Email Alerts
-
BYOD networking guide: WLAN management and access policies
It'll take new WLAN management strategies and BYOD policies to tackle the challenges that arise when personal devices connect to the network en masse. Guide
-
The importance of WLAN testing: From planning to documentation
This chapter on WLAN testing covers WLAN test planning and documentation and crucial testing methods for performance, security and signal coverage. Book Chapter
-
Balancing wireless LAN troubleshooting strategies for BYOD
Security is only half the challenge when it comes to supporting a BYOD WLAN. The rest depends on WLAN troubleshooting to handle personal device drain. Feature
-
Four IT shops, four approaches to BYOD network security
With no single solution for BYOD network security, engineers are getting crafty at integrating varied technologies to handle the challenge. Feature
-
Wireless sniffing best practices using Wireshark
Wireless sniffing using Wireshark lets engineers troubleshoot poor performance and connectivity problems, as well as analyze traffic activity on the network. Book Chapter
-
Stop everywhere Wi-Fi hotspots and guest wireless networks!
The rapid rise of enterprise guest wireless networks and public Wi-Fi hotspots are only leading to anti-social behavior and a host of WLAN security problems that include identity snooping using Firesheep. Opening up guest networks and public Wi-Fi al... Fast Packet
-
Interop enterprise mobility: You are your mobile user's keeper
During the Interop New York enterprise mobility conference track, users will be seeking enterprise mobility security and management strategies to handle the plethora of personal mobile devices on their enterprise networks. Slideshow
-
How to configure wireless LAN security
Learn how to configure wireless LAN security, including choosing the right security standard and setting up a Robust Security Network. In this PrepLogic training video, you'll learn Cisco Aironet 1200 configuration for security, as well as troublesho... Videos
-
Lesson 1: How to counter wireless threats and vulnerabilities
In Lesson 1 of Wireless Security Lunchtime Learning, you'll gain a better understanding of the Wi-Fi security challenge in terms of the technology's inherent vulnerabilities and the threats posed against it. Armed with this knowledge, you can realist... School
-
Enterprise wireless LAN security: 802.11 and seamless wireless roaming
Learn how to secure your enterprise wireless local area network (LAN) in this guide of industry best practices. Wireless networking expert Lisa Phifer explains how network security is improved by the wireless IEEE 802.11n protocol; how to secure embe... Guide
Network Management Strategies for the CIO