際際滷

際際滷Share a Scribd company logo
Tech & Trends Click To Print
General Information
September 29, 2006  Vol.28 Issue 39
Page(s) 29 in print issue
Instituting Wi-Fi Policies
Secure Your WLAN & Mobile Workers
As more users clamor for Wi-Fi Internet access, it is a good time to get your house in order in
regards to user and security policies. Wi-Fi access is even changing the face of remote access,
making drafting and instituting Wi-Fi policies a challenge because the policies extend both within
and outside your corporate enterprise, factoring in Wi-Fi use by your mobile workers in their home
offices or when theyre on the road.
The Corporate Network
Your corporate Wi-Fi policies should focus on access control to your critical applications and
internal network infrastructure. Chuck Conley, vice president of marketing for Newbury Networks,
says, Education balanced with solid security policy enforcement are the best remedies for any
small to midsized business thats adopting Wi-Fi to support their business processes. For example,
its always best to implement basic precautions such as changing the standard settings on the
laptops wireless card to not automatically connect to an open network. And implementing
encryption and authentication such as WPA and VPNs are paramount to any wireless network
implementationno matter what size of the company.
Chris Witeck, director of product marketing for Aventail, makers of Aventail SSL VPN and other
remote access tools (www.aventail.com), sees corporate Wi-Fi access as all about policies and
authorization to determine who is the user and where are they. The Aventail vision for remote
access security is to provide a consistent security policy to all devices on the network and treat all
the devices as remote. This model takes remote access policies to the application level vs. the
traditional boundaries of the network perimeter.
Mobile-Ready Wi-Fi Security Policies
As mobile workers take to the road and access the Internet and your corporate network
infrastructure, your policies need to accommodate the additional risks that accessing third-party
Wi-Fi networks pose to your mobile devices and corporate data.
Mitchell Ashley, CTO of StillSecure, makers of StillSecure SafeAccess (www.stillsecure.com),
says, Wi-Fi broadens the scope of exposure because other networks bring new security risks. He
recommends that IT staffs equip mobile devices with sufficient security software, including personal
firewalls, antivirus software, and antispyware software. He emphasizes the threat a compromised
mobile device such as a laptop poses when a user brings it back to the office and logs into the
corporate network.
Conley says, We recommend a combination of perimeter-level security with endpoint security
policies in place. In other words, small to medium-sized businesses can still tighten the perimeter
while providing tighter security on the endpoints (i.e. laptop) to stop physical threats (i.e. USB,
Bluetooth) while employees are working in public hotspots or open Wi-Fi zones.
Wi-Fi Policies For Your SME
http://www.processor.com/editorial/PrntArticle.asp?prnt=1&article=artic...
1 of 2 6/26/2009 3:56 PM
Conley says, If you put the right policies in place, get the right tools, and solicit advice and
expertise from people who have a very good understanding of these products and standards, youll
be able to implement a far more secure Wi-Fi environment.
by Will Kelly
Create Your Own Wi-Fi Policies
Here are some points to consider when creating your small to midsized
enterprises Wi-Fi policies:
 Keep abreast of WLAN technology and security tool developments.
 Treat Wi-Fi access as remote access.
 Put consistent security policies in place for all devices on your network.
 Put strong network authorization policies in place.
 Educate yourself on WLAN vulnerabilities.
 Leverage the knowledge of experts to support your Wi-Fi networks securely.
 Educate your employees; make sure they understand how to use the wireless
environment effectively without compromising security.
Sponsored Links
D-Link DFL-1100 NetDefend Rackmount VPN Firewall
Provides integrated network address translation, SPI firewall, advanced content
filtering features, IDS protection, bandwidth management, and VPN support
www.Processor.com/NetDefend
Secure Computing SafeWord SecureWire
Provides lightning-fast, ultra-secure access to every application and data resource
in your networkfor all remote and internal connections
www.Processor.com/Secure
Vernier Networks EdgeWall 7000 Series
Ensures network access control for wired, wireless, and remotely connected
users
www.Processor.com/EdgeWall
Copyright 息 2009 Sandhills Publishing Company U.S.A. All rights reserved.
http://www.processor.com/editorial/PrntArticle.asp?prnt=1&article=artic...
2 of 2 6/26/2009 3:56 PM

