Wireless LANs offer two things central to the adoption of communications technologies: reach and economy. Scalable end-user reach is gained without stringing wires, and the users themselves often feel ...
802.1X is maturing, but it will take a skilled network technician to configure it in products across any large deployment. While previous iLabs security-based testing focused strictly on how the IEEE ...
Many organizations have put off the deployment of IEEE 802.1X authentication for years while waiting for networking and computing vendors to make it easier. Earlier this year, the IT team at Brigham ...
When WEP's flaws became apparent, the wireless industry started developing new protocols to address the published weak points. These new protocols grew up around the IEEE 802.1x framework, which is a ...
In the network access control products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very ...