Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Mobile
    • Networking

    Cisco Announces Self-Defending Wireless Hardware

    By
    Wayne Rash
    -
    February 14, 2007
    Share
    Facebook
    Twitter
    Linkedin

      Cisco Systems is releasing an integrated network self-defense system that combines the companys existing wired and wireless intrusion prevention technology with its NAC Appliance and ifirewall technology. The company refers to this combination product as the Cisco Unified Wireless Network.

      In addition to providing a defense against such threats as rogue access points and clients, the Secured Wireless Solution provides diverse services, including single sign-on, client validation, integrated firewall services for guest access and a unified management approach. The new secure solution is designed to meet the needs of a variety of government and industry regulations, including HIPAA (Health Insurance Portability and Accountability Act), the Sarbanes-Oxley Act and PCI.

      “What were announcing is a new architected solution,” said Ben Gibson, director of Mobility Solutions Marketing at Cisco, in San Jose, Calif. “Our engineers and designers have tested and validated a wired and wireless solution for security.”

      “If you are an organization such as health care or retail, there are specific regulations that say you must safeguard data from a wireless device,” Gibson said. “A key part of safeguarding that information is ensuring that the network is able to detect rogue access devices or clients that are attempting to tap into this information. In particular, employees tend to bring in consumer-class Wi-Fi access points and plug into the network, which creates a significant security hole. You need to detect the access point and shut it off or mitigate it,” he said.

      /zimages/1/28571.gifClick here to read about how Cisco is expanding the footprint of the self-defending network.

      The problem, Gibson said, is that wired networks and wireless networks dont always have the same capabilities when it comes to security. “On a wired network side, theres a separate capability that allows you to detect whether a rogue access point is plugged into your network. If you only have wired IDS [intrusion detection system], you can stop them from getting into the wired network,” Gibson said. “Through this new solution, we have integration between our wireless LAN controller family and the Cisco ASA 5500. In the past, we offered a wired and a wireless system. Now were integrating the two together. This is a substantial win for customers who are always resource-constrained. It can be managed holistically.”

      However, it takes more than unified management to make life easier for the IT staff, and Gibson said Cisco has also addressed other issues. “Another key application is the ability to have single sign-on whether youre on the wired or wireless network,” Gibson explained. “Its our wireless LAN controllers in concert with the Cisco NAC [Network Admission Control] controllers. What weve developed is integration between these products. The process for wired and wireless used to be two separate operations. The wireless LAN controller and the NAC appliance are taking care of authentication. You only have one sign-on,” he said.

      Gibson said a third area thats been in demand by customers is guest and contractor access to the network. Now the integrated firewall services support them as well. “Guests get sent through the firewall system, which allows very specific rules for guest applications,” he said. “Now you can apply specific policies, such as not allowing point to point or corporate IM [instant messaging] or FTP file transfers.”

      Gibson said the unified approach should make it easier for companies to meet government regulations. “If you dont have a secured wireless and wired network, you have a potential risk of not being able to control your financial data,” he said. “Without converged security, its a lot more difficult to meet requirements.”

      /zimages/1/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      Analyst Zeus Kerravala, speaking to eWEEK from Manchester, England, said Ciscos new capability is an important extension of its existing offerings. “It extends the principles of self-protection to wireless,” said Kerravala, senior vice president for Enterprise Research at Yankee Group Research. “You want the policies you employ and practices you deploy to apply to the whole enterprise. For most enterprises, this isnt the case. Cisco needs to be able to provide that unified security across the whole network. It needs to be consistent,” he said.

      Kerravala said that while he thinks Ciscos new integrated offering is an important step, the company isnt really where it needs to be with the capability. “It needs to be easier to manage. Theyre about 70 percent there,” he said. “But theyre further along than anybody else.”

      “The next step needs to be some integration once you get outside the walls of the campus,” Kerravala said. “What Cisco has tackled is when youre in the office. But users are coming in from BlackBerrys and Treos. There are a number of other access methods, and those need to be included as well,” Kerravala said. Still, “I think its important to show that self-protection is evolving; its at least a step in that direction,” he said.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a freelance writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×