More Related Content

Instituting_Wi-Fi_Policies

  • 1. Tech & Trends Click To Print General Information September 29, 2006 Vol.28 Issue 39 Page(s) 29 in print issue Instituting Wi-Fi Policies Secure Your WLAN & Mobile Workers As more users clamor for Wi-Fi Internet access, it is a good time to get your house in order in regards to user and security policies. Wi-Fi access is even changing the face of remote access, making drafting and instituting Wi-Fi policies a challenge because the policies extend both within and outside your corporate enterprise, factoring in Wi-Fi use by your mobile workers in their home offices or when theyre on the road. The Corporate Network Your corporate Wi-Fi policies should focus on access control to your critical applications and internal network infrastructure. Chuck Conley, vice president of marketing for Newbury Networks, says, Education balanced with solid security policy enforcement are the best remedies for any small to midsized business thats adopting Wi-Fi to support their business processes. For example, its always best to implement basic precautions such as changing the standard settings on the laptops wireless card to not automatically connect to an open network. And implementing encryption and authentication such as WPA and VPNs are paramount to any wireless network implementationno matter what size of the company. Chris Witeck, director of product marketing for Aventail, makers of Aventail SSL VPN and other remote access tools (www.aventail.com), sees corporate Wi-Fi access as all about policies and authorization to determine who is the user and where are they. The Aventail vision for remote access security is to provide a consistent security policy to all devices on the network and treat all the devices as remote. This model takes remote access policies to the application level vs. the traditional boundaries of the network perimeter. Mobile-Ready Wi-Fi Security Policies As mobile workers take to the road and access the Internet and your corporate network infrastructure, your policies need to accommodate the additional risks that accessing third-party Wi-Fi networks pose to your mobile devices and corporate data. Mitchell Ashley, CTO of StillSecure, makers of StillSecure SafeAccess (www.stillsecure.com), says, Wi-Fi broadens the scope of exposure because other networks bring new security risks. He recommends that IT staffs equip mobile devices with sufficient security software, including personal firewalls, antivirus software, and antispyware software. He emphasizes the threat a compromised mobile device such as a laptop poses when a user brings it back to the office and logs into the corporate network. Conley says, We recommend a combination of perimeter-level security with endpoint security policies in place. In other words, small to medium-sized businesses can still tighten the perimeter while providing tighter security on the endpoints (i.e. laptop) to stop physical threats (i.e. USB, Bluetooth) while employees are working in public hotspots or open Wi-Fi zones. Wi-Fi Policies For Your SME http://www.processor.com/editorial/PrntArticle.asp?prnt=1&article=artic... 1 of 2 6/26/2009 3:56 PM
  • 2. Conley says, If you put the right policies in place, get the right tools, and solicit advice and expertise from people who have a very good understanding of these products and standards, youll be able to implement a far more secure Wi-Fi environment. by Will Kelly Create Your Own Wi-Fi Policies Here are some points to consider when creating your small to midsized enterprises Wi-Fi policies: Keep abreast of WLAN technology and security tool developments. Treat Wi-Fi access as remote access. Put consistent security policies in place for all devices on your network. Put strong network authorization policies in place. Educate yourself on WLAN vulnerabilities. Leverage the knowledge of experts to support your Wi-Fi networks securely. Educate your employees; make sure they understand how to use the wireless environment effectively without compromising security. Sponsored Links D-Link DFL-1100 NetDefend Rackmount VPN Firewall Provides integrated network address translation, SPI firewall, advanced content filtering features, IDS protection, bandwidth management, and VPN support www.Processor.com/NetDefend Secure Computing SafeWord SecureWire Provides lightning-fast, ultra-secure access to every application and data resource in your networkfor all remote and internal connections www.Processor.com/Secure Vernier Networks EdgeWall 7000 Series Ensures network access control for wired, wireless, and remotely connected users www.Processor.com/EdgeWall Copyright 息 2009 Sandhills Publishing Company U.S.A. All rights reserved. http://www.processor.com/editorial/PrntArticle.asp?prnt=1&article=artic... 2 of 2 6/26/2009 3:56 PM