Search
Fanning the Flames of Rebellion with Honor
Posted by Rick Wilmer on Sep 14, 2017
Do the Right Thing-184012-edited.png

Witnessing ethical train wreck after train wreck in Silicon Valley, it’s easy to conclude that the quest for success at all costs is a recent phenomenon and one limited to startups.

Posts by Topic

see all
free-on-demand-webinars.png
Why SON May Be SDN Made For Wireless
Posted by Hemant Chaskar on Aug 18, 2015

There is an emerging trend to apply SDN (Software Defined Network) to Wi-Fi. Much of this discussion today is geared towards applying SDN constructs like OpenFlow and Network Function Virtualization (NFV) to Wi-Fi access points (APs). For example, OpenFlow interface on the AP to configure its settings from the SDN controller or to configure traffic handling on the AP such as packet classifiers and QoS from the SDN controller. Another discussion point is around tunneling AP traffic to NFV node for service provisioning. While these are good ideas, they do not cut to the essence of Wi-Fi, which is in the wireless. That is to say, these concepts are applied to APs in the same way they apply to other wired network elements like switches.

How to implement BYOD with Wi-Fi / WIPS assist
Posted by Hemant Chaskar on Jun 18, 2013

|

Securing your network from bring-your-own-device (BYOD)
Posted by AirTightTeam on Jun 12, 2012

What makes network administrators and security professionals tear their hair out - the "cool" employee who is carrying 2 or 3 or more devices and only one of them is actually issued by the company. I admit, I am one of them but not sure how "cool", just a gadget junkie. There is a lot of advice around these days about how to manage this deluge of personal smart devices entering the enterprise, but I found much of the advice given by Software Advice and CRM Market Analyst, Ashley Furness, very solid in her recent post, "Strategies to Secure Your Enterprise in the New World of BYOD". Some of it may seem obvious, but, often the obvious is overlooked for just that reason. We all know folks who do not change their password from "admin". Ashley's article is a good addition to the body of work out there about the challenges of BYOD in the enterprise. One area which is not mentioned, however, is wireless intrusion prevention (WIPS), which is the natural ally of MDM. With MDM, employees have to have an incentive to get the agent on their devices. WIPS solves that problem. AirTight WIPS as an example protects the network from being accessed by unauthorized devices - those which have credentials but are not an authorized device - by allowing administrators to set up rules which will automatically block unauthorized devices (not just rogue APs) from connecting to the network.

Don't let BYOD turn into "BYOR" in your network
Posted by Hemant Chaskar on Feb 27, 2012

BYOD (Bring Your Own Device) seems to be the dominant theme for 2012 in the Wi-Fi infrastructure and security space. As people increasingly bring in personal smartphone devices on the enterprise premises, the network/security administrators are grappling with the security implications. Given how engaging the new smartphone and tablet apps are, conflict arises between the users’ desire and the network/security administrators’ intentions. You need to ensure that this conflict does not turn BYOD into BYOR (Bring Your Own Rogue AP)!