WPA2 Security: Choosing the Right WLAN Authentication Method
Click here to download now
Overview: Ask a hundred CIOs what three things about WLANs (wireless LANs) strike fear into their hearts, and the answers are likely to be similar: Security, Security, and Security. Sure, you want good coverage. Sure, you want to minimize drops. But the only way an executive is likely to lose their job over a wireless network is if they end up like the folks at The TJX Companies, who saw millions of credit card numbers stolen from an attack that started with a breach of the WLAN.
This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise.