News
IBM has developed a rogue wireless LAN access-point detection tool that can automatically detect the presence of unauthorized access points on large-scale, enterprise networks, the company announced.
Network security has become one of the most important focal areas throughout university IT departments as ubiquitous wireless access has gained prominence. Although encryption and authentication will ...
These rogue devices may masquerade as authorized access points, monitoring and routing received network traffic. Once a user connects to a rogue access point, the rogue device may execute a variety of ...
Of all of the network security threats your company faces, few are as potentially dangerous as the rogue Access Point (AP). A rogue AP is a Wi-Fi Access Point that is set up by an attacker for the ...
In this issue of Industry Insider, ZDNet's David Berlind says just because your company hasn't deployed wireless networks doesn't mean you shouldn't be concerned with at least one form of wireless ...
Marvin Chartoff of Unisys argues that IT departments can control and eliminate unauthorized wireless networks. Rogue access points are among the greatest security threats in corporate America. Network ...
IBM Distributed Wireless Security Auditor IBM Uses clients as sensors, running a 100KB Linux program that sniffs out access points (AP) and sends that information back to a database installed on a ...
The Meru Security Services Module, slated to ship next quarter, installs on the Meru WLAN controller and incorporates the vendor's proprietary AirShield technology. Using a variety of packet ...
Locating and tracking an object via radio waves has been in everyday use since the WWII invention of RADAR (Radio Detection And Ranging). Today, everybody from automobile drivers to airline pilots to ...
(1) A wireless access point (AP) installed by an employee without the consent of the IT department. Without the proper security configuration, users have exposed their company's network to the outside ...
The flexibility of wireless is a double-edged sword and the ease with which your system can be compromised is greater than ever before. So prepare. I recently read a “real-world” incident that ...
It was nearly impossible to traverse a significant part of the show floor at this year's Networld+Interop without encountering solutions that dealt with the thorny issue of wireless security. Indeed, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results