Email Alerts
-
BYOD networking guide: WLAN management and access policies
It'll take new WLAN management strategies and BYOD policies to tackle the challenges that arise when personal devices connect to the network en masse. Guide
-
The importance of WLAN testing: From planning to documentation
This chapter on WLAN testing covers WLAN test planning and documentation and crucial testing methods for performance, security and signal coverage. Book Chapter
-
Balancing wireless LAN troubleshooting strategies for BYOD
Security is only half the challenge when it comes to supporting a BYOD WLAN. The rest depends on WLAN troubleshooting to handle personal device drain. Feature
-
Four IT shops, four approaches to BYOD network security
With no single solution for BYOD network security, engineers are getting crafty at integrating varied technologies to handle the challenge. Feature
-
Wireless sniffing best practices using Wireshark
Wireless sniffing using Wireshark lets engineers troubleshoot poor performance and connectivity problems, as well as analyze traffic activity on the network. Book Chapter
-
Stop everywhere Wi-Fi hotspots and guest wireless networks!
The rapid rise of enterprise guest wireless networks and public Wi-Fi hotspots are only leading to anti-social behavior and a host of WLAN security problems that include identity snooping using Firesheep. Opening up guest networks and public Wi-Fi al... Fast Packet
-
Interop enterprise mobility: You are your mobile user's keeper
During the Interop New York enterprise mobility conference track, users will be seeking enterprise mobility security and management strategies to handle the plethora of personal mobile devices on their enterprise networks. Slideshow
-
How to configure wireless LAN security
Learn how to configure wireless LAN security, including choosing the right security standard and setting up a Robust Security Network. In this PrepLogic training video, you'll learn Cisco Aironet 1200 configuration for security, as well as troublesho... Videos
-
Lesson 1: How to counter wireless threats and vulnerabilities
In Lesson 1 of Wireless Security Lunchtime Learning, you'll gain a better understanding of the Wi-Fi security challenge in terms of the technology's inherent vulnerabilities and the threats posed against it. Armed with this knowledge, you can realist... School
-
Enterprise wireless LAN security: 802.11 and seamless wireless roaming
Learn how to secure your enterprise wireless local area network (LAN) in this guide of industry best practices. Wireless networking expert Lisa Phifer explains how network security is improved by the wireless IEEE 802.11n protocol; how to secure embe... Guide
- See more Essential Knowledge on WLAN Security
-
WLAN vendor Ruckus offers device-agnostic BYOD management
Enterprises need device and operating-system-agnostic BYOD management. Ruckus offers device-agnostic networking software for enterprise WLANs. News | 14 Jun 2013
-
Ambiguous bring your own device policy can thwart mobile productivity
Mobile workers are more productive than their peers, but still are frustrated by confusing BYOD policies and lack of ubiquitous Wi-Fi. News | 12 Jun 2013
-
Forgot your password? FIDO Alliance works on authentication alternatives
Password-based authentication is becoming more taxing for users, especially on mobile devices. The FIDO Alliance is developing alternatives. News | 10 May 2013
-
Networking blogs: Better BYOD policies, Aerohive updates HiveManager
In this networking blog roundup, learn why better BYOD policies are user-oriented, and find out what the HiveManager update means for WLAN security. Fast packet | 20 Mar 2013
-
Need seamless Wi-Fi roaming? Research orgs find an answer with eduroam
With eduroam, universities enable Wi-Fi roaming between disparate campus networks without requiring manual login. Why can't enterprises do the same? News | 29 Jan 2013
-
BYOD management: Using a device catalog to control users
Having a BYOD policy doesn't mean allowing every device onto the network. A BYOD catalog sets rules for which devices and applications are feasible. Fast Packet | 23 Aug 2012
-
New Gartner Magic Quadrant topic: Unified wired and wireless LAN
Gartner is dumping its wireless LAN and LAN switching categories and replacing them with one on unified wired and wireless LAN access and another on the data center network. News | 22 Jun 2012
-
With Locator/Identifier Separation Protocol, seamless mobile handoffs
At Cisco Live, Cisco CEO John Chambers highlighted the Locator/Identifier Separation Protocol as a method to seamlessly move applications between cellular and Wi-Fi networks. Fast Packet | 13 Jun 2012
-
BYOD policy: More than on-boarding and security
Experts say a BYOD policy will require network managers to reach across IT silos. News | 17 May 2012
-
Application-aware networking flies under radar at Interop 2012
At Interop 2012, clear signs emerge that application-aware networking is becoming a reality. Fast Packet | 10 May 2012
- See more News on WLAN Security
-
In BYOD networking, no single solution
Since there is no silver bullet for BYOD networking challenges, engineers need to get creative in technology integration … and then get management on board. Column
-
Gigabit Wi-Fi security: Is the new 802.11ac standard worth an upgrade?
