When WEP's flaws became apparent, the wireless industry started developing new protocols to address the published weak points. These new protocols grew up around the IEEE 802.1x framework, which is a ...
Understanding all the 802.1X client settings in Windows can certainly help during deployment and support of an 802.1X network. This is especially true when manual configuration of the settings is ...
Recently, T-Mobile announced that they are the firstU.S. Wireless carrier to implement 802.1x (IEEE port-based authenticationalso known asDot1x). This is a huge improvement in the security and ...
When connecting to an enterprise-secured network with Android devices, users are prompted with many settings that could be confusing. When connecting with iOS devices—an iPad, iPhone, or iPod ...
During the course of our NAC reviews, we also tested Cloudpath Networks’ XpressConnect. XpressConnect is a small, browser-delivered agent that can reconfigure wireless access profiles and 802.1x ...
In the security and wireless networking world, 802.1x is a big deal. This is the Layer 2 protocol that enables device authentication. The protocol helps keep war drivers off wireless networks and is ...
A recent poll at a Gartner security conference indicates strong interest in 802.1x authentication that will feed into the network-based, identity driven model of NAC. The poll was taken at a session ...