Atif Azim

Subscribe to Atif Azim: eMailAlertsEmail Alerts
Get Atif Azim: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Atif Azim

802.1x, 802.11i, TKIP, EAP, LEAP, and PEAP. WLAN security is evolving rapidly. This leaves most IT managers who have not just completed their WLAN security post-doc wondering what to do and when. This article examines the advantages and disadvantages of various security mechanisms available for protecting WLANs, and suggests which network environments are most suited for each. If you're like most network managers who have deployed a wireless LAN (WLAN), you're probably scratching your head at the myriad WLAN security solutions that have come to market promising to fix the cracks opened up by 802.11's wired equivalency protocol (WEP) security standard. Should you deploy WEP with better key management; adopt 802.1x with TLS, TTLS or PEAP; or go with the widely adopted IPSec, which is already used for most remote access applications? The good news is that it's relati... (more)