Will Gigabit Wi-Fi significantly alter network security, or will it mean business as usual? Expert Brad Casey discusses the new 802.11ac standard. Tip
-
Provisioning wireless LAN access for BYOD requires integrated tools
IT shops lacking resources to manually configure hundreds of personal devices can automate wireless LAN access provisioning for BYOD with the right tools. Expert Tip
-
How UPenn tackled wireless LAN access for 46,000 BYOD clients
To handle 46,000 clients and 20,000 concurrent connections, UPenn had to automate wireless LAN access provisioning, but that was only a first step. Expert tip
-
Evaluating business and technology needs for a robust enterprise WLAN
It is crucial to assess business and technology issues driving the need for a robust and capable enterprise WLAN to support a new mobile workforce. Tip
-
Determining WLAN management: Factors to consider
Determining best WLAN management requires additional considerations, including the technology curve extent and deciding between on premises or cloud. Tip
-
Evaluating wireless LAN requirements: What to consider before buying
When considering a WLAN solution for your enterprise, you'll have to start by assessing the wireless LAN requirements necessary. Tip
-
Ten questions to ask WLAN vendors when evaluating WLAN solutions
Once IT professionals have developed a mobility plan, it is crucial to address particular questions with WLAN vendors when assessing WLAN solutions. Tip
-
WLAN architecture considerations to support a mobile workforce
To deploy WLAN architecture for a mobile workforce, it's important to evaluate a range of WLAN access control technologies and edge designs. Tip
-
Benefits of WLAN infrastructure as the primary access network
Many companies see the benefits of WLAN infrastructure as primary access network, but some need it more than others. Understanding the gains is key. Tip
-
Assessing the enterprise wireless LAN for the new mobile workforce
Network engineers must assess the business and technology needs behind building a distributed enterprise wireless LAN for the new mobile workforce. Tip
- See more Tips on WLAN Security
-
Is WEP cracking still a worrisome WLAN security issue?
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy. Answer
-
Is 802.1X authentication good enough for WLAN access control?
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control. Answer
-
How the 802.11ac standard impacts security
The upcoming 802.11ac standard is an improvement over 802.11n, but how could security be impacted? Wireless expert Lisa A. Phifer explains. Answer
-
Wireless network setting considerations for Android troubleshooting
Wireless expert Lisa Phifer addresses Android troubleshooting and the ways that changing wireless network settings could solve connectivity problems. Answer
-
Obtaining wireless access control for personal devices
Lisa Phifer explains methods for wireless access control to allow employees certain but not full access to a company’s network and maintaining network access protection. Answer
-
Taking WPS attack precautions can reduce unauthorized WLAN access
Admins should take WPS attack precautions to avoid unauthorized WLAN access, yet understanding the WPS protocol and its own vulnerabilities is key to complete network protection. Answer
-
How to secure a wireless network for small business
Wireless expert Lisa Phifer explains how to secure a wireless network for small and mid-sized businesses. She details each of the available wireless network security options to help SMBs balance complexity and cost with the proper level of security f... Answer
-
Be aware of Wi-Fi security to deal with Firesheep at public hotspots
Wireless expert Lisa Phifer tackles public Wi-Fi security and the steps you can take to protect yourself from sidejacking attempts like Firesheep. Lisa also highlights that these threats are not limited to public Wi-Fi access alone, and could happen ... Answer
-
How does Active Directory for Cisco ACS work?
Ask the Expert
-
Does w ar driving enhance the security of wireless networks?
Learn how war driving can be used to secure your wireless network from our enterprise security expert Michael Gregg. Ask the Expert
- See more Expert Advice on WLAN Security
-
Wireless hot spot security -- podcast
Learn how to keep your enterprise network secure while your mobile workforce utilizes public wireless hot spots, in this podcast. Podcast
-
Wireless LAN management strategies
Implementing a WLAN is straightforward, but making sure it runs optimally can be challenging. Luckily, networking professionals can control and maintain their wireless networks by using well-known methodologies based on the OSI model. Here we outline... Audiocast
-
WLAN vendor Ruckus offers device-agnostic BYOD management
Enterprises need device and operating-system-agnostic BYOD management. Ruckus offers device-agnostic networking software for enterprise WLANs. News
-
Ambiguous bring your own device policy can thwart mobile productivity
Mobile workers are more productive than their peers, but still are frustrated by confusing BYOD policies and lack of ubiquitous Wi-Fi. News
-
Forgot your password? FIDO Alliance works on authentication alternatives
Password-based authentication is becoming more taxing for users, especially on mobile devices. The FIDO Alliance is developing alternatives. News
-
Networking blogs: Better BYOD policies, Aerohive updates HiveManager
In this networking blog roundup, learn why better BYOD policies are user-oriented, and find out what the HiveManager update means for WLAN security. Fast packet
-
BYOD networking guide: WLAN management and access policies
It'll take new WLAN management strategies and BYOD policies to tackle the challenges that arise when personal devices connect to the network en masse. Guide
-
Gigabit Wi-Fi security: Is the new 802.11ac standard worth an upgrade?
Will Gigabit Wi-Fi significantly alter network security, or will it mean business as usual? Expert Brad Casey discusses the new 802.11ac standard. Tip
-
The importance of WLAN testing: From planning to documentation
This chapter on WLAN testing covers WLAN test planning and documentation and crucial testing methods for performance, security and signal coverage. Book Chapter
-
Provisioning wireless LAN access for BYOD requires integrated tools
IT shops lacking resources to manually configure hundreds of personal devices can automate wireless LAN access provisioning for BYOD with the right tools. Expert Tip
-
How UPenn tackled wireless LAN access for 46,000 BYOD clients
To handle 46,000 clients and 20,000 concurrent connections, UPenn had to automate wireless LAN access provisioning, but that was only a first step. Expert tip
-
Need seamless Wi-Fi roaming? Research orgs find an answer with eduroam
With eduroam, universities enable Wi-Fi roaming between disparate campus networks without requiring manual login. Why can't enterprises do the same? News
- See more All on WLAN Security
About WLAN Security
Learn how to secure your enterprise wireless local area network (WLAN) using encryption methods -- such as WPA2, WPA, WEP, TKIP, LEAP and EAP wireless protocols -- and through tools such as wireless intrusion detection. Learn how to monitor the security of wireless networks and more in our wireless security section.
Network Management Strategies for the CIO