11.07.2015 Views

Understanding WiFi Security Vulnerabilities and ... - AirTight Networks

Understanding WiFi Security Vulnerabilities and ... - AirTight Networks

Understanding WiFi Security Vulnerabilities and ... - AirTight Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Conclusion <strong>WiFi</strong> warrants new security controls in enterprise networks• For both <strong>WiFi</strong> <strong>and</strong> no-<strong>WiFi</strong> networks• Perceived as high priority item today• Also a regulatory compliance requirement Strong authentication <strong>and</strong> encryption (WPA2) is essential forauthorized Wi-Fi• Prevents eavesdropping <strong>and</strong> unauthorized access Another layer of security in the form of WIPS (Wireless IntrusionPrevention System) is essential for comprehensive protection• Prevents rogue APs, ad hoc connections, misassociations, cracking exploits,DoS attacks• Compliance monitoring• Performance monitoring <strong>and</strong> troubleshooting as added benefitsCopyright 2009, <strong>AirTight</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!