IBM has developed a rogue wireless LAN access-point detection tool that can automatically detect the presence of unauthorized access points on large-scale, enterprise networks, the company announced.
Of all of the network security threats your company faces, few are as potentially dangerous as the rogue Access Point (AP). A rogue AP is a Wi-Fi Access Point that is set up by an attacker for the ...
Q: How can I protect my network from rogue access points? – Kent, N.J. A: Historically, the only way to detect rogue access points was through manual scans. By this we mean having your IT staff ...
In this issue of Industry Insider, ZDNet's David Berlind says just because your company hasn't deployed wireless networks doesn't mean you shouldn't be concerned with at least one form of wireless ...
IBM Distributed Wireless Security Auditor IBM Uses clients as sensors, running a 100KB Linux program that sniffs out access points (AP) and sends that information back to a database installed on a ...
Detecting rogue WLAN access points in an enterprise just got easier. On Monday, AirMagnet released Version 4.0 of its distributed WLAN security and performance platform, AirMagnet Distributed. In ...
(1) A wireless access point (AP) installed by an employee without the consent of the IT department. Without the proper security configuration, users have exposed their company's network to the outside ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results