The steady growth of Wi-Fi in the enterprise demands that corporate IT teams learn and adopt new security methodologies tailored to the unique requirements and weaknesses of wireless networks.
Network and security staff must first evaluate a potentially confusing set of authentication and encryption mechanisms to be used in the network.
Depending on the security selected, IT will then need to establish and document the corporate WLAN security policy, including mechanisms to validate user compliance and monitor for inherent network vulnerabilities. With a defined policy in place, IT staff can turn their attentions to protecting the network from snooping and an ever-expanding list of wireless attacks.
In this paper, we will address each of these areas in detail and identify the real-world best practices needed to deploy and maintain a secure wireless network.
Read the full paper in PDF here