Email Alerts
-
How to configure wireless LAN security
Learn how to configure wireless LAN security, including choosing the right security standard and setting up a Robust Security Network. In this PrepLogic training video, you'll learn Cisco Aironet 1200 configuration for security, as well as troublesho... Videos
-
Why hiding the SSID won't solve PCI DSS wireless compliance
Although the PCI DSS wireless guidelines released last year sought to dispel any confusion about wireless LAN security risks, enterprises are still neglecting security requirements and falling prey to old WLAN wives' tales. Hiding SSIDs isn't enough.... Article
-
Why are network security vendors offering wireless LAN infrastructure?
Wireless LAN security is a big deal to most enterprises, but is that reason enough to buy your wireless LAN infrastructure and WLAN security from a traditional network security vendor? Security vendors are banking on their access point security capab... Article
-
Looking at the new Magic Quadrant for wireless LAN infrastructure
The Magic Quadrant for Wireless LAN infrastructure has shifted its focus this year. Basic architecture for access point-to-client communication is just a baseline requirement now. Vendors must now differentiate themselves with wireless LAN management... Article
-
How does Active Directory for Cisco ACS work?
Ask the Expert
-
Best of 2009: Computer networking advice
Are you looking for a top 10 list of networking industry issues? Then look no further. Get the best of 2009's computer networking advice from our enterprise IT expert panel, and learn answers to questions that spoke to the year's most prevalent probl... Interview
-
Does w ar driving enhance the security of wireless networks?
Learn how war driving can be used to secure your wireless network from our enterprise security expert Michael Gregg. Ask the Expert
-
How can I access my secured wireless network without the security key?
Learn how to use BackTrack to access your secured wireless network from our enterprise security expert Michael Gregg. Ask the Expert
-
Using NAC for smartphone security on wireless LAN
As unmanaged, Wi-Fi-enabled smartphones proliferate on corporate networks, network managers should use wireless network access control (NAC) to give them an idea of what's on the network and how they can secure those devices. Article
-
Can a network's IP address be stolen for the use of criminal activity?
Learn how open access points (APs) in your business can endanger the security of your local Internet connection, in this expert advice. Ask the Expert
Network Management Strategies for the CIO