How To Secure WLANs: A Visual Overview

, March 26, 2013 Secure wireless networks don't just happen--users and IT pros have to make it happen. But what goes into making a wireless network secure? Here's a look some essential steps for locking down wireless communications, including advice for road warriors, small business owners and WLAN administrators running large networks.
  • E-mail

Detect and Prevent Intrusions

When your network lives in the air, it can be a target for a range of malicious behaviors that wired Ethernet never had to consider. Wireless intrusion detection and prevention, like rogue detection, is another component to wireless security that each vendor approaches differently. There are also third-party overlays for WLANs that lack native detection/prevention support.


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.