A new release of AirDefense’s wireless intrusion prevention and detection software features a major user-interface redesign, big boost in speed, and greatly expanded reporting tool. A new release of ...
You may be one of those people who are afraid that implementing a wireless LAN leaves your network vulnerable to any old shmoe with a laptop, a wireless adapter and a penchant for freeloading or ...
It's two years since the IEEE ratified 802.11i, slightly less since the Wi-Fi Alliance introduced the WPA2 certification. And still, insecurity over security is hindering wireless LAN ...
Intrusion detection systems (IDSes) have become a key piece of security infrastructure for enterprise networks. With the rise of wireless networks, the need for IDSes has increased, as has the ...
NASHVILLE, Tenn. & SAN FRANCISCO --(Business Wire)-- Mar 02, 2010 Cybera', a leading security as a service provider, today announced the national launch of SECURE|WAVE, its wireless intrusion ...
Citing the “explosion” of wireless “hot spots” in public spaces, homes and businesses, IBM today unveiled a new managed intrusion-detection service for wireless networks. The new intrusion-detection ...
Looking at wireless intrusion prevention and detection systems? Burton Group notes the following features and functions you may wish to consider when making a product selection. (Also see companion ...
WiFi startup Airmagnet wants you all to know that it offers more than just wireless security. Yep, the company also does scintillating stuff like network performance analysis and 802.11 VOIP testing, ...
So what do attacks look like, and how do they work? The following section outlines four major types of attacks that are a significant danger to wireless LANs because any attacker can learn how to ...
Of all of the network security threats your company faces, few are as potentially dangerous as the rogue Access Point (AP). A rogue AP is a Wi-Fi Access Point that is set up by an attacker for the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results