• United States

Face-off: Rogue access points

Jan 12, 20042 mins
Enterprise Applications

* Face-off: Rogue access points * This glass is half-full * How did they do, really? * Remember what happened last time?

Face-off: Rogue access points

Everyone agrees that rogue access points are an IT security manager’s nightmare. Employees, empowered by easy-to-install wireless LAN devices, are increasingly setting up these access points on corporate networks without giving security a thought and therefore opening those networks to, well, anyone. Where experts differ is on how to discover and deal with these rogue devices. In our Face-off, we pit Unisys’ Marvin Chartoff against Cap Gemini Ernst & Young’s Brian Boyland.

Chartoff: You can get rogue access points under control

Boyland: No single scheme will work

The forum

This glass is half-full

You can choose to view new homeland security-related requirements as a burden imposed by government on businesses. Or you can think of it as an opportunity. Guest columnist and consultant W. David Stephenson this week takes a fresh look at how homeland security measures might become competitive advantage.

How did they do, really?

Anyone can make a prediction. It’s being right that’s the tough part. This week a couple of our columnists – Dave Kearns and Johna Till Johnson – grade themselves on how well they hit the mark with their predictions last year.

Kearns’ Wired Windows

Johnson’s Eye on the Carriers

Remember what happened last time?

‘Fess up. Are you “jumping back in the water, clothes off, with glee”? Daniel Briere says too many people are looking at telecom the same way they did a few years ago, and run the risk of making the same mistake with their investment dollars that they did then.