Email Alerts
-
How can I hide my WLAN's SSID in an Aruba AP-61?
Learn the pros and cons of hiding your access point (AP) service set identifiers (SSIDs) on an Aruba AP-61, from our wireless network expert, Lisa Phifer. Ask the Expert
-
How to lock wireless routers
Learn how to limit connections to your WLAN and control access to your router, in this advice from our enterprise security expert, Michael Gregg. Ask the Expert
-
Lesson 1: How to counter wireless threats and vulnerabilities
In Lesson 1 of Wireless Security Lunchtime Learning, you'll gain a better understanding of the Wi-Fi security challenge in terms of the technology's inherent vulnerabilities and the threats posed against it. Armed with this knowledge, you can realist... School
-
Wireless LAN security: SonicWall joins crowded WLAN market
With very little fanfare, network security vendor SonicWall has entered a very crowded wireless LAN market with firewall controlled access points that give wireless LAN security a new twist. Article
-
Stolen laptop recovery using remote access and wireless network SSIDs
Remote access can allow users to locate lost or stolen laptops and devices. Learn how to leverage connectivity in order to find missing hardware in this advice from our wireless networking expert. Ask the Expert
-
Enterprise wireless LAN security: 802.11 and seamless wireless roaming
Learn how to secure your enterprise wireless local area network (LAN) in this guide of industry best practices. Wireless networking expert Lisa Phifer explains how network security is improved by the wireless IEEE 802.11n protocol; how to secure embe... Guide
-
Monitoring your network to detect rogue access points (APs)
Rogue access points (APs) put data security at risk. Network admins can identify and monitor unknown APs using wireless LAN security software. Lisa Phifer explains in this expert response. Ask the Expert
-
Preparing enterprise Wi-Fi networks for PCI compliance
The Payment Card Industry Data Security Standard (PCI DSS) requires several key measures are in place to protect transaction data on enterprise Wi-Fi networks. In this special tip from Forrester Research, Senior Analyst John Kindervag details what th... Tip
-
Persistent, secure connections for roaming WiMAX, 3G and 802.11x
With the proliferation of wireless services, mobile workers who must communicate over both the LAN and WAN seek secure, persistent connections for their wireless devices across WiMAX, 3G and 802.11 networks. Learn how to help keep these connections a... Tip
-
Securing embedded 802.11n devices
As WLANs are updated to 802.11n, most will be populated by increasingly diverse embedded 802.11n devices, including phones, cameras and barcode scanners. These pose unique challenges for network management and security. In this tip, learn how to cont... Tip
Network Management Strategies for the CIO