- Products supporting Wi-Fi Protected Access (WPA) became commercially available this summer. WPA fixes the majority of problems associated with the older, broken Wired Equivalent Privacy (WEP) found in most wireless LAN products, so war driving and WEP cracking threats should drop as WPA gets deployed.
- WPA critics note that users can still put themselves at risk by choosing too-short passphrases or using vulnerable options like Cisco's LEAP. While these grumbles have recently made for juicy headlines, it makes little sense to wait until late 2004 or 2005 to deploy 802.11i, the planned successor to WPA.
- Increasingly, attention is being refocused on what it takes to manage, maintain, and monitor security in large enterprise WLANs. For monitoring, a flood of new WLAN intrusion detection products and services have appeared. While these tools still grab headlines by simply detecting rogue APs, more sophisticated analysis, correlation, location awareness, and intrusion prevention features are on the rise.
- More scalable security management is now being tackled by wireless LAN switching systems and wireless LAN gateways. Many new products offer much-needed centralized control and configuration of security and performance in larger wireless networks. However, with so many similar-yet-different products trying to grab a piece of this emerging market, consumers are challenged to sort out the players and approaches.
Dig Deeper on Wireless Security
Related Q&A from Lisa Phifer, Wireless Expert
Are Cisco 1200 access points operated in “thick” or autonomous mode or as a thin AP, a lightweight access point that is controlled by a central ...continue reading
Wireless expert, Lisa Phifer addresses a query regarding Wi-Fi replacing Ethernet. Lisa provides analysis, advantages and disadvantages, and future ...continue reading
Lisa Phifer explains multiple access point configuration when a device tries to differentiate transmitted signals from each point and explains ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.