Network Computing examines tools from major vendors for keeping a wireless LAN secure after it’s built. The tools watch out for rogue access points and denial-of-service attacks and perform other tasks to keep attackers at bay.
Via [securitypipeline.com]
Sorry, comments are closed for this post.