Security of a wireless network still ranks as one of the largest concerns of IT professionals planning to roll out an enterprise wireless LAN. Many people erroneously believe that a wireless LAN is inherently insecure. This is largely due to security flaws in early Wi-Fi protocols like WEP (Wired Equivalency Protocol), more recent vulnerabilities found in TKIP and lack of awareness as to how to deploy a secure WLAN. This whitepaper will help the wireless network administrator or security manager to understand the security capabilities in a modern Wi-Fi solution, where they should be used and how the WLAN integrates with other security devices in the network.
While all Wi-Fi vendors understand the need for and are taking steps in the directions of a fully-distributed architecture, crossing the bridge from controller-based to controller-less takes a significant amount of time and effort because all system features and the user interface must be re-architected for a fully-distributed platform. We invite you to take the road less traveled: controller-less. Read on.
Today's de facto standard architecture is commonly referred to as the, “controller-based” architecture, sometimes referred to as the “split MAC” architecture. It involves one or more controllers and controller-based (lightweight, thin) APs. The controller-based architecture was created to solve manageability, mobility (as opposed to portability), control-plane inadequacies, and high operational expenditure (OPEX) problems that were prevalent in autonomous (fat, thick, standalone) AP implementations. Find out how to eliminate the need to redesign your network in order to introduce a controller-based overlay infrastructure. That’s one less thing to manage, and one less thing to pay for.
SonicWALL and CIO magazine’s custom solutions group recently conducted a series of facilitated conversations with dozens of CIOs and senior IT executives throughout the United States. The upshot: Most IT leaders are now building their technology infrastructure for growth. Their issue: How to seize new business opportunities while mitigating risk.
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 4 Microsoft Surface Book review: The verdict on Microsoft's first notebook
- 5 Telstra Wi-Fi 4GX Advanced III review: Testing the world's first 600Mbps wireless hotspot
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Michael Dell talks to EMC World about massive merger
- Telstra commits $50 million to cut mobile outages
- Do Apple’s financial results mark the end of the golden smartphone era?
- Slump continues as tablet markets records worst quarter since 2012
- As more devices flood the market, security spending on Internet of Things heightens
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCAzure DeveloperNSW
- CCSr. Iteration ManagerVIC
- CCFront End DeveloperWA
- CCContract Systems Analyst (C++/JAVA/SQL) 160505/SA/971Asia
- FTLevel 2 IT Field Systems Engineer/Administrator - Multiple opportunitiesNSW
- FTData AnalystNSW
- FTProduction ConsultantVIC
- CCSenior IT Business AnalystVIC
- CCAdobe Experience Manager AEM / CQ5 DeveloperNSW
- CCBusiness Data AnalystVIC
- CCAEM DeveloperVIC
- FTSQL DeveloperNSW
- CCContract Analyst/Programmer II (Drupal 7.39/PHP) 160427/CAP/vccAsia
- CCSolution Architect / Data ArchitectNSW
- CCNetwork DesignerVIC
- CCApplication Migration ArchitectACT
- CCProject ManagerQLD
- CCSenior Implementation AnalystNSW
- CCMid or Senior Developer - Mobile Applications - (iOS)NSW
- CCE-Commerce - Senior Web Application DeveloperNSW
- CCSenior ICT Project OfficerACT
- CCData AnalystVIC
- CCContract Snr IT Assistant (IT Operation/UNIX) 160504/SITA/982Asia
- CCTechnical ExpertVIC
- CC.NET Developer (Application production Support)NSW