Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Wireless security myths 2010

Gopinath KN | June 22, 2010
As if following Darwin's theory of evolution, wireless security myths too are born, evolve and then die to be replaced by new ones.

Reality: Part-time sensors fail miserably in reliably blocking threats (as such sensors cannot perform a sustained and frequent transmission of containment packets).

It is clear that threats occurring from unmanaged wireless security devices need focused attention. The first step in addressing this issue is to define wireless security policies for your enterprise -- define what authorized communication is and what is not.

The next step is to evaluate the security risk specific to your enterprise and invest in specialized tools such as a wireless intrusion detection/prevention system. Last, but not least, wireless security is also a people problem and user education goes a long way in mitigating the security risks.

AirTight Networks specializes in wireless security and performance management. It provides customers cutting-edge wireless intrusion detection and prevention (WIPS) solutions to automatically detect, classify, block and locate current and emerging wireless threats.

 

Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.