Find the Rogues
Client authentication and encryption are only part of the enterprise wireless security story. The ability to identify and neutralize self-installed "rogue" wireless access points is also important, as they can be nuisance devices or sources of critical data leakage. Each WLAN vendor detects rogue APs differently, so this is one area to pay attention to when shopping for a system.
Lee is a Wireless Network Architect for a large private university. He has also tought classes on networking, wireless network administration, and wireless security. Lee's technical background includes 10 years in the US Air Force as an Electronic Warfare systems technician ... View Full Bio