- The pros and cons of different approaches to wireless intrusion prevention
- AirMagnet
There are a few different ways to deploy monitoring systems that scan the airwaves for unauthorized devices and intrusion attempts. Wireless intrusion detection and prevention systems (WIPS) can be built directly into your wireless LAN, for example, using a couple of different approaches. Alternatively, WIPS can run as a standalone, dedicated security system from a third-party specialty company. Each approach has its merits. It's up to the enterprise IT department to understand the tradeoffs so it can appropriately balance the organization's risk profile, depth of security required and budget as it builds an effective, comprehensive wireless security strategy.
Download Paper
(Webtorials registration required for downloads. Click here if you forgot your username/password.)
Download Paper
(Webtorials registration required for downloads. Click here if you forgot your username/password.)
As WiFi is quickly becoming ubiquitous, few issues is any are more important than securing your WiFi network.
But this raises a huge question... Should your WiFi security be integrated into the APs or an add-on "overlay" system.
This paper does an excellent job of presenting a comparison and making the case for an overlay system.