Internet Security Systems Vs. The Spy - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Internet Security Systems Vs. The Spy

All it takes is a little creativity, a comfy place to sit, a laptop, and a handful of wireless hardware, and cracker types can clandestinely monitor wireless network traffic, boot up applications, or steal data outright.

Software maker Internet Security Systems Inc. (ISS) says: That ain't right.

The company aims to make wireless networks at least as secure as their tethered counterparts. By the end of next year, according to Gartner, half of U.S. companies will have deployed a wireless local-area network. That's more than double the 21% installed based at the end of 2000.

ISS says its new wireless-LAN security software, and consulting, education, and managed-security services are aimed at helping customers protect digital assets transmitted through the ether. ISS' X-Press update for its Internet Scanner software helps customers scan and identify rogue wireless access points. ISS' consulting services already provide evaluations, penetration testing, and design and security policy development.

Gartner analyst John Pescatore says much of the ISS announcement is marketing fluff. "The architecture, consulting, and education services are just the same old stuff," he says. But "the fact that they have added somesmarts to the scanner products to detect wireless-LAN gateways is a good thing," he adds. Pescatore explains that corporate power users tend to trek down to CompUSA, buy and install a wireless-LAN gateway with "the least secure possible configuration" and unwittingly place corporate data at risk.

But Pescatore warns that there's no way to detect malicious eavesdroppers to wireless-LAN gateways, making encryption critical. "We advise clients either use new 802.1x security options from Cisco, Lucent, and others and live with single vendor lock-in for now" or that they run IPSec virtual private networks on top of all wireless-network connections and not depend on the security services.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Commentary
Enterprise Guide to Edge Computing
Cathleen Gagne, Managing Editor, InformationWeek,  10/15/2019
News
Rethinking IT: Tech Investments that Drive Business Growth
Jessica Davis, Senior Editor, Enterprise Apps,  10/3/2019
Slideshows
IT Careers: 12 Job Skills in Demand for 2020
Cynthia Harvey, Freelance Journalist, InformationWeek,  10/1/2019
Register for InformationWeek Newsletters
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll