AirMagnet White Papers
Employees want to bring their own Wi-Fi enabled smart devices into the workplace, and businesses have much to gain by embracing the BYOD trend. In this paper, we show how factoring smart devices – including BYODs – into the full WLAN lifecycle can fill this gap, avoiding costly problems and simplifying trouble resolution.
Lisa Phifer discusses how to achieve flexible response to zero-day threats, without business disruption.
This paper looks at the pros and cons of different approaches to wireless intrusion prevention systems (WIPS). There are a few different ways to deploy monitoring systems that scan the airwaves for unauthorized devices and intrusion attempts. Each approach has its merits. It's up to the enterprise IT department to understand the tradeoffs so it can appropriately balance the organization's risk profile, depth of security required and budget as it builds an effective, comprehensive wireless security strategy.
Enterprises are expanding their wireless networks with increasing confidence, believing that rooting out rogue access points and implementing WPA2 will put an end to Wi-Fi security concerns. But attackers are, nevertheless, zeroing in on the many millions of corporate client devices, exploiting them to gain entry to corporate networks and sensitive information.
Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop security countermeasures to protect information on wired networks, wireless networks have created unique opportunities for exploitation. Increasingly, the trend is to capitalize on loopholes in network security through a wireless access point. Merchants who process payment cards need dedicated wireless monitoring systems that offer full traffic analysis and comprehensive security solutions to identify wireless security loopholes, provide solutions, and document compliance for audits.
Mobile applications -- such as electronic medical record (EMR) technologies, voiceover-wireless communication, picture archiving and communication systems (PACS), and device location-tracking -- can reduce overall healthcare costs, improve patient safety and streamline the patient experience. However, these applications have unique requirements that stress wireless LANs in different ways.
The 802.11n standard promises to extend today's most popular WLAN standard by significantly increasing reach, reliability, and throughput. The final standard, predicted to be ratified in this year, is expected to trigger broad-scale deployment of bigger, better, faster networks.
The 802.11n specification defines several mechanisms by which HT (High Throughput) STAs may coexist with non-HT (802.11a/b/g) STAs. This concept (and many of the procedures for doing so) is not new, or unique to 802.11n. In fact, many of the issues of coexistence and backwards compatibility are present in 802.11g whereby protection mechanisms are employed allowing ERP (802.11g) STAs to coexist with HR/DSSS (802.11b) STAs. To be sure, the designers of 802.11n certainly understood that in order for the technology to be successfully adopted, it must contend and coexist with legacy WLAN deployments -- especially in the enterprise, where significant investment has already been made in (legacy 802.11 a/b/g) WLAN infrastructure. There should be mechanisms for the legacy and 802.11n stations to understand each other and protect themselves from interference created by each other.
The steady growth of Wi-Fi in the enterprise demands that corporate IT teams learn and adopt new security methodologies tailored to the unique requirements and weaknesses of wireless networks. This paper identifies the real-world best practices needed to deploy and maintain a secure wireless network.
Craig Mathias of Farpoint Group provides an in-depth, technical explanation of the various ways interference can impact a wireless LAN, and discusses remediation strategies.
Craig Mathias of Farpoint Group discusses the tools and techniques that successfully manage interference for wireless LANs systems -- such as AirMagnet's Survey, Spectrum Analyzer and Laptop Analyzer. Mathias concludes that establishing these methods will enable enterprises to deploy and operate a secure, well-performing network.
AirMagnet discusses the need for performing wireless site surveys and demonstrates how the AirMagnet Planner and Survey products enable you to streamline these processes for a better performing, more secure wireless LAN.
Whether a part of a complete security, performance and compliance solution or not, endpoint (desktop, notebook and laptop computers) security is a mandatory requirement. Planned or unplanned, Wi-Fi technology is moving into your organization. Increasingly present and increasingly inexpensive, this hidden infrastructure is often personally purchased, virally deployed and corporately expensed. Rapid Wi-Fi technology growth is forcing organizations to deal with it, in many cases before the organization is ready to take it on. This white paper discusses the challenges of endpoint security and how best to integrate it into a complete wireless network assurance solution.
This white paper demonstrates how AirMagnet's intrusion prevention technology secures the wireless LAN and addresses critical GLBA provisions.
The physical structure of hospitals and the breadth of wireless technologies utilized throughout these facilities makes it difficult to effectively operate a wireless network and diagnose problems. This paper discuss the security and performance issues commonly found in today's modern healthcare environment and how to effectively manage them.
Many options are available to safeguard wireless LANs, but which security measures should your company deploy? Furthermore, how can you tell whether your network is sufficiently protected against 802.11 and 802.1X attacks? Lisa Phifer of Core Competence explains how to conduct your own WLAN vulnerability assessment and apply results to manage your business risks.
Wireless network administrators in government face a critical challenge in assuring that wireless LANs under their management are secure from both internal and external intrusion. This white paper discusses how to overcome the government-specific challenges through a combination of policy, monitoring and technology.
The Sarbanes-Oxley Act of 2002 (SOX) seems to focus specifically on financial reporting and corporate governance in publicly held companies, but in reality, SOX has everything to do with technology, because today's corporate data and communications functions are based almost entirely on computer-based systems. Wireless networks are of particular concern to SOX compliance because they are easily breached unless adequate defenses are in place. This white paper addresses the components of SOX that are most relevant to a wireless LAN, how the wireless LAN is vulnerable, and a comprehensive approach to wireless LAN security using AirMagnet's wireless network assurance solutions.
This white paper demonstrates how the Federal Regulations such as the Department of Defense 8100.2 Directive, HIPAA, Sarbanes Oxley & GLBA impact security of wireless networks.