Is there such a beast? I've got a heterogenious environment (Linux, Windows, Solaris, VMware) with laptops, workstations and servers, and it's time to implement 802.1x. I'll probably start with the ...
While 802.1X is acknowledged as the most secure way to do NAC authentication, the fear factor accompanying 802.1X is so great that there are more products in our test that avoid 802.1X than work well ...
What are some easy solutions for implementing 802.1X based authentication on a SOHO wireless network? For those involved in deploying wireless networks in enterprise settings, using 802.1X for ...
In the security and wireless networking world, 802.1x is a big deal. This is the Layer 2 protocol that enables device authentication. The protocol helps keep war drivers off wireless networks and is ...
When WEP's flaws became apparent, the wireless industry started developing new protocols to address the published weak points. These new protocols grew up around the IEEE 802.1x framework, which is a ...
During the course of our NAC reviews, we also tested Cloudpath Networks’ XpressConnect. XpressConnect is a small, browser-delivered agent that can reconfigure wireless access profiles and 802.1x ...
Meetinghouse Data Communications is making available a free, downloadable network authentication software package for Linux operating systems. The client-side or supplicant software package ...
The list of "missing features" for the iPhone is long, but one cavity that prevents the device from connecting to wireless networks offered by a number of universities and corporations is ...
Benjamin Franklin was undoubtedly thinking of 802.11b when he famously said those who would sacrifice freedom for security deserve neither. The convenience and low price of wireless networks has lead ...
In the NAC products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very early what kind of ...