* Lessons from Network World's Security Technology Tour People are fond of saying that they aren’t going to roll out wireless LANs because they are insecure. Joel Snyder, a Network World columnist says that’s bunk. He says you can do it and the truth is that you will roll out WLANs because they are “too cheap to ignore.”Snyder, a senior partner with Opus One, delivered this message to IT managers attending Network World’s Security Technology Tour.He says there are six options for securing WLANs that are relatively easy to do. And to not do them is putting your company’s data at risk.The first method he points to is WEP, or the Wired Equivalency Protocol. Snyder says WEP is incredibly compatible with current wireless networks and is simple to set up. The downside, he says, is that the protocol provides encryption, but no user or per-packet authentication. Another option is 802.1X, which does provide user authentication. 802.1X can be rolled out in either a wired or wireless environment and includes per-session WEP keys. Snyder says the best thing about 802.1X is that it lets you authenticate the user at the link layer, before they have complete access to your network.Coming over the horizon is 802.11i, a security standard for wireless networks that is being worked on by the IEEE. The standard will enhance WEP to provide a per-packet re-keying mechanism, Snyder says. It also features a message integrity check to halt packet tampering. The standard is expected to get a seal of approval by 2004. Go onto any Web site and chances are you’re using Web authentication, another method Snyder says can help you shore up your WLAN. It’s easy to implement and use, however, it’s also easy to hijack and eavesdrop on sessions over the Web. You have to recognize the trade-off when you choose this method.Finally, Snyder says there are the two options of IPSec and IPSec passthrough. IPSec, he says, is the strongest security model, using the same structure as for Internet remote access. However, you do need client software, which creates deployment and upgrade challenges.The benefit of IPSec passthrough, he says, is its ease of integration with existing VPNs. One drawback to this approach is its difficulty in dealing with guest users.Snyder says it’s important to take a long hard look at your network and decide which of these methods makes sense for the types of traffic you are supporting. Related content news Dell provides $150M to develop an AI compute cluster for Imbue Helping the startup build an independent system to create foundation models may help solidify Dell’s spot alongside cloud computing giants in the race to power AI. By Elizabeth Montalbano Nov 29, 2023 4 mins Generative AI Machine Learning Artificial Intelligence news DRAM prices slide as the semiconductor industry starts to decline TSMC is reported to be cutting production runs on its mature process nodes as a glut of older chips in the market is putting downward pricing pressure on DDR4. By Sam Reynolds Nov 29, 2023 3 mins Flash Storage Technology Industry news analysis Cisco, AWS strengthen ties between cloud-management products Combining insights from Cisco ThousandEyes and AWS into a single view can dramatically reduce problem identification and resolution time, the vendors say. By Michael Cooney Nov 28, 2023 4 mins Network Management Software Cloud Computing opinion Is anything useful happening in network management? Enterprises see the potential for AI to benefit network management, but progress so far is limited by AI’s ability to work with company-specific network data and the range of devices that AI can see. By Tom Nolle Nov 28, 2023 7 mins Generative AI Network Management Software Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe