Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Mobile

    Catch-22 of WLANs

    Written by

    Jim Rapoza
    Published April 7, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Data cant be stolen from a network that no one can access. Thats the absurd principle that many IT managers are following when they install wireless networks. On the one hand, they want to bring wireless ease of access to employees, partners and clients. On the other hand, they face such strict security requirements for implementing a wireless LAN that its actually easier to plug into the wired network instead.

      You know how it goes when youre visiting another company or even dropping in to your own corporate headquarters or branch offices.

      “Do you have a wireless network here?”

      “Sure do.”

      “Great. Can I use it?”

      “Of course. But first youll need to install this special client software on your

      laptop. And then well need the MAC address for your wireless card. Once we have that, Ill try to get hold of so-and-so in IT and see if they can give you access.”

      “I see. Can I just plug into the network at that empty desk there?”

      “That would probably be easier.”

      The sad thing is that it doesnt have to be that way. Its not hard to have both a secure and an easily accessible wireless network. There are two approaches: Either segment the WLAN apart from other network resources or use new products and technologies that can tell the difference between easy guest access and secure internal access.

      But these methods have been obscured by the hype over the insecurity of WLANs. Many times Ive spoken to companies about using wireless networks and received standard answers such as “never, they are too insecure” or “we put one in, locked it down really tight, but no one uses it that much.”

      Where to begin? One of the easiest steps is to simply remove your WLAN from the corporate network. This can be done by putting it on its own network segment or by using the NAT, or Network Address Translation, that is built into many access points.

      Using these techniques, the wireless network has no more access to internal resources than the Internet at large, and employees can use a VPN to get into internal resources. And while WEP, an option in all wireless devices, isnt secure enough for internal networks, it works well enough to discourage outsiders looking for open networks to use.

      Some wireless and security vendors have started to notice the conundrum presented by secure but inaccessible wireless networks and are stepping forward to help. Their products are making it easy to offer high levels of security for a WLAN without surrendering easy access for guests and clients.

      One of the best solutions Ive seen is Cranite Systems WirelessWall Software Suite, the eWeek Excellence Awards winner for authentication and user management (see special report, Page 60). WirelessWall uses high-level encryption and a dedicated client application to protect all the vital resources on a wireless network.

      While employees and trusted users can access the network content they need, guest access can be defined differently. Thus, clients, guests and partners can get vanilla Internet access using any wireless card without jumping through complicated setup hoops.

      Several military installations, including West Point, have adopted WirelessWall. If its good enough for the U.S. military, its probably secure enough for your business.

      I also recently saw a new wireless access point appliance from security vendor SonicWall that takes a different approach to the same purpose. It secures network resources behind standard VPN technology but makes it possible for guests to go to a Web page and quickly get Internet access using a generic log-in.

      There. Easy to use, secure and, yes, wireless. It is possible.

      Now for the hard part: convincing everyone at your company that it can be done. Some re-education may be in order. Have clients and partners tell their tales of how they tried but couldnt use your network. Then set up a demonstration of the technology you choose.

      With a more open but secure WLAN, you just might end up with more than just the cutting-edge tech types using it. After all, in these tightfisted times, your job is to make sure that IT resources, having been deployed, are actually used. Its called getting a return on investment.

      Jim Rapoza
      Jim Rapoza
      Jim Rapoza, Chief Technology Analyst, eWEEK.For nearly fifteen years, Jim Rapoza has evaluated products and technologies in almost every technology category for eWEEK. Mr Rapoza's current technology focus is on all categories of emerging information technology though he continues to focus on core technology areas that include: content management systems, portal applications, Web publishing tools and security. Mr. Rapoza has coordinated several evaluations at enterprise organizations, including USA Today and The Prudential, to measure the capability of products and services under real-world conditions and against real-world criteria. Jim Rapoza's award-winning weekly column, Tech Directions, delves into all areas of technologies and the challenges of managing and deploying technology today.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×