Reality: Part-time sensors fail miserably in reliably blocking threats (as such sensors cannot perform a sustained and frequent transmission of containment packets).
It is clear that threats occurring from unmanaged wireless security devices need focused attention. The first step in addressing this issue is to define wireless security policies for your enterprise -- define what authorized communication is and what is not.
The next step is to evaluate the security risk specific to your enterprise and invest in specialized tools such as a wireless intrusion detection/prevention system. Last, but not least, wireless security is also a people problem and user education goes a long way in mitigating the security risks.
AirTight Networks specializes in wireless security and performance management. It provides customers cutting-edge wireless intrusion detection and prevention (WIPS) solutions to automatically detect, classify, block and locate current and emerging wireless threats.
Sign up for Computerworld eNewsletters.