WLAN Security: Simplifying Without Compromising - Sponsored Whitepaper

Sponsored by:
MADGIG.COM Logo
MADGIG.COM
Download Entire Whitepaper
WLAN Security: Simplifying Without Compromising

Executive Summary Fundamentally there is a converse relationship between security and convenience — and in the case of WLAN security, convenience translates into IT management resources in addition to end user time and effort. Finding a balance between the right level of security for your size and type of organization is critical for cost control and end user productivity. This paper will help you determine the sweet spot for the optimal balance between your security needs and overhead cost/convenience.

Introduction The defining characteristic of WLANs is that they do not have clear physical borders — radio waves spread. Anyone within range can potentially connect to, and certainly listen in on (packet sniff), a WLAN. Encryption is used to keep WLAN data private; encrypted data can still be overheard, but not under- stood. Authentication is used to identify and manage who can connect and actively use the WLAN, which at the extreme end is used in 802.1X networks that look up user credentials on an authentication server before granting network access to lesser forms of data base lookups to no authentication at all.
Download Entire Whitepaper
Copyright © 2014, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.