WiBy Baselinemag | Posted 2003-11-01 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
Wireless local-area networks are notoriously insecure. But that's not stopping companies from cobbling together technologies.
reless Security Dynamics">
Wireless Security Dynamics
Category: Wireless local-area network security
What it is: Hardware and software for authenticating wireless network users, encrypting wireless network traffic and monitoring and managing wireless network access points.
Key Players: AirWave, Avaya, Bluesocket, Cisco, Enterasys, Fortress Technologies, Funk Software, Intel, Meetinghouse, Proxim, ReefEdge, Symbol, Vernier, Wavelink
What's Happening: Absent strong security standards, many enterprises are going ahead with wireless, plugging security holes as best they can.
Expertise Online: www.weca.net/opensection/ protected_access.asp