When WEP's flaws became apparent, the wireless industry started developing new protocols to address the published weak points. These new protocols grew up around the IEEE 802.1x framework, which is a ...
Recently, T-Mobile announced that they are the firstU.S. Wireless carrier to implement 802.1x (IEEE port-based authenticationalso known asDot1x). This is a huge improvement in the security and ...
I've just completed my first 802.1x setup and I wanted to see if there was anything else I should work on. Right now it's Unifi APs running 802.1x to a Win2008 R2 RADIUS server on the LAN. The APs are ...
In the NAC products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very early what kind of ...
A recent poll at a Gartner security conference indicates strong interest in 802.1x authentication that will feed into the network-based, identity driven model of NAC. The poll was taken at a session ...
In the security and wireless networking world, 802.1x is a big deal. This is the Layer 2 protocol that enables device authentication. The protocol helps keep war drivers off wireless networks and is ...
While 802.1X is acknowledged as the most secure way to do NAC authentication, the fear factor accompanying 802.1X is so great that there are more products in our test that avoid 802.1X than work well ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results