cost and free options available to help your company guard its wireless LANs against threats. Continue Reading
Manage WLAN Security
Learn to apply best practices and optimize your operations.
Enterprises need device and operating-system-agnostic BYOD management. Ruckus offers device-agnostic networking software for enterprise WLANs. Continue Reading
Mobile workers are more productive than their peers, but still are frustrated by confusing BYOD policies and lack of ubiquitous Wi-Fi. Continue Reading
In this networking blog roundup, learn why better BYOD policies are user-oriented, and find out what the HiveManager update means for WLAN security. Continue Reading
Problem Solve WLAN Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Will Gigabit Wi-Fi significantly alter network security, or will it mean business as usual? Expert Brad Casey discusses the new 802.11ac standard. Continue Reading
IT shops lacking resources to manually configure hundreds of personal devices can automate wireless LAN access provisioning for BYOD with the right tools. Continue Reading
To handle 46,000 clients and 20,000 concurrent connections, UPenn had to automate wireless LAN access provisioning, but that was only a first step. Continue Reading