Summary

Wireless networks are as common as wired networks in today's enterprise environments providing access to internal assets from anywhere on campus. With this convenience come additional attack vectors to enterprise assets and data that must be planned for and proper security mechanisms implemented for mitigation. Implementing secure encryption and authentication methods can provide a wireless network to enterprise users that meet their needs and ensure the security of enterprise assets. It is important that a layered approach of security is implemented to address the attacks common to wireless networks including having an intrusion prevention mechanism to detect and mitigate common and advanced attacks. Supporting processes for alert management ...

Get Enterprise Security: A Data-Centric Approach to Securing the Enterprise now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.