12.07.2015 Views

As the workforce becomes wireless so does the ... - Connect-World

As the workforce becomes wireless so does the ... - Connect-World

As the workforce becomes wireless so does the ... - Connect-World

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Wireless enterprise threatsThe latest threat to <strong>the</strong> <strong>wireless</strong> enterpriseby Chia-Chee Kuan, CTO and Co-Founder, AirMagnetThe <strong>wireless</strong> world today presents a unique set of challenges for businesses looking tomaintain a secure network. Attackers are turning <strong>the</strong>ir attention to client devices. Wirelessenabledclient devices, such as laptops, tablets and smartphones, ra<strong>the</strong>r than enterprise accesspoints, are now <strong>the</strong> focus of new threats. The only way to approach security issues efficientlyin an enterprise environment is to deploy <strong>wireless</strong> intrusion prevention technology.Chia-Chee Kuan is Co-Founder, CTO and Senior VP of Engineering at AirMagnet. Prior to co-founding AirMagnet in 2001 (now part ofFluke Networks), Mr Kuan served as advanced technical staff at Packet Design LLC since <strong>the</strong> company’s inception, where innovationswere incubated and focused on Internet routing and <strong>wireless</strong> security. Previously, he was <strong>the</strong> founding engineer at Precept Software,developing IP multicast and IP video streaming technologies. When Cisco acquired Precept, Mr Kuan led Cisco’s Video Internet ServiceUnit development team. His career has been devoted to computer networking, especially in TCP/IP in <strong>the</strong> infancy of <strong>the</strong> Internet whenARPANET was formed.Mr Kuan holds a B.S. in Information Engineering from National Taiwan University and a Master in Computer Science from StanfordUniversity, as well as 10 US patents in <strong>wireless</strong> security and performance management.Research continues to show mass growth andadoption of <strong>wireless</strong> and <strong>wireless</strong> local areanetwork (WLAN) technology. In fact, todayit’s more likely your employees connect toa <strong>wireless</strong> network, instead of plugging anE<strong>the</strong>rnet cable into <strong>the</strong>ir computers for access.Because of this growth, most organizationsnow understand <strong>the</strong> advantages <strong>wireless</strong>offers business (connectivity, productivity,critical apps, and <strong>so</strong> on), but as <strong>the</strong> connectedenterprises continue to grow, <strong>so</strong> do <strong>the</strong>challenges as<strong>so</strong>ciated with managing andsecuring <strong>the</strong>m.The <strong>wireless</strong> world today is much morecomplicated than <strong>the</strong> <strong>wireless</strong> world ofyesterday. There was a time when ITmanagers could be assured <strong>the</strong>ir <strong>wireless</strong>network consisted primarily of approvedaccess points (APs) and routers tied into <strong>the</strong>server infrastructure. However, with <strong>the</strong>proliferation of per<strong>so</strong>nal and mobile devices,<strong>the</strong>se same technicians have gone fromnetwork planner and manager to networkpolice officer, tracking and hunting downunapproved technologies.Today’s <strong>wireless</strong> networks (and <strong>the</strong> teamsresponsible for managing <strong>the</strong>m) are engagedin a constant power struggle. Wireless hasexpanded beyond <strong>the</strong> laptop and has becomeembedded in a growing number of mobile andlifestyle devices or clients. Now everyone thatwalks into your central business location (orremote sites) can attempt to connect to your<strong>wireless</strong> network. Will <strong>the</strong>y succeed? That’s<strong>the</strong> scary question. And, if <strong>the</strong>y do, will youknow about it? That’s even scarier!This new <strong>wireless</strong> world presents a uniqueset of challenges for businesses looking tomaintain a secure network. In this article,we’re going to focus primarily on <strong>the</strong> newthreats as<strong>so</strong>ciated with <strong>wireless</strong>-enabled clientdevices, like laptops, tablets and smartphones.If your team is not actively looking to secureagainst <strong>the</strong>se new threats and devices, it’s onlya matter of time before <strong>so</strong>meone else exploits<strong>the</strong>m (ei<strong>the</strong>r intentionally or unintentionally).So what exactly are we talking about when wesay <strong>the</strong> <strong>wireless</strong> network is at risk due to <strong>the</strong>proliferation of mobile and lifestyle devices?Basically, we’re referring to any device thatcan serve as a <strong>wireless</strong> client. Since <strong>the</strong>se type<strong>so</strong>f devices are exploding into every aspect ofour lives, <strong>the</strong> impact on enterprise <strong>wireless</strong>networks is huge. The ultimate goal is to stop22 • North America 2010

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!